ISSUE BRIEF

3 Mobile Security Threats A BYOD Strategy Should Prepare For

Flickr user: Killrbeez

As government works to keep up with the mobile revolution, more applications are becoming available on personal devices. Several agencies offer BYOD policies, while others are enabling mobile transactions for citizen services.

Though these programs present agencies with an opportunity to simplify transactions and potentially decrease costs, they may also make the agency vulnerable to security breaches. One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights.

Underwritten by:

Any information you supply is protected by our privacy policy.

Access to this report is available to registered members at no cost. In order to provide you with this free service, the Government Executive Media Group may share this member information with report underwriters. When you download a research document, your information may be shared with the sponsors of that document.

DOWNLOAD

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by eSignLive by VASCO

    Mobile E-Signatures for Government

    Learn 5 key trends that accelerate government demand for mobile signing.

    Download
  • Sponsored by Management Concepts

    SPONSORED: Successful Change Management Practices in the Public Sector

    How governmental agencies implement organizational change management.

    Download
  • Sponsored by Kronos

    Solving the Workforce Compliance Challenge

    Download this eBook to learn how data and automation can help state and local agencies.

    Download

When you download a report, your information may be shared with the underwriters of that document.