Mobile Trends: The Security of Bringing Your Own Device

Mobile Trends: The Security of Bringing Your Own Device

Bring Your Own Device (BYOD) allows Federal Government employees to use their own mobile devices to conduct work and offers productivity savings – some say as many as 9 more hours a week!

The Government continues to expand the use of mobile technology to serve its citizens and perform its mission, however, security is still one of the largest challenges. This is a particularly large barrier for the Government as it implements Bring Your Own Device (BYOD) policies.

Protecting information is critical. First and foremost, the data is sensitive. And the amount of data storage and processing on BYOD personal devices also compounds security risks.

This issue has not gone unnoticed by the Government. As part of the Milestone Action #3.3 guidance in the Digital Government Strategy, the BYOD Working Group lays out specific implementation approaches to mitigate security concerns. Strategies include virtualization (VPN) and remote access, so that Government data is not stored on the personal devices.  Furthermore, security technology firms have deployed innovative products to comply with the Federal Information Processing Standard (FIPS) regulations and can accelerate BYOD adoption.

The Government is not alone in its guarded approach to BYOD policies – the financial services and retail sectors are similarly hesitant. By implementing the suggested guidelines below, the Government can seek to limit the BYOD security issues.

  • Start with access to Government websites and email before expanding to mission-critical data or networks
  • Exploring technologies that increase data security and allow access to data but not storing it on the personal devices
  • Consider how to communicate policies to employees, train them, and reinforce security practices on an ongoing basis

Taking advantage of the BYOD trend will prove to attract a tech saavy workforce and drive productivity gains in the years to come. 

Contributors

* Arc Aspicio | Arc Aspicio is an information technology and management consulting company that focuses on homeland security and intelligence. Our services include strategy and planning, business architecture, strategic communications, mission/technology alignment, information technology, and program management. Arc Aspicio is building a community that promotes collaboration, continuous learning, innovation, and intelligence to improve homeland security. For more information, please visit www.arcaspicio.com.

Contact Information
Lynn Ann Casey / Chief Executive Officer
info@arcaspicio.com
703.465.2060

A Leader’s Most Influential Tool: Gratitude

A Leader’s Most Influential Tool: Gratitude

Gratitude is one of a great leader’s most powerful tools. It creates positive energy among an organization and the sense of appreciation permeates through the work the collective group is performing. Influential leaders listen to the needs of their colleagues and express gratitude. This helps them bring out the potential in the people they lead and inspire them to achieve what is most important to them and to the project.

The Design Era of Project Management

The Design Era of Project Management

Project Management best practices and methods continue to evolve to address the biggest challenges Government agencies face in today’s market. The increased use of Agile and the move from traditional waterfall methodologies is fairly common in Information Technologies. Projects use Agile methods such as Scrum or Kanban, and organizations invest a lot of time and effort to make this cultural shift on projects.

Data: Lost in Translation No More

Data: Lost in Translation No More

The rise of Big Data technologies and data-driven approaches of business functions has created a demand for data architects and scientists that is growing by as much as 12% annually. These highly technical resources and capabilities address part of the challenge, but organizations still struggle with how to effectively use the data they have to make timely and informed decisions to improve business and mission outcomes.

Great Meetings with IT Customers in an Agile World

Great Meetings with IT Customers in an Agile World

Meetings are an essential part of day-to-day work and collaboration in every organization. There are an estimated 37 million meetings every day in the United States, yet up to 67 percent are considered failures. Sources estimate the cost of unproductive meetings in the billions and say meetings may take up 15% of an organization’s collective time.

Not Made for TV: The Critical Behind-the-Scenes Continuity Mission

Not Made for TV: The Critical Behind-the-Scenes Continuity Mission

Back in the public spotlight for the first time since the Cold War thanks to the new ABC drama Designated Survivor, Continuity of Government (COG) is a lesser-known mission in the portfolio of the Department of Homeland Security (DHS) and its Federal Emergency Management Agency. As a concept, its origins lie in the dawn of the atomic era, when the new possibility of simultaneous nationwide devastation created the need for contingency plans for the worst cases imaginable.

General Services Administration Awards Arc Aspicio HCaTS Contract

Arlington, VA December 12, 2016 — The General Services Administration (GSA) and Office of Personnel Management (OPM) awarded Arc Aspicio the Human Capital and Training Solution (HCaTS) Small Business contract on December 7, 2016. This Multiple Award, Indefinite-Delivery, Indefinite-Quantity (IDIQ) is a government-wide contract that was awarded to vendors in two different pools. Arc Aspicio’s contract is in Pool 2, which supports customized human capital strategy services and organizational performance improvement.