Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Army's Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us AllCommenting on a report from the US Inspector General’s office on the effects of BYOD (bring your own devices) on US military data security – which found that military command was unaware of more than 14,000 mobile devices in active use across the US Army – Voltage Security says this is a classic example of what happens on the data security front in very large organizations.

According to the VP of Product Management with the data-centric security and stateless key management specialist, Mark Bower, even in a highly-controlled organization the size of the US Army – which has around 560,000 active staff and about the same number of Reserves and National Guard personnel – there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

“And, it is exactly the same in a large enterprise, as not only do you need security policies, but you need the technology in place to enforce those policies and ensure the governance surrounding the data as it flows into, across and out of the organization,” he said.

“This is where an effective, data-centric security strategy enters the frame, as even in an organization the size of the US Army with its 1.12 million personnel, there is a need to ensure that all of the data remains protected and private anywhere it moves, anywhere it resides, and however it is used,” he added.

Bower went on to say that a lack of technology to both enforce the required security policies - as well as control what happens to the data, whether it is held in a local or cloud environment, or even across a mobile device - is almost certainly the reason why the US Army had more than 14,000 smartphones and tablet computers floating around outside of its direct security control.

Bower said that it is also revealing that the US Army command allowed sensitive data to be stored on the portable devices, suggesting that at least some of the smartphones and tablet computers were owned by the government as well as army personnel themselves.

“It is also very worrying,” he added, “that US Army staff are also storing military data on their own personal smartphones and tablet computers, as this report seems to imply.”

“The US Army has come a long way since the days of `Full Metal Jacket’ – Stanley Kubrick’s seminal Vietnam war movie of 1987 – as today’s battles are fought with the aid of computers and other Theatre of War IT systems. As a result, encrypting the data as it is used and moved across the army network, through the cloud and over mobile devices, assumes paramount importance,” he said.

“It is not exaggerating to say that the loss of data in today’s military could give the enemy an upper hand in a battlefield situation - as well as potentially resulting in unnecessary loss of lives. This takes the data protection aspect of security to a completely new level,” he added. "And, let’s not forget, it just takes one email and attachment containing sensitive materials to fall into enemy hands to create a breach that’s difficult to contain - the stakes are high.

Featured

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.