Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Army's Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us AllCommenting on a report from the US Inspector General’s office on the effects of BYOD (bring your own devices) on US military data security – which found that military command was unaware of more than 14,000 mobile devices in active use across the US Army – Voltage Security says this is a classic example of what happens on the data security front in very large organizations.

According to the VP of Product Management with the data-centric security and stateless key management specialist, Mark Bower, even in a highly-controlled organization the size of the US Army – which has around 560,000 active staff and about the same number of Reserves and National Guard personnel – there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

“And, it is exactly the same in a large enterprise, as not only do you need security policies, but you need the technology in place to enforce those policies and ensure the governance surrounding the data as it flows into, across and out of the organization,” he said.

“This is where an effective, data-centric security strategy enters the frame, as even in an organization the size of the US Army with its 1.12 million personnel, there is a need to ensure that all of the data remains protected and private anywhere it moves, anywhere it resides, and however it is used,” he added.

Bower went on to say that a lack of technology to both enforce the required security policies - as well as control what happens to the data, whether it is held in a local or cloud environment, or even across a mobile device - is almost certainly the reason why the US Army had more than 14,000 smartphones and tablet computers floating around outside of its direct security control.

Bower said that it is also revealing that the US Army command allowed sensitive data to be stored on the portable devices, suggesting that at least some of the smartphones and tablet computers were owned by the government as well as army personnel themselves.

“It is also very worrying,” he added, “that US Army staff are also storing military data on their own personal smartphones and tablet computers, as this report seems to imply.”

“The US Army has come a long way since the days of `Full Metal Jacket’ – Stanley Kubrick’s seminal Vietnam war movie of 1987 – as today’s battles are fought with the aid of computers and other Theatre of War IT systems. As a result, encrypting the data as it is used and moved across the army network, through the cloud and over mobile devices, assumes paramount importance,” he said.

“It is not exaggerating to say that the loss of data in today’s military could give the enemy an upper hand in a battlefield situation - as well as potentially resulting in unnecessary loss of lives. This takes the data protection aspect of security to a completely new level,” he added. "And, let’s not forget, it just takes one email and attachment containing sensitive materials to fall into enemy hands to create a breach that’s difficult to contain - the stakes are high.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3