Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Army's Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us AllCommenting on a report from the US Inspector General’s office on the effects of BYOD (bring your own devices) on US military data security – which found that military command was unaware of more than 14,000 mobile devices in active use across the US Army – Voltage Security says this is a classic example of what happens on the data security front in very large organizations.

According to the VP of Product Management with the data-centric security and stateless key management specialist, Mark Bower, even in a highly-controlled organization the size of the US Army – which has around 560,000 active staff and about the same number of Reserves and National Guard personnel – there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

“And, it is exactly the same in a large enterprise, as not only do you need security policies, but you need the technology in place to enforce those policies and ensure the governance surrounding the data as it flows into, across and out of the organization,” he said.

“This is where an effective, data-centric security strategy enters the frame, as even in an organization the size of the US Army with its 1.12 million personnel, there is a need to ensure that all of the data remains protected and private anywhere it moves, anywhere it resides, and however it is used,” he added.

Bower went on to say that a lack of technology to both enforce the required security policies - as well as control what happens to the data, whether it is held in a local or cloud environment, or even across a mobile device - is almost certainly the reason why the US Army had more than 14,000 smartphones and tablet computers floating around outside of its direct security control.

Bower said that it is also revealing that the US Army command allowed sensitive data to be stored on the portable devices, suggesting that at least some of the smartphones and tablet computers were owned by the government as well as army personnel themselves.

“It is also very worrying,” he added, “that US Army staff are also storing military data on their own personal smartphones and tablet computers, as this report seems to imply.”

“The US Army has come a long way since the days of `Full Metal Jacket’ – Stanley Kubrick’s seminal Vietnam war movie of 1987 – as today’s battles are fought with the aid of computers and other Theatre of War IT systems. As a result, encrypting the data as it is used and moved across the army network, through the cloud and over mobile devices, assumes paramount importance,” he said.

“It is not exaggerating to say that the loss of data in today’s military could give the enemy an upper hand in a battlefield situation - as well as potentially resulting in unnecessary loss of lives. This takes the data protection aspect of security to a completely new level,” he added. "And, let’s not forget, it just takes one email and attachment containing sensitive materials to fall into enemy hands to create a breach that’s difficult to contain - the stakes are high.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.