Today an article in Dark Reading titled Federal Agencies: Online Collaboration, Cyber Terrorism, Mobility, Web 2.0 Their Biggest Security Threats outlines the results of a survey by the Ponemon Institute on what ails our government’s agencies the most in terms of security threats and concerns. The survey of 217 senior-level federal IT executives yielded some pretty extraordinary findings.
This goes both ways. The legitimate AND illegitimate or malicious doers are taking advantage of the runaway adoption of wireless devices and technologies, in particular cellphones. This week there was increased coverage of a worm affecting unlocked iPhones apparently having started in Australia but now making its way around the world. Why would that matter to an IT security professional? These same iPhones (and the growing population of unlocked iPhones with SSH holes) are accessing organizational email, being connected to PCs/laptops for charging or tethering, storing and sending documents, having access to LDAP databases through ActiveSync, storing huge caches of contact information, on and on. Not too long ago these were some of the same reasons used for securing desktops then laptops afterwards. Yet the awareness or acknowledgement of the mobile problem, or Tsunami of Insecurity, is in an early stage…albeit growing rapidly!