This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Voltage Security: US Army’s data insecurity problems a lesson for all

05 April 2013

Commenting on a report from the US Inspector General’s office on the effects of BYOD (bring your own devices) on US military data security – and which found that military command was unaware of more than 14,000 mobile devices in active use across the US Army – Voltage Security says this is a classic example of what happens on the data security front in very large organisations

According to Mark Bower, VP of Product Management with the data-centric security and stateless key management specialist, even in a highly controlled organisation the size of the US Army – which has around 560,000 active staff and about the same number of Reserves and National Guard personnel – there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

“And it is exactly the same in a large enterprise, as not only do you need security policies, but you need the technology in place to enforce those policies, and ensure the governance surrounding the data as it flows into, across and out of the organisation,” he said.

“This is where an effective data-centric security strategy enters the frame, as even in an organisation the size of the US Army with its 1.12 million personnel, there is a need to ensure that all of the data remains protected and private anywhere it moves, anywhere it resides, and however it is used,” he added.

The Voltage VP of Product Management went on to say that a lack of technology to both enforce the required security policies - as well as control what happens to the data, whether it is held in a local or cloud environment, or even across a mobile device - is almost certainly the reason why the US Army had more than 14,000 smartphones and tablet computers floating around outside of its direct security control.

Bower says that it is also revealing that the US Army command allowed sensitive data to be stored on the portable devices, which suggests that at least some of the smartphones and tablet computers were owned by the government, as well as army personnel themselves.

It is also very worrying, he adds, that US Army staff are also storing military data on their own personal smartphones and tablet computers, as this report seems to imply.

“The US Army has come a long way since the days of `Full Metal Jacket’ – Stanley Kubrick’s seminal Vietnam war movie of 1987 – as today’s battles are fought with the aid of computers and other Theatre of War IT systems. As a result, encrypting the data as it is used and moved across the army network, through the cloud and over mobile devices, assumes paramount importance,” he said.

“It is not exaggerating to say that the loss of data in today’s military could give the enemy an upper hand in a battlefield situation - as well as potentially resulting in unnecessary loss of lives. This takes the data protection aspect of security to a completely new level,” he added. "And let’s not forget, it just takes one email and attachment containing sensitive materials to fall into enemy hands to create a breach that’s difficult to contain - the stakes are high."


Print this page | E-mail this page

RELATED CONTENT...

View more articles
Article image

Awards ceremony 'highlights dedication of Ward Security staff'

A  dedicated member of Ward Security’s 400-strong staff has been named Employee of the Year at the company’s Annual Employee Awards. Akinola Ogedengbe...

MITIE awarded £3 million security contract with Essar Oil

MITIE, the FTSE 250 strategic outsourcer, has won a £3 million security contract with Essar Oil (UK) Ltd, part of Essar Energy, the integrated energy compa...
https://www.asckey.com/
https://www.bona.com/en/
PFM
https://www.aspenpumps.com/en-gb


MOST VIEWED...

View more articles
Article image

Why the Law Says You Need a Nappy Bin Disposal Service

At home, parents are used to disposing of their babies’ used nappies the same way they do any other domestic waste - bagging it up and sticking it in the r...
Article image

A High Performance Service for a High Performance Business – GKN Aerospace

GKN Aerospace, a first tier supplier of highly complex composite and metallic aerostructures and engine products to the global aviation industry, recently ...
Article image

Making the Leadenhall Building fit for purpose

Firmly established as one of the most notable buildings in the City of London, the Leadenhall Building (informally known as the cheesegrater) provides a st...

Benchmarking maintenance

BSRIA has just published this year's operation and maintenance benchmarking report as a guide for building operators to evaluate their performance against ...
Article image

Center Parcs goes cashless with Systopia

Systopia, which deals with cashless payment systems, has secured a contract with UK Short Break Operator Center Parcs to provide cashless payment systems i...
Article image

Rinnai’s H3 Hydrogen/BioLPG Hybrid Heat Pump

Rinnai now offers H1, H2 & H3 solutions to the energy question in the cost of living squeeze....
https://www.ppspower.com/
https://www.floorbrite.co.uk/
https://www.neccontract.com/products/contracts/nec4/facilities-management-contract/bundle?utm_source=PFM+ads&utm_medium=website&utm_campaign=PFM+ads
https://www.pfmawards.co.uk/
https://flowscapesolutions.com/
https://www.uhubglobal.com/
https://www.watco.co.uk/guides-to-commercial-floor-preparation-and-painting?utm_source=premises%20facilities%20management&utm_medium=banner&utm_campaign=safety%20ebook
https://www.spacesolutions.co.uk/subservice/nec-contracts-management/