Joseph Marks | Nextgov | March 22, 2017 | 0 Comments

Feds Skeptical About Security of Their Agencies’ Internet-Connected Devices


Nearly 90 percent of federal managers believe securing internet of things devices, such as sensors and smart technology, is essential to their agency’s mission, but just over 40 percent are confident these devices are truly secure, a new survey found.

Major challenges prevent government from adequately securing the smart devices it relies on, the survey respondents said, including inadequate funding and a procurement process unprepared for digital-age challenges.

About 40 percent of respondents cited each of those challenges, with 30 percent citing a shortage of technical expertise in their agencies and 19 percent citing a lack of support by top leadership.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

The survey was conducted by the Government Business Council and underwritten by the network provider Brocade. GBC and Nextgov are both part of Government Executive Media Group.

The survey included 442 randomly selected federal respondents, 69 percent of whom were at the GS-12 level or above and one-quarter of whom hold ranking positions inside the Defense Department.

Government agencies undergo regular congressionally mandated audits of their information security, but the government has lagged on requirements specific to the connected devices, such as cameras and connected vehicles beginning to pervade society and have become a boon to government work.

About three-fourths of the polled feds believe there should be governmentwide standards for internet of things security as there are for core digital infrastructure rather than allowing standards to vary agency by agency. About the same percentage believe those standards should be as stringent as requirements for computers and other core infrastructure.

Survey respondents cited strong passwords and encryption as top security measures protecting the internet-connected devices their agency currently relies on, but roughly one-fourth said they did not know how their agency is protecting IoT devices.

About half of respondents cited cyberattacks by terrorists as a top fear for connected devices that link to their agency’s network with nuisance hackers and distributed denial-of-service attacks following.


Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.