DorobekInsider: Wolf warns to protect your PDAs — a good reminder. Read the CIO Council’s 2008 memo

Last week on Federal News Radio 1500 AM’s Daily Debrief with Chris Dorobek and Amy Morris, we spoke to Rep. Frank Wolf (R-VA) about a letter he sent to Pr...

Last week on Federal News Radio 1500 AM’s Daily Debrief with Chris Dorobek and Amy Morris, we spoke to Rep. Frank Wolf (R-VA) about a letter he sent to President Obama essentially saying that the government was not taking proper precautions for their PDAs — BlackBerries and the like.

Rep. Frank Wolf (R-VA) today called on the president to hold a confidential cabinet briefing on the topic of cybersecurity and to make the protection of federal data a top administrative and policy priority.

Wolf, whose office computers were compromised in August 2006, continues to express concern that not enough is being done to protect critical data.

“The continued vulnerability of computer and telecommunications networks remains the ‘Achilles’ heel’ of U.S. national security in the 21st century,” Wolf wrote in a letter dated today to President Obama. “I hope you will lead our executive agencies by demonstrating to your cabinet the seriousness with which you consider this issue.”

Hear Wolf discuss this topic here.

In fact, this issue was addressed by the Federal CIO Council more than a year ago. Here is the memo:

This afternoon on Federal News Radio 1500 AM’s Daily Debrief, we’ll talk to Karen Evens, who signed that memo, about the issue.

I certainly don’t think anybody is suggesting that this issue not get full attention — so we’ll take a look at it and why it is important.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Stacy Bostjanick and Jennifer Henderson

    Risk and Compliance Exchange 2024: DoD’ Stacy Bostjanick, DCMA’s Jennifer Henderson on finding ‘any means possible’ to help small biz with CMMC

    Read more
    Amelia Brust/Federal News Networkcybersecurity

    How should software producers be held accountable for shoddy cybersecurity products?

    Read more