Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout security experts keep a steady pulse on the most prominent mobile threats affecting U.S. federal, state and local government agencies. According to an analysis of Lookout Security Graph data, government employees were the target of almost 50% of all phishing attacks in 2021, up from 30% in 2020.

Read the Report

The Lookout Secure Access Service Edge (SASE) solution enables government agencies to meet the Zero Trust Architecture requirements in the Executive Order 14208 and OMB M-22-09, mitigating risk when enabling critical initiatives like digital transformation and telework. SASE has network and security components, which Gartner refers to as Security Service Edge (SSE).

As a platform with FedRAMP Joint Authorization Board (JAB) Provisional Authority to Operate (P-ATO), any agency can submit an ATO and save the time and complexity of evaluating and approving the Lookout SASE/SSE solution to protect their data as they use cloud services . The JAB is the primary governing body for FedRAMP and includes the Department of Defense (DoD), Department of Homeland Security (DHS), and General Services Administration (GSA).

With FedRAMP JAB P-ATO, the Lookout Security Platform supports a more rapid and seamless path to implementing a comprehensive Zero Trust Architecture, enabling agencies to: 

  • Protect data against insider threats and credential theft.
  • Dynamically adapt to changes in user and device risk posture.
  • Prevent agency data from being exposed to unauthorized users.
  • Apply unified data protection policies across all users, endpoints and applications.
Blog: Lookout Obtains FedRAMP JAB P-ATO For SASE: What It Means For You

Latest resources

Enabling the U.S. Government to achieve zero trust

In today's environment, security teams cannot trust users that attempt to connect to their network...

Download Brochure
Cyber measures gain momentum at federal agencies

Last year’s White House Executive Order on Cybersecurity increased attention on holistic cybersecurity practices.

Read Disruptive Study
Better preparing the workforce for cybersecurity threats

In this podcast, Senior Threat Researcher, Kristina Balaam shares simple practices that can help prevent devices from being exposed to an attack.

Listen to Podcast
How federal agencies can revamp their mobile security posture

Cybersecurity is an increasing concern for the federal government, particularly with a larger remote workforce to manage than in the past.

Watch Video

Embracing Zero Trust: A guide for agencies to address the cybersecurity executive order

To help accelerate the adoption of Zero Trust and Threat Intelligence strategies, it's important to first understand how to protect data from endpoint to cloud. Discover how a comprehensive Zero Trust strategy can make security an enabler.

Read the E-Book
Embracing Zero Trust

Your mission has evolved beyond the perimeter

Whether your agency is tasked with defense or providing healthcare, telework is now an essential part of your mission’s success. Taking advantage of cloud applications and mobility, your employees can now stay productive regardless of where they are or the type of device they use. But to capture this boosted productivity, you need to ensure you provide seamless but secure access to your infrastructure.

Read BYOD Report

Your agency is exposed to new risks

Telework uncovered previously untapped productivity but it also exposes your agency to new risks. With workers often using personal devices and networks you don’t manage, you no longer have the same visibility and control you had inside your perimeter. Advanced threat actors already have the resources to put themselves miles ahead of government agencies. Now, they have new points into your infrastructure.

The National Institute of Standards and Technology (NIST) recommends deploying Zero Trust. With users now working from anywhere and your data follows them, this means security needs to span from the endpoint all the way to your cloud applications.

Read Zero Trust Best Practices Report

Achieve Zero Trust with real-time risk assessment

The Lookout security platform ensures your Zero Trust access spans from endpoint to cloud. We give you full visibility and control over what’s happening across your agency so you can implement precise controls, enhance security with multi-factor authentication and give dynamic access to those that need it.

We continuously monitor the risk level of your endpoints and users, ensuring that threats such as ransomware and insider threats are detected. We also aggregate all the insights so you can hunt for threats and conduct forensic investigations into advanced cyber attacks.

Get Zero Trust Architecture Guide

Discover how Lookout can protect your data