BYOD allows access to company networks using personal devices. It enables employees to usetheir mobile phones, personal laptops, or home desktops to conduct businessactivity and work-related tasks. The recent increase in remote and hybridworking arrangements has resulted in a significant increase in the use of BYOD.
An increased risk of data breaches: Personal devices might lack strong security measures such as encryption, malware protection, or connection to a secure network. Consequently, the device may become a prime target for cybercriminals.
An increased risk of employee privacy concerns: Adding security tools to employees’ devices may require granting administrative access which could allow your business or service provider access to personal data on the device. This may include sensitive information like financial statements or images of identity documents.
Before BYOD is implemented as a business practice, it is important that a clear and comprehensive policy is created, and provided to employees, to outline expected practices.
Network security: Working remotely allows employees to work from a variety of locations and networks. Flexible working locations may,however, result in employees using unsecured, public networks. Adopting avirtual private network (VPN) can be a solution, so that employees can securetheir networks whilst working remotely.
Ensuring regular software updates: Distribute and ensure each employee uploads software patches to address new software security vulnerabilities. These are released by developers on a regular basis. It is important to note, patches are only useful if they are installed, so mechanisms need to be established to ensure this happens. One unpatched device can put the whole business at risk. For more information about software patches, please see the IDCARE Understanding Patching fact sheet.
Authenticate devices: Employees may use multiple devices to connect to the workplace network. Multifactor Authentication (MFA) can ensure only authorised devices gain access. MFA should be used in conjunction with other practices, including avoiding opening unknown attachments and clicking on links, unless verified.
Data confidentiality: Ensure sensitive company data is never downloaded and saved on the employee’s personal device. Instead, ensure data remains stored in a central location, for example Microsoft Sharepoint, where it can be accessed by employees with the relevant authorisation.
Provide security management software: Your business network and the devices attached to it all rely on each other to be safe. Many organisations provide Mobile Device Management (MDM) software for each employee. MDMs control what Apps and websites are accessed on personal mobile devices. It can quickly detect and resolve device malfunctions, security threats and data risks. However, employees may be concerned about their own data and any restrictions put on their personal devices. A Unified Endpoint Management (UEM) system can be used as an alternative. It can also manage PCs, and wearable devices, among others, and contains features for maintaining employee privacy.
Password managers: ensure that employees adhere to good password practices. Consider providing a trustworthy password manager to employees. For more information about password managers, please see the IDCARE Password Managers fact sheet.
For additional support or information, contact IDCARE by submitting a Get Help Form or call 1800 595 160 (Aus) or 0800 121 068 (NZ).
Identity Care Australia & New Zealand Ltd (IDCARE) provides identity and cyber security incident response services (the Services) in accordance with the following disclaimer of service:
Join the global list of organisations making a real difference in people’s lives by supporting our service.