Close Menu
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing & Mental Health
  • Marketing
  • HR & Recruitment
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
X (Twitter) LinkedIn YouTube
Trending
  • Lessons From Grenfell Are Still Being Learned
  • Raising Money Where It’s Needed: Westspring Pledges To Raise £50,000 For Charity
  • The True Cost Of Leasing: Why SMEs Are Turning To Serviced Offices
  • 5 ways employers can supercharge their workforce with apprenticeships
  • Take Control of Your Business Finances: “Know Your Numbers” Workshop
  • Planned or reactive maintenance: Which is best for your business?
  • Putting information security first is your first step to building digital trust.
  • Why the crackdown on late payments could be a turning point for SMEs
X (Twitter) LinkedIn YouTube
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing
  • Marketing
  • HR & Recruitment
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • Twitter
  • LinkedIn
  • YouTube
  • RSS
You are at:Home»Technology»How to protect company data on personal devices

How to protect company data on personal devices

3
Posted By sme-admin on February 18, 2025 Technology

It is estimated that over 90% of hybrid and remote employees use a personal device for work every day. But as more people use their smartphones or laptops to access company resources the security risks for organisations increase dramatically making it unsurprising that more than half of UK businesses experienced some form of cybersecurity breach or attack last year alone.

Simple admin tasks such as sending a work email from a personal device can create vulnerabilities in an organisation’s network. Whether instituted as a formal policy or as an adaptation to the pandemic, bringing your own device (‘BYOD’ ) opens a company’s systems and platforms up to hacking, data loss, and insider threat. With 82% of employers having a BYOD policy in place, employers need to be aware of these concerns, as well as implement best practices to mitigate the risks.

Conor O’Neill, CEO and Co-Founder of leading online pen test vendor OnSecurity, shares more about BYOD security and how organisations and employees can make sure their devices are protected.

BYOD security: What are the risks of using personal devices at work?

Unsecured wifi networks

When employees connect their personal devices to public Wi-Fi networks like cafes and hotels, these networks are usually not secure or well protected against attacks. Mobile devices are at risk of having information accessed by an attacker if they communicate with a public network, and the data transmitted between the personal device and corporate systems can be captured.

Organisations can use VPN (or virtual private network) technology to protect themselves from risks related to unsecured Wi-Fi networks. This way, the VPN creates a tunnel between their personal device and corporate network so all data is sent over public Wi-Fi responsibly.

Data security breaches

Employees’ devices often lack robust and up-to-date antivirus protection which is normally present in company-issued laptops, leaving them vulnerable to malware and virus infections. These infections can spread to company networks, compromising critical systems and potentially leading to data loss or disruption of operations. Common threats include viruses that spread through email attachments and downloads, spyware that steals sensitive data and ransomware that encrypts files and demands payment for their release.

Research from the Anti-Phishing Working Group (APWG) revealed common threats and scams most often include a sense of urgency so look out for phrases like ‘update password now’ and ‘action required’.

Lost or stolen devices

Lost or stolen devices are potentially the biggest threat to BYOD security with 40% of data breaches caused by lost or stolen devices. When the wrong person finds a device, it can easily be infiltrated and mined for personal, internal and financial information.

The loss or theft of these devices poses a high risk of exposing confidential company data if adequate measures, such as encryption and remote wipe capabilities, aren’t implemented.

If an employee loses or has their device stolen it’s important to act immediately and report the loss. Companies should have measures in place to ensure you can wipe data from a laptop, tablet or phone remotely.

Mixing personal and business use

Bringing your own device to work means mixing business with personal use is inevitable. You can’t control whether your employees decide to shop online at compromised websites or whether they will misplace a device. While you can educate heavily on security best practices, you can’t guarantee that your employees won’t loan their devices to a friend or use public wireless connections to save data.

45% use the same password for work and personal accounts – reusing passwords exposes a user’s accounts to cybercriminals, which increases the risk of identity theft as well as sensitive data theft from their organisation. Employers must encourage employees to have strong and different passwords across their work accounts.

5 BYOD security strategies for the workplace:

  1. Implement a clear BYOD policy

A clear BYOD policy is essential for managing the risks associated with personal device use. This policy must outline the acceptable use of personal devices and guide security practices such as password protocols, approved apps and procedures in the event of device loss or theft.

  1. Multi-factor authentication (MFA) codes

Make sure you use strong passwords on smartphones, laptops, tablets, email accounts and any other devices or accounts where personal information is stored. Where possible, you should consider using multi-factor authentication. Multi-factor authentication is a security measure to make sure the right person is accessing the data. It requires at least two separate forms of identification before access is granted. For example, you use a password and a one-time code which is sent by text message.

  1. Enforce access control and monitoring

The implementation of strict access control measures and conducting regular audits ensures that only authorised individuals can access sensitive data, reducing the risk of data breaches. Monitoring access logs also enables the timely detection of suspicious activities or unauthorised access attempts, allowing for prompt response and mitigation.

  1. Regular training

A significant element of overall BYOD security is ensuring that employees are properly educated on the most common security threats and risks and given the knowledge of best practices for avoiding them. It also concerns knowledge about up-to-date practices for securely surfing the web and regularly updating the software. At the same time, employees must be trained on how to recognise and report potential security incidents affecting the organisation such as phishing attempts.

  1. Mobile device management

In case of loss or theft, a mobile device management program can enable IT departments to remotely “wipe” a device to ensure sensitive information is not exposed.

As the lines between personal and professional device use continue to blur, companies must proactively address the security challenges that come with BYOD environments. While personal devices offer flexibility and convenience, they also introduce vulnerabilities that can put sensitive company data at risk. By implementing clear policies, enforcing robust security measures and investing in regular employee training, businesses can reduce these risks. Ultimately, creating a secure, digital space is a shared responsibility—one that requires both employers and employees to stay vigilant and informed.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Putting information security first is your first step to building digital trust.

MPs bring Google training to regions outside London

AI isn’t just for the big players: How SMEs can effectively leverage AI

3 Comments

  1. Pingback: Essential Security Measures for Protecting Personal Devices | Practice Business

  2. Pingback: Essential Security Measures for Protecting Personal Devices | Dealer Support

  3. Pingback: Essential Security Measures for Protecting Personal Devices | Edexec

Follow SME Today on Linkedin and share all the topics you find interesting
ISO/IEC 27001 roadmap: A practical guide for UK SMEs
ISO/IEC 27001 roadmap: A practical guide for UK SMEs
Are you a Company Director?
Are you a Company Director - Verify your identity
Personal Pension offer
Events Calendar
    • Marketing
    September 9, 2025

    SEO 101 for SMBs: Reaching Customers with the Right Visuals

    August 29, 2025

    OneMetric forms strategic partnership with RevOps expert to drive UK growth

    • Finance
    September 17, 2025

    Take Control of Your Business Finances: “Know Your Numbers” Workshop

    September 16, 2025

    Why the crackdown on late payments could be a turning point for SMEs

    • People
    September 11, 2025

    New Chief Revenue Officer joins CBS to drive strategic growth

    August 14, 2025

    A Life Worth Saving – A Tribute to Dame Stephanie Shirley CH, 1933–2025

    • Health & Safety
    September 18, 2025

    Lessons From Grenfell Are Still Being Learned

    September 2, 2025

    1 in 3 employees anxious about lack of first aiders at work

    • Events
    September 9, 2025

    Nominations for the 2026 Bold Woman Award by Veuve Clicquot open

    July 22, 2025

    South West Expo Delivers Outstanding Event at Swindon’s STEAM Museum

    • Community
    September 18, 2025

    Raising Money Where It’s Needed: Westspring Pledges To Raise £50,000 For Charity

    July 11, 2025

    Building community, one cause at a time

    • Food & Drink
    August 22, 2025

    How to get stocked by major retailers as an SME

    July 18, 2025

    Warning to Small Businesses Over New Food Waste Regulations

    • Books
    September 3, 2025

    New book on conquering fear of public speaking

    August 7, 2025

    Learning to Leave a Legacy in Business

    The Newsletter

    Join our mailing list for the best SME stories, handpicked and delivered direct to your inbox every two weeks!

    Sign Up
    About

    SME Today is published by the same team who deliver The Great British Expos’. We have been organising various corporate events for the last 10 years, with a strong track record of producing well managed and attended business events across the UK.

    Join Our Mailing List

    Receive the latest news and updates from SMEToday.
    Read our Latest Newsletter:


    Sign Up
    X (Twitter) YouTube LinkedIn
    Categories
    • Books
    • Community & Charity
    • Education and Training
    • Environment
    • Events
    • Features
    • Finance
    • Food and Drink
    • Health & Safety
    • HR & Recruitment
    • In Profile
    • Legal
    • Marketing
    • News
    • People
    • Property & Development
    • Sponsored Content
    • Technology
    • Transport & Tourism
    • Wellbeing & Mental Health
    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Editorial Submission Guidelines
    • Privacy
    • Contact
    Copyright © 2025 SME Today.
    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Editorial Submission Guidelines
    • Privacy
    • Contact

    Type above and press Enter to search. Press Esc to cancel.