Close Menu
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing & Mental Health
  • Marketing
  • HR & Recruitment
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
X (Twitter) LinkedIn YouTube
Trending
  • Finance Founder Celebrates Business Milestone With Advice For Entrepreneurs
  • Fast fashion giant Shein accused of “dark marketing” – what does it mean for businesses?
  • Why GDP Growth Isn’t the Full Story for UK Businesses
  • Windsor Expo Wows: A Showcase of Success, Innovation, and Local Business!
  • Women aren’t risk-averse, they’re risk smart
  • “The Art of Difficult Conversations” Webinar
  • How data is transforming the fabric of SME lending
  • An interview with Dr. Jo Salter MBE: The RAF’s first female fast jet pilot.
X (Twitter) LinkedIn YouTube
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing
  • Marketing
  • HR & Recruitment
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • Twitter
  • LinkedIn
  • YouTube
  • RSS
You are at:Home»Technology»How to protect company data on personal devices

How to protect company data on personal devices

3
Posted By sme-admin on February 18, 2025 Technology

It is estimated that over 90% of hybrid and remote employees use a personal device for work every day. But as more people use their smartphones or laptops to access company resources the security risks for organisations increase dramatically making it unsurprising that more than half of UK businesses experienced some form of cybersecurity breach or attack last year alone.

Simple admin tasks such as sending a work email from a personal device can create vulnerabilities in an organisation’s network. Whether instituted as a formal policy or as an adaptation to the pandemic, bringing your own device (‘BYOD’ ) opens a company’s systems and platforms up to hacking, data loss, and insider threat. With 82% of employers having a BYOD policy in place, employers need to be aware of these concerns, as well as implement best practices to mitigate the risks.

Conor O’Neill, CEO and Co-Founder of leading online pen test vendor OnSecurity, shares more about BYOD security and how organisations and employees can make sure their devices are protected.

BYOD security: What are the risks of using personal devices at work?

Unsecured wifi networks

When employees connect their personal devices to public Wi-Fi networks like cafes and hotels, these networks are usually not secure or well protected against attacks. Mobile devices are at risk of having information accessed by an attacker if they communicate with a public network, and the data transmitted between the personal device and corporate systems can be captured.

Organisations can use VPN (or virtual private network) technology to protect themselves from risks related to unsecured Wi-Fi networks. This way, the VPN creates a tunnel between their personal device and corporate network so all data is sent over public Wi-Fi responsibly.

Data security breaches

Employees’ devices often lack robust and up-to-date antivirus protection which is normally present in company-issued laptops, leaving them vulnerable to malware and virus infections. These infections can spread to company networks, compromising critical systems and potentially leading to data loss or disruption of operations. Common threats include viruses that spread through email attachments and downloads, spyware that steals sensitive data and ransomware that encrypts files and demands payment for their release.

Research from the Anti-Phishing Working Group (APWG) revealed common threats and scams most often include a sense of urgency so look out for phrases like ‘update password now’ and ‘action required’.

Lost or stolen devices

Lost or stolen devices are potentially the biggest threat to BYOD security with 40% of data breaches caused by lost or stolen devices. When the wrong person finds a device, it can easily be infiltrated and mined for personal, internal and financial information.

The loss or theft of these devices poses a high risk of exposing confidential company data if adequate measures, such as encryption and remote wipe capabilities, aren’t implemented.

If an employee loses or has their device stolen it’s important to act immediately and report the loss. Companies should have measures in place to ensure you can wipe data from a laptop, tablet or phone remotely.

Mixing personal and business use

Bringing your own device to work means mixing business with personal use is inevitable. You can’t control whether your employees decide to shop online at compromised websites or whether they will misplace a device. While you can educate heavily on security best practices, you can’t guarantee that your employees won’t loan their devices to a friend or use public wireless connections to save data.

45% use the same password for work and personal accounts – reusing passwords exposes a user’s accounts to cybercriminals, which increases the risk of identity theft as well as sensitive data theft from their organisation. Employers must encourage employees to have strong and different passwords across their work accounts.

5 BYOD security strategies for the workplace:

  1. Implement a clear BYOD policy

A clear BYOD policy is essential for managing the risks associated with personal device use. This policy must outline the acceptable use of personal devices and guide security practices such as password protocols, approved apps and procedures in the event of device loss or theft.

  1. Multi-factor authentication (MFA) codes

Make sure you use strong passwords on smartphones, laptops, tablets, email accounts and any other devices or accounts where personal information is stored. Where possible, you should consider using multi-factor authentication. Multi-factor authentication is a security measure to make sure the right person is accessing the data. It requires at least two separate forms of identification before access is granted. For example, you use a password and a one-time code which is sent by text message.

  1. Enforce access control and monitoring

The implementation of strict access control measures and conducting regular audits ensures that only authorised individuals can access sensitive data, reducing the risk of data breaches. Monitoring access logs also enables the timely detection of suspicious activities or unauthorised access attempts, allowing for prompt response and mitigation.

  1. Regular training

A significant element of overall BYOD security is ensuring that employees are properly educated on the most common security threats and risks and given the knowledge of best practices for avoiding them. It also concerns knowledge about up-to-date practices for securely surfing the web and regularly updating the software. At the same time, employees must be trained on how to recognise and report potential security incidents affecting the organisation such as phishing attempts.

  1. Mobile device management

In case of loss or theft, a mobile device management program can enable IT departments to remotely “wipe” a device to ensure sensitive information is not exposed.

As the lines between personal and professional device use continue to blur, companies must proactively address the security challenges that come with BYOD environments. While personal devices offer flexibility and convenience, they also introduce vulnerabilities that can put sensitive company data at risk. By implementing clear policies, enforcing robust security measures and investing in regular employee training, businesses can reduce these risks. Ultimately, creating a secure, digital space is a shared responsibility—one that requires both employers and employees to stay vigilant and informed.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Winning with AI: How UK Fintechs Can Navigate Complexity and Lead Innovation

Rewiring the UK’s investment landscape with AI

Cyber Risk Isn’t Just IT – It’s Business Resilience

3 Comments

  1. Pingback: Essential Security Measures for Protecting Personal Devices | Practice Business

  2. Pingback: Essential Security Measures for Protecting Personal Devices | Dealer Support

  3. Pingback: Essential Security Measures for Protecting Personal Devices | Edexec

Follow SME Today on Linkedin and share all the topics you find interesting
Get £100 of free trades - ii trading account

The Newsletter

Join our mailing list for the best SME stories, handpicked and delivered direct to your inbox every two weeks!

Sign Up
Events Calendar
    • Marketing
    June 20, 2025

    Fast fashion giant Shein accused of “dark marketing” – what does it mean for businesses?

    June 16, 2025

    “My business almost died, twice – here’s how I saved it”

    • Finance
    June 20, 2025

    Finance Founder Celebrates Business Milestone With Advice For Entrepreneurs

    June 20, 2025

    Why GDP Growth Isn’t the Full Story for UK Businesses

    • Health & Safety
    January 29, 2025

    UK takeaways guilty of shocking hygiene failures:

    December 18, 2024

    Comment on Covid Corruption Commissioner Investigation

    • Events
    June 19, 2025

    Windsor Expo Wows: A Showcase of Success, Innovation, and Local Business!

    May 27, 2025

    Jose Ucar Confirmed for Leadership Live 2025 Speaker Line-Up

    • Community
    June 2, 2025

    National Charity Accelerates Children’s Reading Through New Corporate Partnership

    May 14, 2025

    Social care experts launch an online marketplace to disrupt a sector in crisis.

    • Food & Drink
    June 16, 2025

    Hospitality industry risks collapse

    June 4, 2025

    Creative Nature Launches Its First-Ever Kids’ Snack Bar Range in Tesco Nationwide

    • Books
    April 24, 2025

    Values-Driven Professionalism: A Path to Client Loyalty

    December 2, 2024

    Banish the banshee boss: how to lead without fear – addressing the issue of fear-based management and how NOT to be this manager

    About

    SME Today is published by the same team who deliver The Great British Expos’. We have been organising various corporate events for the last 10 years, with a strong track record of producing well managed and attended business events across the UK.

    Join Our Mailing List

    Receive the latest news and updates from SMEToday.
    Read our Latest Newsletter:


    Sign Up
    X (Twitter) YouTube LinkedIn
    Most Recent Posts
    June 20, 2025

    Finance Founder Celebrates Business Milestone With Advice For Entrepreneurs

    June 20, 2025

    Fast fashion giant Shein accused of “dark marketing” – what does it mean for businesses?

    June 20, 2025

    Why GDP Growth Isn’t the Full Story for UK Businesses

    June 19, 2025

    Windsor Expo Wows: A Showcase of Success, Innovation, and Local Business!

    June 19, 2025

    Women aren’t risk-averse, they’re risk smart

    Categories
    • Books
    • Community & Charity
    • Education and Training
    • Environment
    • Events
    • Features
    • Finance
    • Food and Drink
    • Health & Safety
    • HR & Recruitment
    • In Profile
    • Legal
    • Marketing
    • News
    • Property & Development
    • Sponsored Content
    • Technology
    • Transport & Tourism
    • Wellbeing & Mental Health

    Copyright © 2020 SME Today.

    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Privacy
    • Contact
    Copyright © 2025 SME Today.
    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Privacy
    • Contact

    Type above and press Enter to search. Press Esc to cancel.