top of page
Writer's pictureJames Consulting

And left to my own devices......




Having helped organisations navigate through the challenges caused by the pandemic, remote work (which later evolved into hybrid work) has solidified its enduring presence.


As the lines between work and home continue to blur, many individuals not only desire but also require access to work resources from any location, at any time, and on any device – leading to the use of personal devices for work purposes and accessing corporate data.


On the other hand, utilising personal devices for work, whether exclusively or in conjunction with employer-provided devices, introduces heightened cybersecurity risks, especially without robust security practices and precautions.


While concerns regarding bring-your-own-device (BYOD) setups are not new, the increased reliance on personal devices for work has revitalized the challenges of securing corporate data, prompting a reevaluation and adjustment of existing policies to adapt to the changing work landscape.


So, how can employees and organizations mitigate the cybersecurity risks associated with employee-owned devices and prevent compromising corporate and customer data? While there is no one-size-fits-all solution, implementing a few measures can significantly protect companies from harm.


Minimize the Corporate Attack Surface

Employee use of devices beyond IT oversight poses a significant threat to corporate data. In an environment where malicious actors constantly seek vulnerabilities in companies' defences, reducing the number of potential entry points is crucial. Therefore, organizations must inventory all devices accessing their networks, and establish security standards and configurations for employee devices to meet a baseline protection level.


Unapproved apps or software on employee-owned devices pose a common risk, contributing to the broader issue of shadow IT compromising corporate data and systems' integrity, availability, and confidentiality.


To prevent unauthorized access to sensitive data, organizations can create a separation between personal and work-related information on devices, enforce application blacklisting or whitelisting controls, and leverage mobile device management software.





Keep Software and Operating Systems Updated

Timely installation of security updates to address known vulnerabilities is critical, given the continuous discovery of new vulnerabilities in widely used software. Ensuring employees work on updated devices is more straightforward with company-issued laptops and smartphones, supported by the IT department that promptly installs software updates.


Employing device management software can further enhance security by facilitating update installations and overall security enhancements.


If employees are responsible for updating their devices, organizations should remind them of available patches, provide guidance on applying updates, and monitor progress diligently.


Establish a Secure Connection

When remote employees need to access the organization's network, using properly configured virtual private networks (VPNs) can reduce exposure to vulnerabilities that cybercriminals might exploit.


Remote Desktop Protocol (RDP) is another method for remote connectivity but requires proper configuration to prevent attacks. Implementing measures such as disabling internet-facing RDP and enforcing strong passwords can enhance security.


Protecting what is important

Storing confidential corporate data on personal devices without adequate protection poses risks, especially if the device is lost or stolen.


Implementing strong password protection, auto-locking features, and educating employees on device security measures can safeguard company data. Encrypting sensitive data in transit and at rest, implementing multi-factor authentication, and securing network connections are essential to prevent unauthorized access to confidential information.





Secure Videoconferencing

As videoconferencing services surged during the pandemic, organisations should establish guidelines for secure usage, including selecting software with robust security features like end-to-end encryption and password protection.


Regularly updating videoconferencing software is crucial to address security vulnerabilities promptly.


Software and People

Deploying reputable multilayered security software on devices with access to corporate systems is vital to prevent security breaches. Regularly backing up devices and data, providing security awareness training to staff, and ensuring compliance with security policies are crucial components of a comprehensive security strategy.



In summary, it's important that if you are working away from the office your digital devices are protected with up-to-date malware and anti-virus software to stop the issues highlighted above from happening.

1 view0 comments

Comments


bottom of page