Personal devices pose risks at work



By Rose de la Cruz


The policy of some companies allowing employees to use their personal devices at work—from business calls made on personal phones to corporate network connections on home laptops, pose risks for the company.


Such practice is generally beneficial, however, especially in small companies: The employee is already familiar with the device, and the company saves money. The downside, however, is that the practice creates additional cyber risks for the business.


Personal devices at work — the new normal under the organization’s Bring Your Own Device (BYOD) policy-- has been steadily rising over the past few years.


Kaspersky cited a study last year by Oxford Economics for Samsung which found that mobile devices form an integral part of the business processes of 75 percent of companies. Moreover, only 17 percent of employers prefer to supply their entire staff with corporate phones. The others all allow the use of personal devices at work to some extent.

Should the protection of personal devices be entrusted to their owners?
Whereas corporate servers and workstations are generally reliably protected, the personal laptops, smartphones, and tablets of managers and employees do not always fall within the remit of the IT security department. Instead, it is assumed that owners are responsible for the security of their personal devices.

Such an approach plays right into the hands of cybercriminals. This is not mere hearsay or speculation: Incidents involving the theft or hacking of personal gadgets are happening all the time. Here are just a couple of glaring examples.

Device theft


In June of last year, Michigan Medicine reported a possible leak of about 870 patients’ data after an employee’s personal laptop was stolen. The data stored on the laptop was for research purposes and varied depending on the project, but the records potentially included names, birth dates, gender, diagnoses, and other confidential, treatment-related information.

Hacking a home computer

Whether that thief used the data from the stolen laptop is not known, but clients of the cryptocurrency exchange Bithumb were left in little doubt following a separate incident. Cybercriminals broke into the home computer of an employee and siphoned off information about the wallets of 32,000 users of the service. As a result, the miscreants were able to withdraw hundreds of thousands of dollars from Bithumb client accounts.

The exchange promised to compensate the victims out of its own pocket, but clients still filed a class action lawsuit against Bithumb for disclosure of personal information and related financial losses.

BYOD & security policy

It is not enough simply to allow employees to use their own devices and think your company now has a BYOD policy. By allowing the use of personal phones or laptops to store and use work-related information, you accept certain risks.


To reduce the chances of suffering financial or reputational damage, or both, we recommend following a few tips:


·         Hold regular security awareness courses on the latest cyberthreats. Employees need to understand the risks involved when using personal devices at and for work.

·         Ensure all gadgets with access to corporate networks and data have a security solution installed — ideally, one managed by a corporate administrator. If that is not possible, advise employees to install a home security solution at the very least. Do not grant access to unprotected devices.

·         Ensure all confidential information on such smartphones, tablets, and laptops is stored in encrypted form. Modern mobile operating systems let users encrypt the entire phone or tablet.


For reliable data encryption, use Kaspersky Small Office Security. That way, even if the device gets lost or stolen, the solution will prevent outsiders from gaining access to important data.


Kaspersky Small Office Security is tailored to meet the needs of small companies. For one thing, the solution requires no special skills or training on the part of administrators. Anyone can manage the Web-based control panel. At the same time, the security suite provides robust protection for both computers and mobile devices.


Like us in Facebook


Latest News

Bankers project 6 to 7 percent growth in next 2 years

  By Rose de la Cruz   Despite global uncertainties, the local banking industry projects gross domestic product to grow between 6 and 7 percent in... Read More...
BSP closes 2 small local banks

    By Rose de la Cruz   Two small banks were closed by the Monetary Board, the policy-making body of the Bangko Sentral ng Pilipinas recently.... Read More...
Bong still unsure of Senate run

Should he stay or should he go?  This is the question that Special Assistant to the President Christopher “Bong” Go is trying to answer and... Read More...
IMAGE In the know: Solar Philippines

Solar Philippines is currently the country’s – and Southeast Asia’s – largest solar-energy company. Founded in August 2013 by Leandro... Read More...
Stupid Name Giver and Other Laughs

Stupid Name Giver Late one night, a burglar broke into a house. While he was sneaking around he heard a voice say, "Jesús is watching you."  He... Read More...
Confession Code and other laughs

Confession Code AN old priest who became sick of all the people in his parish who kept confessing to adultery said one Sunday, in the pulpit,"If I... Read More...

Photo courtesy of Top Gear Philippines Officials of motorcycle-sharing service company Angkas must be grinning all the way to the bank. After a... Read More...

MABUTI naman at tuluyan ng nagpasiya ang pamahalaan na sampahan ng karampatang kaso ang mga sangkot sa kontrobersyal na Dengvaxia anti-dengue... Read More...

Our Guests

This week6287
This month12850

Visitor Info

  • Your IP:

Who Is Online


Sunday, 15 December 2019
© 2016 OpinYon News Magazine Online. All Rights Reserved.

Please publish modules in offcanvas position.