flagged
Device Security28 January 2025 · 6 min read

BYOD: The Cyber Security Risks Every Business Needs to Know

Letting staff use personal devices for work is convenient — but risky. Learn how to manage BYOD safely in your Australian small business.


The Convenience Trap

Letting your team use their personal smartphones, laptops, and tablets for work makes sense on the surface. It saves money on hardware, staff already know how to use their own devices, and it supports flexible working arrangements. But Bring Your Own Device (BYOD) policies come with real cyber security risks that many Australian small businesses haven't fully thought through.

When a personal device accesses your business email, customer data, or cloud systems, your business data is now sitting on a device you don't control — one that might have weak passwords, outdated software, or apps that leak data in the background.

What Are the Actual Risks?

Understanding the specific risks helps you address them. The main concerns with BYOD are:

Mixing personal and business data

On a personal device, business emails sit alongside personal photos, shopping apps, and social media. If the device is compromised through a dodgy personal app or a phishing link clicked during personal browsing, your business data can be caught in the crossfire.

Inconsistent security standards

You can mandate security settings on company-owned devices. On personal devices, you're largely dependent on the employee's own habits. Some might use a six-digit PIN. Others might have no screen lock at all. Software updates might be ignored for months.

Staff turnover and offboarding

When an employee leaves your business, you need to ensure they no longer have access to your systems and data. On a company device, you can wipe it. On a personal device, revoking access is more complex and easy to overlook.

Lost or stolen devices

Personal devices get left in taxis, stolen from bags, and lost at events. If a personal phone with access to your business email is stolen and lacks proper protection, your data goes with it.

Unsecured home and public networks

Personal devices are routinely connected to home WiFi networks and public hotspots — networks with no business-grade security controls. Data transmitted over these connections can be intercepted if it's not properly encrypted.

Building a BYOD Policy That Actually Works

A BYOD policy doesn't have to be a lengthy legal document. For a small business, a clear, readable one-page policy that staff actually understand is far more valuable than a 20-page document nobody reads.

Your BYOD policy should cover:

  • Which devices are permitted — smartphones, tablets, laptops, or all of the above
  • Minimum security requirements — screen lock, up-to-date OS, passcode length
  • What business systems can be accessed from personal devices
  • Acceptable use rules — what staff can and can't do on personal devices used for work
  • What happens when a device is lost or the employee leaves
  • Your right to remotely wipe business data from the device (with clear communication about what this means)

Get staff to sign and acknowledge the policy. This isn't just about legal protection — it's about making sure everyone understands the expectations.

Technical Controls You Should Put in Place

Policy alone isn't enough. Pair it with practical technical measures:

Require MFA on all business accounts

Multi-factor authentication (MFA) means that even if a personal device is compromised and someone obtains login credentials, they still can't access your business accounts without a second verification step. Enable MFA on your email platform, accounting software, cloud storage, and any other business systems accessed from personal devices.

Use a Mobile Device Management (MDM) solution

MDM tools like Microsoft Intune or Jamf Now can manage the business side of personal devices separately from personal data. Many MDM platforms support a concept called "containerisation" — your business apps and data live in a separate, encrypted container on the personal device. If the employee leaves, you can wipe only the business container without touching their personal data. This addresses a major privacy and practicality concern with BYOD management.

Enforce minimum OS version requirements

Set a policy that personal devices must be running a supported, up-to-date operating system to access business systems. Older OS versions have known vulnerabilities that attackers actively exploit.

Use a business VPN for sensitive access

If staff regularly access sensitive business systems from personal devices, a VPN (Virtual Private Network) encrypts the connection between their device and your systems, protecting data in transit even on unsecured home or public networks.

Offboarding Is Critical

When an employee leaves — voluntarily or otherwise — you need a checklist for revoking device access. This should include:

  1. Revoking access to business email accounts
  2. Removing the employee from cloud collaboration tools (Google Workspace, Microsoft 365, etc.)
  3. Changing any shared passwords the employee had access to
  4. Using MDM to wipe the business data container from their personal device
  5. Revoking MFA tokens and sessions

This process should happen on the employee's last day — not weeks later when it's been forgotten about.

Is BYOD Worth It?

For many small businesses, BYOD makes good practical and financial sense. The risks are manageable if you put the right policies and controls in place. The worst outcome is having no policy at all — staff using personal devices however they see fit, with no oversight and no plan for when something goes wrong.

With a clear BYOD policy, MFA on all accounts, and ideally an MDM solution, you can capture most of the convenience benefits while keeping your business data safe.

Key Takeaways

  • BYOD creates real risks including mixed data, inconsistent security, and difficult offboarding
  • A clear, readable BYOD policy is the foundation — get staff to sign and acknowledge it
  • MFA on all business accounts is non-negotiable when personal devices are used for work
  • MDM tools can containerise business data on personal devices, making management and offboarding simpler
  • Have a formal offboarding checklist that revokes device access on an employee's last day

Want to understand how your current approach to device security measures up? The free risk assessment at flagged.com.au helps Australian small businesses identify gaps in their device and access security — no technical knowledge required.

Tags

BYODdevice securitymobile securitysmall businesspolicy