Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Why hybrid workforces should reconsider BYOD

By Nathan Hill-Haimes
Employee works from home
November 1, 2021

With so many businesses successfully instituting work from home policies during the pandemic, it’s reasonable to think that this way of working could be here to stay. 

While that’s great for employees with flexible working and less stress, it does pose a challenge to information technology (IT) departments and business owners. With remote working come greater risks to the security of company information and intellectual property.

So what are the risks, and what can be done about them?

The threat from phishing scams, viruses, ransomware and other malware is still very real and, with more people than ever working remotely, there are more opportunities for cybercriminals to attack.

Employees may be working from home, using domestic broadband with an unsecured router, and could be routinely hopping between personal use and business use on their personal device, leaving far more chance that they might click on something they shouldn’t, either due to distraction or because of the lack of security compared to what’s available when working on the company’s premises.

This is also a problem if staff either choose to work from a public location, like a coffee shop, or they have to because they are travelling for work. Public Wi-Fi, even with a password for access, is much easier for hackers to attack and be able to listen in on what an employee is doing.

A further problem with working in public spaces is that criminals have the chance to overhear video chats or look at laptop screens, with the possibility of them seeing sensitive data or being able to steal passwords.

Why hybrid workforces should reconsider Bring Your Own Device (BYOD)

Letting employees use their own devices sounds like a great solution at first glance. However, as noted above, public Wi-Fi and home routers may not be as secure as a properly configured IT system on a company’s premises. This option reduces cybersecurity and gives criminals far more chances to attack, whether that’s by sending phishing emails that wouldn’t normally get through on the company’s network or stealing sensitive data.

Employees will, of course, use their own device for personal use too, including browsing the internet and potentially clicking on malicious links. Children and other family members or guests may be allowed to use the family computer and, again, could click on something they shouldn’t, or they may be able to see sensitive company information. 

If employees work part-time remotely or travel to other branches of the company, they are then taking that possibly infected device with them and connecting it to their company’s network. It’s a far better option to offer secure, company-owned laptops and mobiles that are only to be used for work purposes.

Considerations when migrating to cloud computing

When security leaders consider moving to cloud computing, it’s important to research which option will be best for the company. Will it offer data protection and security to the necessary standard? How much control does the user have over security and access options? Can cloud computing options and storage grow as the company grows and needs change? Are there regulatory considerations? Is accessibility good enough for staff and, if needed, for customers?

If something goes wrong, can the user access help quickly enough and is the help of a high enough quality? Are backups frequent and able to be restored to a particular point in time?

Cloud computing offers a lot in terms of ease of use, easy collaboration and streamlined working.

Why security leaders should take the time to educate their workforce

It’s far too easy for cybercriminals to send out phishing scams and malicious code attached to emails if employees don’t know what to look for and what to do if they do accidentally click on something. Employees should be regularly educated on email security and cybersecurity in general and kept up to date with the latest scams and phishing attempts.

It is also a good idea to discuss and enforce the use of strong passwords that are different for every application so that cybercriminals can’t easily guess passwords. This is an important step for all employees in a business, not just those working remotely.

What to consider when choosing appropriate endpoint security

Endpoint security offers many ways to protect devices and keep your data safe. Look for a platform that offers exploit and threat protection, protecting from malware, viruses and more. A good platform should also provide email security and browser protection, patch management, application block listing and, of course, data protection.

Look for a platform that offers all this and is easy to implement centrally.

How to reflect these changes in policy

To secure remote work, security leaders have to do a lot of thinking, planning and implementing of new systems. To back that up, it is best to also implement new policies for remote working, so that users know what they can and can’t do and, more importantly, why. 

Putting policies in place for allowed use of emails, passwords, the internet, remote working, approved and rejected applications and personal use guidelines will educate employees further and give them something in black and white that tells them how to work safely.

The IT Governance site, for example, offers a full remote working policy template to help security leaders get started in this regard. 

There are many benefits for staff, the enterprise and the environment to go remote, but security leaders and enterprises must take the right precautions to ensure safety and security from all angles.

KEYWORDS: Bring Your Own Device (BYOD) cloud computing services data breach endpoint security phishing attack work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

0001

Nathan Hill-Haimes is an Investor & Co-Founder at Amvia, a serial telecoms entrepreneur and inbound marketing expert. From his home in coastal North Devon, Hill-Haimes works with a portfolio of technology, property & sports investments through his fund, Croyde Bay Ventures.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why Organizations Should Care About BYOD - Security Magazine

    Why Organizations Should Still Care About BYOD

    See More
  • Home office

    3 ways hybrid workforces can benefit from a zero trust approach

    See More
  • New survey reveals insider threats more of a risk than external threat actors amid COVID-19 and race to work remotely

    Conquering security challenges in the hybrid workplace environment: The BYOD variant

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing