Lots of companies allow the workforce to use personal computers. The bring-your-own-device or BYOD model is appealing because it reduces the IT Operations costs, and it allows employees to use the systems they’re most comfortable with. Unfortunately, BYOD also presents a security risk. Is it worth it? Let’s discuss.
Left totally unchecked, a company of even moderate size must assume that their employees are working from compromised machines. Criminals have compromised tens of millions of computers for financial crime, botnets, or other nefarious reasons. The US Government’s FBI reports more than 800k annual complaints. One of the leading categories is Tech Support Fraud. Active hacking aside, employees may download and install malware themselves through online marketplaces and forums.
Once a personal computer is compromised, an investigator must operate under the assumption that the unauthorized user had access to everything the employee did on that machine. Attempting to prove that the attacker had limited access would be a difficult, if not infeasible, task, given that forensic investigators typically have to review drives from every compromised computer as part of a comprehensive investigation.
Even if the employee doesn’t see sensitive information, these compromised devices are gateways for cybercriminals to infiltrate the company's network by exploring the environment, discovering other potentially vulnerable machines, or creating malicious software and leaving it for someone with higher privileges to execute.
Even if the compromised computer didn’t have access to ANY files, file shares, other computers, it still serves as a cyber risk as the attacker can simply misbehave as if they were an employee! One example might be emailing customers telling them they should send payment to a new bank account.
The attacker’s playbook is simple. Once they pop one machine, they’ll look for others. A company’s computers networked together making it easier to move across the enterprise. Some examples would include emailing malicious files or uploading malware to shared drives. Ideally, the attacker finds their way into company servers, computers with access to cloud administrator or other higher value targets sensitive.
Turns out, a lot of people. Your internet connected device is accessible to billions of people. Even one bad apple in a million leaves thousands of motivated and capable threat actors. Although motivations are as diverse as the unmanaged operating systems used by the average consumer, three primary motivations stand out:
Here are a few publicly available examples of the risk associated with unmanaged mobile computers.
The level of protection depends on your business’ unique situation, including its susceptibility to attacks, position in the marketplace, tolerance for accepting risk and regulatory influence like compliance with FedRAMP or HITRUST.
Good - Access Restriction and Education
Prevent employees from accessing sensitive data and systems. This approach keeps things simple: if employees don't interact directly with sensitive IT, the risk of compromise through their personal devices is minimized. Regularly train employees about risks associated with accessing data.
Better - Zero Trust Architecture
Adopt a zero trust approach where no device or user is inherently trusted. Every access request is fully authenticated, authorized, and encrypted before granting access, ensuring that all interactions with company data and networks follow the principle of "never trust, always verify."
Best - Managed Company Devices with Zero Trust
Equip employees with standardized, monitored, and regularly updated devices. These managed devices, when combined with the zero trust philosophy, offer a robust defense. Managed devices and zero trust architecture work in tandem to amplify security: the inherent safeguards of standardized devices integrate with stringent access controls, establishing a solid defense against potential threats.
BYOD's cost savings and convenience are tempting, but the risk of compromised employee computers is real. Once a personal computer is breached, data leaks are highly likely. We can also be certain that, given enough unmanaged machines, at least one will be breached. Ready to secure your organization? Let our experts guide you to a safer, more efficient future.
If you are looking to bolster your organization’s security or achieve compliance, RISCPoint has advanced services tailored to your needs. Our certified cyber security professionals have successfully supported companies across a wide range of industries and sizes, from Fortune 10 to pre-Series A startups. To learn more, visit riscpoint.com/contact or call 1-888-320-1327.
Subscribe to our newsletter and get the latest cybersecurity insights, updates, and event invitations delivered straight to your inbox. Join our community and empower your security journey with RISCPoint's expert knowledge.
Join our newsletter for updates. Terms.