Insider Threat and BYOD (pt.6)

It has been a couple of weeks – I have been working on a couple of IT and Cyber Security Audits – but today we are back to looking at small organisations and the insider threat and Bring Your Own Device (BYOD).

The Insider Threat and Bring Your Own Device (BYOD)

We have been discussing various aspects of the insider threat, particularly as it applies to smaller organisations that cannot afford to simply throw money at the risks. Making the life of the malicious insider easier and allowing them to use their own equipment to access and process your organisation’s information is one of those risks that need to be faced.

The Easy Answer

Do not allow anyone to use their own devices.

The Real World

Are you going to supply phones to all your people so they can keep up with their email and Teams messages?

Some of the Answer!

I have been writing about how you can make BYOD work for you in a secure – if not perfect – way over on Smart Thinking. Rather than simply re-write all that material here, I have posted the links here for you.

BYOD Bring-Your-Own-Device – A Primer (pt.1)

BYOD – Where do you start? (pt.2)

A Real-World Example – BYOD A Primer (pt.3)

Your BYOD Policy – Where do you start? (pt.4)

Your BYOD Policy – What? (pt.5)

Your BYOD Policy – Keeping the Paperwork Straight (pt.6)

BYOD You can make it work.

If you have read the above, then you can see how a working BYOD policy that your team buys into will help mitigate the malicious insider risk.

Sorry again it is not perfect mitigation, but by creating the right work environment you are helping discourage the threats. However, if you really have any doubts, then do not trust that person and buy them hardware that you control and that can be secured.

Next…

We are going to finish this series with a look at the paperwork!


Clive Catton MSc (Cyber Security) – 
by-line and other articles

The Insider Threat Primer

The Insider threat – Not just a question of trust. (pt.1) – CyberAwake

The Insider threat – Start thinking about sorting. (pt.2) – CyberAwake

The Insider Threat – Mitigation. (pt.3) – CyberAwake

The Insider Threat – An Investment. (pt.4) – CyberAwake

The Insider Threat – Careless (pt.5) – CyberAwake

Photo by Lisa Fotios