top of page

Can Using One Device for Everything Compromise Them All?

Internet scams containing ransomware or other malware that downloads onto an employee device could prove disastrous for both them and their company, costing hundreds of thousands to clean up after. Mixing in the fact that personal devices or accessing personal information on a corporate device like your personal mail account, social media and eCommerce site can be an easy way for attackers to gain entry. When this is done on a companies device this not only can compromise you, just like it would on your personal device, but they then can access to your organizations infrastructure.

Unprotected Personal Computing

Of course, mixing business with personal computing can pose both personal and company-wide risks. On mobile devices for instance, mixing can open up sensitive business data such as electronic protected health information to the wrong hands and lead to breaches in security or data loss; also due to lacking the same protection and infrastructure standards found within managed corporate systems they become even more susceptible to attack.

Personal devices tend to have less secure operating systems that are vulnerable to malware and other attacks, and are frequently shared among family and friends, increasing the chance for unintended data transfer between devices. They also frequently lack hardened password protection or Multi-Factor Authentication and can easily be accessed by unapproved individuals; furthermore, it is difficult for companies to track a personal device and the data it contains before and after it leaves its possession of an employee.

Personal computers contain many programs that go beyond work-related software; these may include malicious scripts and downloads of malware or viruses as well as wireless access that allows attackers to gain entry and transmit sensitive data.

These risks can be mitigated with appropriate device management tools like Microsoft Intune that limit what apps can be installed onto personal devices and ensure only approved apps are installed on them. Unfortunately, employees often do not understand how their cyber hygiene or password habits may impede security on personal devices they own, leading them to disregard cyber security policies and take unnecessary risks with their personal devices.

Zero Trust with a User who Trusts Everything

No matter how many layers of security are added to a network, everything comes down to what happens when employees log on. Zero Trust becomes essential here - it enables you to verify the identity of every user and device at the network layer before permitting access to data. Unfortunately, implementing Zero Trust requires significant changes to network architecture and infrastructure - these disruptions could slow productivity while raising risks significantly.

Idealy, user devices should be registered in a Device Management (MDM) program so you know which ones are in your network and whether or not they meet security standards of your organization. This is especially essential for BYOD devices which often go unmanaged and may not receive updates for software and security patches as needed.

Once in the hands of someone with bad intentions, your device could quickly be used for malicious ends. One such malicious use would be USB Killers: they appear as ordinary thumb drives but when connected they send powerful surges through to destroy both it and any information stored on it.

Even with all of your security controls in place for devices and users on your network, hackers still pose a significant threat. They could exploit any misconfiguration, breach your perimeter defenses or pay insiders bribes to access sensitive data and systems. Zero Trust monitoring involves keeping an eye on data activity for potential breaches that might cripple an organization before becoming significant breaches themselves.

Zero Trust may seem complex, but with the right technology partner it doesn't have to be complex. A solutions based partner like Asylum Technologies can assist in implementing Zero Trust without needing an extensive network overhaul. Their Zero Trust PAM platform analyses contextual-based signals in order to assess risk and make dynamic access control decisions; geography, device type and IP addresses are taken into consideration for providing an in-depth view of any environment - which is crucial when it comes to understanding risks posed to data.

3 views0 comments

Recent Posts

See All


bottom of page