Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

Find the balance between security and privacy in a BYOD world

By Patrick Harr
iPhone
September 16, 2021

Enterprise security leaders have had to rethink traditional organizational processes to remain operational during the pandemic. Organizational leaders initially accomplished this through the broader adoption of BYOD (Bring Your Own Device) practices to better enable employees to remain productive regardless of their geographic location. The rapid push toward facilitating this, however, has invariably resulted in companies sacrificing the security of user endpoint devices for increased usability in a work-from-home environment.

The statistics speak for themselves. Findings from techjury research highlight how BYOD increased in 2020:

  • 67% of employees use personal devices at work
  • BYOD generates $350 of value each year per employee
  • A BYOD-carrying employee works an extra two hours
  • 87% of businesses are dependent on their employee’s ability to access mobile business apps from their smartphone
  • 69% of IT decision-makers in the US say BYOD is a good thing
  • 59% of organizations adopted BYOD

According to a market study published by Global Industry Analysts, the global market for BYOD and enterprise mobility estimated at $61.4 billion in 2020, is projected to reach $157.3 billion by 2026. Benefits such as enhanced employee satisfaction, schedule flexibilities and increased productivity are highlighted as the key drivers behind this trend. BYOD has also contributed to organizations shifting to cloud-based applications to manage various functions and the multitude of mobile devices from a single, controlled environment.

As more employees turn to their personal devices for work, the need for solutions to better manage the remote environment will also increase. At the end of 2025, the market for these enterprise mobility management solutions is expected to reach $11.96 billion. Similarly, the market for mobile device management solutions and services is anticipated to grow to $15.7 billion by 2025.

Security challenges increase

However, as the number of endpoint devices connecting to corporate assets in the datacenter grow, so too does the attack surface. And cybercriminals, as always, have quickly figured out new ways to capitalize on the daily information security challenges faced by organizations in this environment.

In fact, only 41% of businesses have complete control over the files being shared by users in enterprise messaging apps on mobile devices. The research further highlights that only 9% of companies have the tools to detect malware in these apps. And even though 42% of organizations indicated they use endpoint malware protection for BYOD security, this does not account for one of the most dangerous attack vectors in the market today – that of human hacking and social engineering.

Therefore, it should come as no surprise that, according to data from Verizon, the average cost of a successful data breach at U.S. businesses over the past 16 months increased to almost $22,000 per incident. But perhaps more significantly, nearly 85% of those breaches relied on social engineering. This reflects how adept vendors have become at detecting malware, resulting in a decline in these types of vulnerabilities.

Of course, organizations must still deploy endpoint anti-virus or NextGen AV solutions. But these are focused on malware protection and do not account for the evolution of phishing that incorporates more sophisticated social engineering tactics. So, even though personal devices will also remain a target, especially in a work-from-home environment where they sit outside the relative safety of corporate infrastructure and defensive measures, the threat landscape is now more focused on human hacking.

Bypassing defenses

To this end, threat actors are continuously identifying unique ways to bypass automated defenses and cybersecurity training. For example, attackers can use the publicly available APIs of a business to dynamically fetch the look and feel of an organization's customized Microsoft 365 login page. So, when a user clicks on a malicious URL, the first request goes to the Microsoft page, where attackers pull the screenshot and logos from the original account. This fools the automated defenses by providing a 100% accurate comparison between the real and fake sites and establishes a sense of trust with the users who are familiar with the company's login page.

Another method used is to embed phishing links into PDF documents uploaded to popular cloud platforms like Google Drive, Dropbox, or Adobe Spark. Once the user reads the document and clicks on the link, the actual phishing page will open. Because this happens at a domain level and it is challenging to extract phishing text from a PDF document, this can also fool automated systems and users.

Online forms like Google Forms or Survey Monkey also provide ways for attackers to bypass these defenses because these forms can mask phishing attacks. For instance, a form can be set up to look like a standard IT support page requesting the user to change their password due to the potential of a security breach. The user will then be asked for their original password and the new password, providing attackers with the information needed to compromise the system.

Device protection

Significantly for the BYOD environment, most mobile devices have no special security protection other than the features natively built into the operating system. This is exacerbated by the fact that browsing protection on these devices is a fraction of the protection available on desktop browsers. And while malicious mobile malware is still rare, mobile phishing is rampant.

Adding to the complexity of the cybersecurity footprint required to manage BYOD, phishing is no longer limited to just emails. Smishing (text messages) and vishing (phone calls) are becoming increasingly popular. And then there are the dangers of social networks like Facebook, LinkedIn, and Instagram, where phishing scams have become more advanced. This is thanks to how malicious users have adopted artificial intelligence (AI) technology to mine user profiles for personal information to launch target spear phishing attacks that are becoming increasingly difficult to identify even to the most well-trained person.

Recently, 700 million LinkedIn records were leaked to add to the 500 million profiles put up for sale on a popular hacking forum earlier this year. And even though LinkedIn stated that the most recent issue was attributed to data being scraped and not a breach, the situation highlights how significant social network compromises have become.

Increasingly, phishing campaigns are launched using legitimate cloud services like Google, Dropbox, or SharePoint. With organizations having those services whitelisted, a phishing page hosted on legitimate infrastructure can bypass security and user training that teaches people to look for suspicious domains. With threats coming from these legitimate cloud services and compromised accounts, it is impossible for ordinary people to identify a potential attack accurately regardless of their cybersecurity training.

Mitigating the risk

Given the growth of BYOD over the past year or so, security professionals must review their current endpoint security strategies. Security questions must ask questions, such as: does each user device have cybersecurity software installed, do employees have access to ongoing cybersecurity training, and how organizations can best balance the need to maintain a strict security environment while not compromising on the personal data of employees reliant on their personal devices for work.

In addition to having security on devices – the new endpoint in any network – it is important to inform employees about the breadth and sophistication of today’s human hacking attacks. We know that people are the weakest link of the security process, with human error inevitably resulting in a compromise. Alerting employees that attacks are near common and on all communications and collaboration channels, including SMS text and social media, can be one more step to help avoid the potential of these breaches happening.

However, there is no one sure-proof way of shoring up corporate defenses to disperse over a wide geographic footprint. Because the velocity of malware and phishing attacks is so high, organizations will need multiple defenses that combine various techniques. The best defense is a layered one that incorporates cybersecurity software, security at the endpoints of all networks, including mobile devices, and user training. But more than that, companies must adopt AI and machine learning (ML) to further strengthen their BYOD environments.

Realistically, the human resources requirements needed to defend against the growing number of automated attacks manually are almost impossible to meet. Companies must fight the proverbial fire with fire as BYOD becomes the new battlefield. By combining existing cybersecurity approaches with AI and ML algorithms, business gain access to automated analysis that understand what makes an application, extension, Web page, and spoofed page malicious.

No lockdown

Of course, this does not mean that organizations can exfiltrate personal data from employee’s personal devices. Endpoint Protection can be used to drive privacy and security while continuing with the BYOD approach. This means that the business has complete visibility of the threat landscape without compromising its employees' privacy. By not having data leave the device, the company cannot see, for example, the browsing behavior of the user.

In the end, the best way to guarantee privacy while delivering the level of protection needed is to do so on the device itself. By focusing on the infection and not on having personal data transmitted back to the corporate environment, an organization can get the best of both worlds. An effective BYOD environment where productivity is enabled while still being as secure as possible without compromising employee experience.

KEYWORDS: Bring Your Own Device (BYOD) cybercriminal employee security hacking remote work workplace security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As CEO of SlashNext, Patrick Harr directs a workforce of security professionals focused on protecting people and organizations from phishing anywhere. Before SlashNext, Harr was CEO of Panzura, which he transformed into a SaaS company, grew ACV 400%, and led to successful acquisition in 2020. He has held senior executive and GM positions at Hewlett-Packard Enterprise, VMware, BlueCoat and was CEO of multiple security and storage start-ups, including Nirvanix (acquired by Oracle), Preventsys (acquired by McAfee), and Sanera (acquired by McDATA).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • privacy-access-freepik

    Considering the consumer privacy conundrum in a data-filled digital world

    See More
  • Cyber data breach

    Online Privacy During a Pandemic: New Challenges in a New World

    See More
  • New survey reveals insider threats more of a risk than external threat actors amid COVID-19 and race to work remotely

    Conquering security challenges in the hybrid workplace environment: The BYOD variant

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!