• Home
  • Services
    • Cyber Security Audit
    • Penetration Testing
    • Incident Response
    • Managed Services
    • Governance & Training
  • Products
  • Blog
  • About
  • Contact
Menu
  • Home
  • Services
    • Cyber Security Audit
    • Penetration Testing
    • Incident Response
    • Managed Services
    • Governance & Training
  • Products
  • Blog
  • About
  • Contact

BYOD Policy For The COVID-19 Pandemic

If your company does not have a BYOD (Bring Your Own Device) policy specifically for the COVID-19 pandemic it’s a good idea to create one to ensure employee devices are secure when accessing company data. 

 

Recently, there has been a growing usage of mobile devices which can increase security risks from cloud applications and data being used from more locations.

 

So far, 36.5% of Australian businesses have been involved in an incident through a third-party cloud service used by their employees in the past year. When performing phishing tests for our clients, we’ve found phishing attacks are more successful on BYOD. Australian business have been hit hard with phishing attack scams since the COVID-19 pandemic started which is another reason to have a COVID-19 specific policy. 

A COID-19 Pandemic BYOD policy can include the devices your IT support, apps available to remote users, collaboration tools available, plus access restrictions in place for VPN connections and downloads of sensitive data.

We recommend your IT department set-up the work from home security controls to ensure they work properly. This is important as many smaller companies are at a higher risk of going out of business after just one data breach.

 

Implementing an effective policy now means an organisation will be more prepared for any potential crises in the future. We can help you do this. Learn more about our Working From Home Audit services. 

 

Categories

Security

Tags

PrevPreviousShould I use COVIDSafe the Australian contract tracing app?
NextHow Secure Is Your Work From Home Setup?Next
Share on facebook
Share on twitter
Share on linkedin
Share on email
Search

Recent Posts

Every 10 Minutes an Australian Small Business is Attacked

5 Cyber Security Lessons From 2020 Your Businesses Should Implement in 2021

What to do if your business is hacked

US GOVERNMENT HACKED

Is Your Business a Target?

Archives

Archives
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • February 2019
  • January 2019
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • November 2016
  • October 2016
  • May 2016

Categories

  • API
  • Attack
  • Awards
  • Defence
  • Events
  • Other
  • Press
  • Security
  • Uncategorised
Menu
  • API
  • Attack
  • Awards
  • Defence
  • Events
  • Other
  • Press
  • Security
  • Uncategorised
  • APRA
  • Audit
  • Data Breach
  • Email
  • Governance
  • Penetration Testing
  • Process
  • Training
Menu
  • APRA
  • Audit
  • Data Breach
  • Email
  • Governance
  • Penetration Testing
  • Process
  • Training

Your partner in Cyber Security.

Facebook
Twitter
Linkedin
  • About
  • Products
  • Cyber Security Audit
  • Penetration Testing
  • Incident Response
  • Managed Services
  • Governance & Training
  • Contact
Menu
  • About
  • Products
  • Cyber Security Audit
  • Penetration Testing
  • Incident Response
  • Managed Services
  • Governance & Training
  • Contact
  • Contact
  • 1300 2 CYBER (29237)

Level 4, 11 York Street Sydney NSW 2000