BYOD and Spyware: Are Employees Putting Business at Risk?
- Date:March 24, 2022
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 16 pages, 6 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Employees who access company systems from personal laptops, smartphones, and tablets put their firms’ and consumers’ intellectual property and sensitive information in danger. And the risks keep growing, not only from traditional phishing and fraud schemes, but also from new and insidious spyware campaigns that spread through subtle cracks in mobile operating systems. The risk is especially profound for financial institutions, which could increasingly be targeted by spyware campaigns aimed at crippling critical infrastructure. It’s time to cinch up bring-your-own-device (BYOD) policies that remain too lax. In fact, it’s Javelin’s view that companies’ best chance at keeping themselves, their customers, and their employees safe is to eliminate BYOD all together.
Key questions discussed in this report:
- What are the business implications of spyware that infects an employee’s personal device that is already linked to personal email accounts and sensitive corporate internal systems?
- What are the limitations of cybersecurity training for employees, particularly regarding spyware that infects devices without any action needed from the employee?
- How can companies set clear boundaries between work and personal devices that are agreeable for both employers and employees?
Companies Mentioned:
Cybersecurity & Infrastructure Security Agency, Gmail, Microsoft Authenticator, NSO Group, Okta, Pegasus, Twilio
Book a Meeting with the Author
Related content
The Understated Cyber Vulnerabilities of Wealth Management Clients
Phishing attacks remain the most pervasive and concerning for wealth clients, but cybersecurity risk as a whole is a growing worry for financial advisors, who feel increasingly ill...
The Hidden Enemy: Iran’s Cyberthreat to U.S. Banks
Disinformation is among the leading cyber risks predicted in the wake of the June 21 U.S. strikes on Iran’s nuclear program. On June 22, the Department of Homeland Security issued ...
Zero Trust Hinges on Cyber Strategy, Not Technology
Compliance will never equate to security, and zero trust will never hinge on technology. Zero trust is built and secured via a solid corporate culture and cybersecurity strategy th...
Make informed decisions in a digital financial world