Security Behaviour Database
/
All Behaviours > SB198 Does not use unapproved device for work purposes

SB198 Does not use unapproved device for work purposes

Using unapproved devices for work purposes increases security risks. This could be for a variety of reasons including things such as the absence of effective security controls or malware protection. Unapproved devices are also less likely to be set up in such a way that makes it easy for security teams can manage risk to you or your organisation in the event of a cyber attack.


Why is it important?

Using unapproved devices for work activity negates the security controls and protections that are in place on company-approved devices. With unapproved devices, risk increases alongside the inability for security teams to respond to security incidents.

Priority Tier

Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Tier 1

Risk Mitigated

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Leak

Data Leak

A data leak is when data is accidentally or intentionally disclosed to unauthorised people.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Further reading

https://www.core.co.uk/blog/byod-effect-security-risks-personal-devices-work
https://www.zdnet.com/article/stop-using-your-work-laptop-or-phone-for-personal-stuff-because-i-know-you-are/

SebDB is brought to you byCybSafe| © 2023 CybSafe Ltd