PERSONAL DEVICES (BYOD):
According to recent statistics, it is estimated that 9 out of 10 people also use personal devices at work. Whether by using USB sticks at home, checking business email on a cell phone, tablet or personal computer, or even connecting the device via cable to the work computer to transfer data or simply charge the battery.
But are we really aware of the risks of these daily habits?
It is not common for people in our domestic or personal use of new technologies to apply technical security measures (antivirus and firewall) to ensure that our devices are protected against possible cyber-attacks. Therefore, in the workplace, the use of personal devices for professional purposes should be totally prohibited, unless expressly authorized by the company, either because it is an occasional use or because an internal BYOD (Bring your own device) policy has been approved or is reflected in any other equivalent.
This is because if in our personal device (USB, mobile, tablet, etc.) we had a virus, for example, when we connect it to any technology of the company or entity (email consultation, cable connection, etc.) we could infect the computer systems of the company or entity and create a serious problem for the continuity of the professional activity.
When in doubt, it is always preferable to ask the IT Department or the CISO internally whether the use and connection of personal devices is allowed or not.
For those of you who are authorized to use it, here are some tips to keep in mind:
- Install the protection applications (EPP) recommended by the IT Department (antivirus, firewall, etc.). Whether it is for professional or personal use.
- Check with the technical team that the two-factor authentication measures configured in some applications, such as e-mail, are working correctly.
- Ensure that we have an access lock to the cell phone (PIN, fingerprint, faceprint or similar). (PIN, fingerprint, faceprint or similar).
- Lock the different applications available with a password or fingerprint. available with password or fingerprint.
- Manage privacy permissions of applications (to avoid uncontrolled tracking).
- Use in all our connections only secure and reliable WIFI networks, never the open or free ones in public places (airports, train stations, etc.) that do not require a password or registration.
- Disable the sending of recurring statistics and reports to Android, Apple or to Android, Apple or various companies of installed apps.
- Update the phone system and applications on a regular basis. on a regular basis.
- Encourage direct and transparent communication with the IT support team.
IMPORTANT NOTE: If we suspect that an incident has occurred for this reason, whether personal or professional, we must alert the IT Department, the Chief Security Officer (CISO), the Data Protection Officer (DPO) and the direct superior in the professional environment so that they can advise and help us as soon as possible.
*Shipment date: February 17, 2025

