ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: ME022
  • Created: 13th September 2024
  • Updated: 13th September 2024
  • Contributor: Ismael Briones-Vilar

Bring Your Own Device (BYOD)

An organization has a Bring Your Own Device (BYOD) policy, where a subject is authorized to connect personally owned devices—such as smartphones, tablets, or laptops—to organizational resources. These resources include corporate networks, cloud applications, and on-premises systems that may handle confidential and/or sensitive information.

 

The use of personal devices in a corporate environment introduces several risks, as these devices may lack the same level of security controls and monitoring as organization-owned equipment.