Home Worker Security: Using Personal IT Equipment Safely
When employees use personal devices for work, the security boundary between corporate and personal becomes blurred. This guide covers the risks of BYOD (Bring Your Own Device) in home working environments, the controls that mitigate those risks and what UK businesses are legally required to consider under UK GDPR.
Nathan Hill-Haimes
Technical Director
The BYOD Reality in UK SMEs
Many UK small businesses operate with an informal BYOD culture that pre-dates the pandemic — employees have always used personal phones to check work email or their home laptop for the occasional weekend task. COVID-19 accelerated this, and for many organisations the return to formal working arrangements left hybrid and home workers using personal devices as a default rather than an exception.
The security risks of unmanaged BYOD are material. In the 2024 Cyber Security Breaches Survey, 39% of UK businesses identified a cyber attack. Personal devices — often running outdated software, without endpoint detection tools and shared with family members — represent a significantly weaker security posture than managed corporate devices.
The Core Risks of Personal Devices for Work
Outdated Software and Unpatched Vulnerabilities
Corporate devices are typically managed through Microsoft Intune, SCCM or similar tools that push patches automatically and enforce minimum OS versions. Personal devices are patched (or not) at the discretion of the individual. A personal Windows laptop running a version behind on cumulative updates may have known critical vulnerabilities that an attacker can exploit.
Shared Devices
A home worker's personal laptop may be used by a spouse, teenager or child. Family members accessing a device that is logged into work email, cloud storage or a VPN creates obvious risks — accidental deletion, access to confidential client information, or a family member falling victim to a phishing attack using the work-connected browser profile.
No Endpoint Detection
Corporate devices typically run an endpoint detection and response (EDR) agent that monitors for suspicious activity, enforces DLP policies and can be remotely wiped if the device is lost or compromised. Personal devices typically run consumer antivirus (or nothing) with no visibility for the IT team and no remote management capability.
Data Residency on Personal Devices
When employees download files, save emails locally or cache data from cloud applications on personal devices, that data sits outside corporate control. If the employee leaves the business, the device is lost, or the device is compromised, corporate and customer data on that device may be exposed or unrecoverable.
UK GDPR Implications
Under UK GDPR, the employer (as data controller) is responsible for the security of personal data regardless of which device it resides on. If a home worker's personal device containing customer data is stolen and the device was unencrypted, the employer may have a reportable breach to the ICO — even though it was the employee's device, not a corporate device.
This creates a clear obligation for businesses to either provide managed corporate devices or implement controls that bring personal devices up to an acceptable security standard.
Controls for BYOD Home Workers
Mobile Device Management (MDM)
MDM solutions (Microsoft Intune, Jamf, SOTI) can extend management capabilities to personal devices with employee consent. The typical approach is to create a managed work profile on the device that is separate from the personal profile. The IT team can manage the work profile (remote wipe the work partition, enforce encryption, require a PIN) without accessing personal content.
Microsoft Intune is included in Microsoft 365 Business Premium (from approximately £19.70 per user per month) and supports Windows, macOS, iOS and Android devices.
VPN and Conditional Access
Rather than allowing direct access to corporate systems from personal devices, route access through a VPN that enforces minimum device compliance checks before granting access. Microsoft Entra ID (formerly Azure AD) Conditional Access can require that a device be enrolled and compliant before accessing Microsoft 365 applications — blocking access from unmanaged devices or those not meeting security requirements.
Cloud-First Applications
Where possible, keep work data in the cloud rather than allowing local downloads to personal devices. Microsoft SharePoint, Teams and OneDrive can be configured to prevent downloading of files to unmanaged devices while still allowing viewing and editing in the browser. This significantly reduces the data residency risk on personal hardware.
Multi-Factor Authentication
MFA is the single highest-impact control for protecting cloud account access from personal devices. Even if a personal device is compromised and credentials are stolen, MFA prevents attackers from accessing work systems. MFA should be enforced on all work accounts accessed from personal devices — without exception.
Acceptable Use Policy
A clear, written BYOD Acceptable Use Policy sets out what employees are permitted to do with work data on personal devices, the security requirements they must meet (up-to-date OS, no family sharing of work profiles, mandatory VPN usage), and the consequences of a breach. This policy forms part of the organisational measures required under UK GDPR Article 32.
Corporate Devices: The Cleaner Alternative
For businesses where home working is permanent rather than occasional, providing managed corporate devices is often the more practical long-term solution. The cost of a managed laptop (typically £600–£1,500 for hardware plus device management licensing) is offset by the reduction in security risk, the ability to enforce patches and policies, and the clarity of data ownership when the employee leaves.
AMVIA advises clients on both approaches — implementing robust BYOD controls where personal devices are unavoidable, and building managed device programmes for businesses making the transition to a fully managed endpoint fleet.
Are Your Remote Workers Creating Security Gaps?
AMVIA can assess how personal devices are being used in your business and implement the right combination of MDM, Conditional Access and policy controls to reduce the risk.
Frequently Asked Questions
This depends on the MDM approach used. If your employer enrols your personal device in an MDM system with a separate work profile, they can manage and monitor activity within that work profile only — they cannot access your personal apps, photos or messages. Any monitoring should be disclosed in your employment contract and BYOD policy. Employers should not monitor personal content on personal devices.
Report it to your IT department immediately. If the device was enrolled in MDM, your IT team can remotely wipe the work partition or, in the case of a corporate device, the entire device. If the device was not managed and contained work data, the employer may need to assess whether a UK GDPR personal data breach has occurred and consider ICO notification.
A VPN encrypts the network connection and prevents interception of traffic, but it does not address the device security risks: outdated software, lack of EDR, shared family access. VPN should be one control among several, not the only security measure applied to BYOD home workers. MDM device enrolment, MFA and Conditional Access policies are equally important.
Microsoft Intune is a cloud-based endpoint management platform included in Microsoft 365 Business Premium. For BYOD, it provides a managed work profile on personal devices — the IT team can enforce security policies, require device compliance checks before accessing Microsoft 365 and remotely wipe work data without touching personal content. It supports Windows, macOS, iOS and Android devices.
A BYOD Acceptable Use Policy should cover: what device types are permitted, minimum OS and patch level requirements, the requirement to enrol in MDM, acceptable use of work data on personal devices, prohibition on family sharing of work profiles, required use of VPN, responsibilities if the device is lost or stolen, and employee rights regarding privacy on enrolled devices. It should be signed by employees and reviewed annually.
Related Reading
Keeping Remote Workers Secure Post-COVID-19
How to maintain cybersecurity for permanent hybrid and remote working arrangements in the post-pandemic business environment.
UK Cybersecurity Guide for SMEs | Practical Steps
Practical cybersecurity steps for UK SMEs including endpoint management and access controls.
Data Protection & Privacy | UK GDPR Guide for Businesses
How UK GDPR obligations apply to personal data processed on employee devices, including personal data breach obligations.