Our Blog

Device Control: Do companies need to have full control over your devices to secure it?

Device Control​: Do companies need to have full control over your devices to secure it?

Teng Yew Ang Teng Yew Ang
Originally published on September 6, 2022
Last updated on January 28, 2025 Post a comment

Companies go the extra mile to keep their confidential data safe. They often outsource their cyber security service to a Managed Service Provider, while also having their own IT team on board to create a well-rounded defense against cyber threats.

When they have a Bring Your Own Device (BYOD) policy for their employees, there will always be issues regarding lost devices or data security. So, in cases like a lost/stolen device or if the employee leaves the company, they want to ensure that their app data will no longer exist on the device because of its sensitive nature.

But one problem with this is there can be times that an employee’s data gets deleted along with the confidential data on their computer or phone.

In the case of Microsoft, they only allow companies to do device control and remotely wipe business applications. This functionality limits a company’s control over your devices. So, in cases of stolen devices or you decide to part ways with the company, they have the functionality to wipe their business applications data and not personal data.

Many are still concerned over the “remote wipe” functionalities of companies for employees’ devices.  Although doing so is not technically against any laws, it somehow oversteps employee boundaries.

That’s why companies need to consider this kind of policy carefully, since it may also affect their data even if they aim to prevent unauthorised individuals from accessing confidential information when the employee leaves the company or their device gets stolen. But only by embracing innovative solutions - either with the help of your internal IT team or a reputable cyber security service provider - you can enhance protection without compromising user independence.

woman implementing device control management in a computer

What your employer can see on your device

It’s important to know that your employer has device control, they can’t see your actual data once they enrol your device under their Microsoft platform. However, they do see information about the device, such as its model, manufacturer, and operating system. This information will be visible to your employer’s IT team, specifically the administrators and people with sufficient access. 

Here’s a list of what your employer can see on your device:

  • Device Information
    • Owner
    • Name
    • Model
    • Serial Number
    • Manufacturer
    • Operating system and version
    • International Mobile Equipment Identity (IMEI) number
  • Work and school app inventory (for personal and corporate-owned devices)

Here’s a list of what your employer can’t see on your device:

  • Emails
  • Text messages
  • Phone numbers
  • Contacts
  • Browsing history
  • Call history
  • Photos and videos
  • Locally stored files
  • Apps
  • Calendar
  • Usernames and passwords

Higher security risks you need to consider

Devices are always at risk of theft and misplacement, whether it is personal or corporate-owned. And the risk goes up when you carry around your device in and out of the office. Lost and stolen devices are one of the primary causes of data breaches. And your data will be easily accessible through an unlocked laptop or an unencrypted external hard drive.

If a company has a BYOD policy, they have little to no device control over their employee’s devices. They have no say in who can use it, which leaves the device highly at risk of phishing and malware. They also have no device control over confidential information that gets leaked through various means.

That’s why companies implement various protection methods and policies to keep their data safe, which, according to Time Doctor, typically includes mobility, device, and application management.

device control being implemented by a man in a computer

What you can do to increase your device security

If your device gets lost, stolen, or held for ransom, your data is as much vulnerable as your employers. And you and your organisation should have these device control solutions in place to secure your and your employer’s data.

1. Use long and unique passwords

One of the best ways to prevent anyone from gaining access to your computer or accounts is to use long and unique passwords throughout your devices.

If you are someone who has trouble remembering passwords (especially long and complicated ones), you can always use the help of a password manager to secure all your passwords for you.

2. Routinely backup your data

It’s not just companies who are liable for data loss, so are you. And to prevent that from happening (whether you were hacked, or your data got included in your employer’s “remote wipe” policy), you need a reliable backup strategy where you can quickly restore your files and data without issue.

3. Use anti-virus software

Just because you’re not using a company-owned device doesn’t mean it’s not vulnerable to a data breach. And one of the best ways to prevent that is to use trusty anti-virus software that can detect malware when present.

4. Be up to date with your cyber security education

Security awareness training isn’t just for business data safety. It’s for your safety as well. And since it is your device, you’re 100% for keeping it safe from bad actors. One of the best ways to do that is to know the latest scamming tactics and the best ways to spot and fight scams.

 


Frequently Asked Questions

What is the purpose of device control?

Device control enables organisations to create and enforce detailed access control policies, allowing individuals to use certain devices and access sensitive information while protecting the organisation's confidential data. Implementing device control minimises risks such as insider threats that could lead to data breaches.

Device control includes overseeing and managing who has access to what, tracking controls, and auditing device usage. This security measure helps preserve the integrity and confidentiality of sensitive data, safeguarding the organisation from potential financial and reputational harm.

Do I need device control on my phone?

Device control offers organisations convenience by enabling remote management and security of devices. This allows your Security Team or Provider to tackle potential security threats from afar and implement security measures to bolster your digital defences.

What is the main purpose of device management?

Device management is an essential element in cyber security, vital for maintaining the integrity and security of an organisation's IT infrastructure. Usually, a Managed Service Provider is responsible for implementing strong device management protocols to ensure your devices are securely connected and receive the latest security updates and software improvements.

IT-Health-Check---Report-669369-edited

It's never too late to secure your devices. 

Looking to set up device control and other cybersecurity solutions in your organization but unsure where to begin? Schedule a free IT Health and Security Check to protect your data today.