Bring your own devices (BYOD) explained
BYOD & Data Exfiltration
The ‘bring your own device’ culture (or BYOD, as it’s known) presents a security challenge to businesses. Because these devices could inadvertently transfer harmful malware or viruses to the business network, In simple terms, data exfiltration occurs when a company's data is deliberately compromised.
What is BYOD & Data Exfiltration
Understand how and why data leaves your organization without your consent.
Make sure you've got the security basics covered with our expert guide on the risks and mitigations.
More on BYOD
BYOD security explained
How can security standards be maintained when employees are using their own devices?
Quick guide to bring your own device (BYOD)
Got a bring your own device (BYOD) policy or thinking about implementing one? Make sure you check out our quick BYOD guide first.
More on data exfiltration
The Guide to Data Exfiltration
Data exfiltration is the unauthorized transfer of data, typically from a computer, and is more simply described as data theft.
Data exfiltration: What you need to know
Data exfiltration can happen in a few ways - but the outcome is often serious for a business. Here's what you need to know.