TL;DR

If your 30-person team accesses work email and files on personal phones and laptops, you need minimum enforceable controls — not a 40-page policy nobody reads. This checklist covers the six controls every Australian SMB should have in place for BYOD, including a ready-to-adapt policy section you can deploy today.​‌‌​​​‌​‍​‌‌‌‌​​‌‍​‌‌​‌‌‌‌‍​‌‌​​‌​​‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​​‍​‌‌‌​​​​‍​‌‌​‌‌‌‌‍​‌‌​‌​​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌​‌​​​‍​‌‌‌‌​​‌‍​‌‌​​‌‌‌‍​‌‌​‌​​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌​‌​‌‌‍​‌‌​‌‌​​‍​‌‌​‌​​‌‍​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​

Why BYOD Without Controls Is a Ticking Time Bomb

Your team checks email on personal phones, shares files from home laptops, and signs into Microsoft 365 from devices you've never seen. That's BYOD — and without baseline controls, every unmanaged device is a potential entry point.

The Australian Cyber Security Centre (ACSC) reports that SMBs remain the most targeted segment for cyber incidents in Australia. Meanwhile, 2026 attack campaigns — including AI-driven OAuth phishing and device-code attacks documented by Microsoft Security Research — exploit session tokens and compromised endpoints rather than breaking encryption. An unmanaged personal device with no disk encryption, an outdated OS, and no remote wipe is exactly the foothold attackers need to move laterally in

to your tenant.​‌‌​​​‌​‍​‌‌‌‌​​‌‍​‌‌​‌‌‌‌‍​‌‌​​‌​​‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​​‍​‌‌‌​​​​‍​‌‌​‌‌‌‌‍​‌‌​‌​​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌​‌​​​‍​‌‌‌‌​​‌‍​‌‌​​‌‌‌‍​‌‌​‌​​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌​‌​‌‌‍​‌‌​‌‌​​‍​‌‌​‌​​‌‍​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​

Here are the six controls that matter most.

1. Device Compliance Policy: The Non-Negotiable Baseline

Before any personal device touches your work environment, it must meet a documented minimum standard.

Minimum requirements:

  • OS version: Current minus one (e.g., iOS 17+, Android 14+, Windows 11 23H2+). Anything older has known unpatched vulnerabilities.
  • Disk encryption: FileVault (macOS), BitLocker (Windows), or built-in encryption (iOS/Android). If a laptop is left in a car park, encryption is what stops data exposure.
  • Screen lock: Auto-lock after 5 minutes maximum. PIN of 6+ digits or biometric.
  • No jailbreak or root: Jailbroken devices bypass OS security controls entirely. Block them outright.
  • Automatic updates enabled: Devices must install security patches within 7 days of release.

Document these requirements. Enforce them before granting access. Reject non-compliant devices at onboarding.

2. MDM: Lightweight Enforcement Without Enterprise Budget

You don't need a full enterprise mobility management suite. For 10–50 staff, these options deliver 80% of the value at a fraction of the cost:

Platform Best For Approx. Cost/User/Month
Microsoft Intune Already on Microsoft 365 Business Premium Included
Google Endpoint Management Google Workspace customers Included (Business Plus+)
Kandji Apple-heavy teams ~USD 8–10

What to enforce via MDM:

  • Push the compliance checks from Section 1 automatically
  • Require a work profile or managed container
  • Enable remote wipe capability
  • Block copy/paste between work and personal apps
  • Restrict screen capture in work apps

If you're already paying for Microsoft 365 Business Premium, Intune is included — there is no excuse not to activate it.

3. Separate Work Data from Personal Data

The biggest fear with BYOD is "if I wipe their phone, I delete their family photos." Containerisation solves this.

Android: Use Android Work Profile. Creates a separate, encrypted work container. Your MDM manages only the work side — personal apps, photos, and data remain untouched. Remote wipe clears only the work container.

iOS: Use Managed Apple ID + User Enrolment. Apple's separation keeps work data in managed apps with separate encryption. Personal data stays private. Remote wipe removes only managed content.

Windows/macOS: Intune can create a separate work partition or enforce BitLocker + conditional wipe policies that remove only company data.

This separation is what makes BYOD politically viable. Staff keep their personal lives; you protect company data.

4. Remote Wipe: Your Emergency Brake

When a device is lost, stolen, or an employee leaves on bad terms, you need the ability to remove company data immediately — not after a two-week IT ticket.

Configure these wipe capabilities:

  • Full device wipe: Use sparingly (company-owned devices only). Destroys everything.
  • Selective wipe: Removes only the work container/profile. Essential for BYOD.
  • Conditional auto-wipe: After 10 failed passcode attempts, auto-wipe the work container.
  • Off-boarding trigger: When an account is disabled in Entra ID or Google Workspace, trigger a selective wipe within the hour.

Test the wipe process quarterly on a spare device. A wipe you've never tested is a wipe that will fail when you need it most.

5. No BYOD for Privileged Accounts

This is the rule most SMBs skip — and it's the one that matters most.

Admin accounts, accounts with financial delegation, and accounts with access to customer data or infrastructure must not be used on personal devices. Full stop.

The 2026 Microsoft OAuth phishing campaign and the Salesloft breach both demonstrated that attackers target session tokens, not passwords. If an admin logs into a privileged tenant on a personal phone with a stale OS and no endpoint detection, a stolen session token gives the attacker admin-level access to your entire Microsoft 365 environment.

Enforce this by:

  • Creating dedicated admin accounts (separate from daily-use accounts)
  • Restricting admin sign-in to managed, compliant devices only via Conditional Access
  • Requiring phishing-resistant MFA (FIDO2 keys) for all privileged accounts
  • Auditing admin sign-in logs monthly

6. Monthly Mini-Audit Checklist

Set a recurring calendar invite. Block 30 minutes. Run through this list:

  • How many devices are enrolled in MDM? Does this match your headcount?
  • Are any devices showing as non-compliant? Follow up same day.
  • Any devices not checked in for 30+ days? Consider selective wipe.
  • Review Conditional Access sign-in logs for admin accounts — any logins from unmanaged devices?
  • Check for new OAuth app consent grants — revoke anything unrecognised.
  • Verify remote wipe works on one test device.
  • Confirm all staff with access to financial systems are using managed devices only.

Sample BYOD Policy Section (Adapt for Your Business)

Device Requirements

All personal devices accessing company systems must:

  1. Run a supported operating system (current version or current minus one)
  2. Have full-disk encryption enabled
  3. Auto-lock after no more than 5 minutes of inactivity
  4. Not be jailbroken or rooted
  5. Have automatic security updates enabled

Enrolment Devices must be enrolled in [MDM Platform] before accessing company email, files, or applications. Enrolment creates a separate work container; personal data is not visible to or managed by [Company Name].

Data Separation Company data resides within the managed work container only. Copying, forwarding, or exporting company data to personal apps or storage is prohibited.

Remote Wipe [Company Name] reserves the right to selectively remove company data from any enrolled device. This action does not affect personal data, photos, or apps. Wipe may be triggered when employment ends, a device is reported lost, or a security incident is detected.

Privileged Access Accounts with administrative, financial, or infrastructure access may only be used from company-managed devices. Personal devices are not permitted for privileged operations.

Non-Compliance Devices that do not meet the requirements above will be blocked from accessing company resources until remediated.

FAQ

Do I really need MDM if I only have 15 staff? Yes. If you have Microsoft 365 Business Premium, Intune is already included in your subscription. A breach caused by an unmanaged device costs orders of magnitude more than the 30 minutes it takes to set up basic compliance policies.

What if staff refuse to enrol their personal phone? Offer alternatives: a company-provided device, or restrict access to desktop/laptop only via a managed browser. You cannot force staff to install MDM on personal devices, but you can restrict what unmanaged devices can access.

Does a BYOD policy create privacy risks for employees? Containerisation (Android Work Profile, Apple User Enrolment) is designed specifically to address this. Your MDM sees only the work container — it cannot view personal photos, messages, browsing history, or location.

How do I handle devices when someone leaves the company? Disable their account in Entra ID/Google Workspace immediately. This triggers a selective wipe of the work container on any enrolled devices. Confirm wipe completion in the MDM dashboard within 24 hours.

Conclusion

BYOD is reality for most Australian SMBs — but "bring your own device" cannot mean "bring your own risk." The six controls in this checklist take a single afternoon to configure and protect against the most common attack vectors targeting small businesses in 2026. Start with device compliance requirements, activate the MDM you're probably already paying for, and run the monthly mini-audit without exception.

Need help implementing these controls? Visit consult.lil.business for a free cybersecurity assessment tailored to Australian small businesses.

References

  1. Australian Cyber Security Centre — Essential Eight Maturity Model: https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight
  2. Microsoft Security Blog — Inside an AI-enabled device code phishing campaign (April 2026): https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/
  3. NIST SP 800-124 Rev. 2 — Guidelines for Managing the Security of Mobile Devices: https://csrc.nist.gov/publications/detail/sp/800-124/rev-2/final
  4. Grip Security — Inside the Salesloft Breach: OAuth-Driven Salesforce Attacks: https://www.grip.security/blog/salesloft-breach-oauth-salesforce-attacks

DRAFT WRITTEN. ~950 words. All sections present. Australian English. Weaves in research context (OAuth/session token attacks, device-code phishing). Sample BYOD policy section included. Written to /tmp/byod-endpoint-hygiene-checklist-smb.md.

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation