Author: prod

  • The $4.5 Million Text Message

    BYOD or Bust // Case Study

    The $4.5 Million
    Text Message

    By Rich Durfee, Ph.D. — RichnTech

    This is the story of a breach that started with a single text message on an unmanaged personal device. The details have been anonymized, but the scenario is drawn from real-world breach reports published by cybersecurity firms and regulatory filings.

    A mid-size financial services company with 200 employees had an informal BYOD culture. No written policy. No MDM platform. Employees used personal phones for work email, Slack, and client communications. IT had no visibility into what devices were connecting or what data was being accessed.

    The attack started with a smishing text. A senior account manager received a text message that appeared to be from the company’s IT department, asking them to verify their login credentials through a link. The link went to a convincing replica of the company’s single sign-on page. The employee entered their username, password, and the 2FA code from their authenticator app.

    Within 90 seconds, the attacker had full access. The stolen credentials gave them access to the company’s CRM, email system, and shared drives. Because the employee’s personal phone had the CRM app with locally cached client data, and because there was no MDM to enforce conditional access or detect the compromise, the breach went undetected for 11 days.

    The damage was comprehensive. 47,000 client records were exfiltrated, including names, Social Security numbers, account balances, and transaction histories. The company was subject to regulatory investigation, mandatory breach notification to all affected clients, credit monitoring obligations, and class action litigation. The total cost — regulatory fines, legal fees, remediation, client notification, credit monitoring, and settlement — exceeded $4.5 million.

    What MDM would have prevented: A properly configured MDM with conditional access (like Intune with Azure AD) would have blocked the attacker’s new device from accessing company resources because it wasn’t enrolled and compliant. Even without blocking the initial credential theft, the MDM would have detected a new, unenrolled device attempting to access the CRM and flagged it immediately. Selective wipe capability would have allowed IT to remove all company data from the compromised device within minutes of detection.

    What a BYOD policy would have prevented: A requirement for MDM enrollment on any device accessing company data. A prohibition against storing client PII on personal devices outside of managed containers. A defined incident response process for compromised credentials. An employee security awareness program covering smishing attacks.

    The $4.5 million wasn’t the cost of a sophisticated nation-state attack. It was the cost of not having a $3/device/month MDM platform and a one-page BYOD policy. The technology to prevent this has existed for over a decade. The barrier isn’t capability — it’s awareness.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Check Your DMMM Score

  • BYOD Policy in 7 Steps

    BYOD or Bust // Framework

    BYOD Policy in
    7 Steps

    By Rich Durfee, Ph.D. — RichnTech

    A BYOD (Bring Your Own Device) policy doesn’t need to be a 40-page legal document that nobody reads. It needs to be clear, enforceable, and cover the seven areas that actually matter. Here’s the framework.

    Step 1: Define scope. Which devices are covered? Just phones? Phones and laptops? Tablets? Be specific. State which operating systems and minimum OS versions are supported. If you can’t manage it, it shouldn’t connect to company resources. Example: ‘This policy covers personal iOS (16+), Android (12+), macOS (13+), and Windows (11+) devices used to access company data.’

    Step 2: Set security requirements. Every personal device that touches company data must meet minimum security standards: screen lock with 6+ character passcode or biometric, device encryption enabled, operating system updated within 14 days of release, and no jailbroken or rooted devices. If you have an MDM, add: device must be enrolled in the company MDM platform.

    Step 3: Establish data separation. Personal data stays personal. Company data stays managed. Android Work Profiles and Apple User Enrollment both create cryptographically separated containers. Your policy should state that company data will be stored in a managed container and that IT will not access personal apps, photos, or messages.

    Step 4: Define acceptable use. What can employees do on personal devices with company access? State clearly: company data must not be stored in personal cloud accounts, forwarded to personal email, or shared via unapproved apps. Screenshots of sensitive data are prohibited. Unapproved apps must not be granted access to company accounts.

    Step 5: Address privacy boundaries. Employees need to know exactly what IT can and cannot see. With a properly configured MDM using work profiles, IT can see: device model, OS version, compliance status, installed work apps. IT cannot see: personal apps, photos, browsing history, text messages, or personal email. Stating this explicitly builds trust and increases enrollment compliance.

    Step 6: Create the offboarding process. When an employee leaves — voluntarily or involuntarily — what happens? Define it: access to company resources is revoked same-day. IT performs a selective wipe of the work container within 24 hours. The employee is notified that only company data will be removed. Personal data remains untouched. Document this in the offboarding checklist.

    Step 7: Get acknowledgment. A policy nobody signs is a policy that doesn’t exist legally. Have every employee sign a BYOD acknowledgment form before connecting personal devices. Keep it simple: ‘I have read and agree to the BYOD policy. I understand that company data on my personal device may be remotely wiped upon my departure.’ Date it. Store it. Reference it if issues arise.

    That’s the framework. Seven sections, one page each, language your employees can actually read. If you want a customized version based on your company’s specific situation, use our BYOD Policy Builder — it generates a tailored outline in 5 questions.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Build Your BYOD Policy

  • Your Employee Quit. Their Phone Still Has Everything.

    BYOD or Bust // Policy

    Your Employee Quit. Their Phone
    Still Has Everything.

    By Rich Durfee, Ph.D. — RichnTech

    A sales rep at your company puts in their two weeks. They return the company laptop, hand over their badge, and walk out the door. Normal offboarding, right? Except their personal iPhone still has the company email app, a Slack workspace with 18 months of client communications, a Google Drive folder with pricing spreadsheets, and the CRM app with your entire customer database synced locally.

    This isn’t a hypothetical. This is the default state of every company that allows employees to use personal devices for work without a BYOD policy or an MDM platform. And it happens every single time someone leaves — whether they quit, get laid off, or get terminated for cause.

    The data exposure is immediate and comprehensive. Company email continues to sync until IT manually revokes access — which, without an MDM, requires knowing every service the employee used and revoking access one by one. Slack messages, shared documents, and CRM data may be cached locally on the device even after cloud access is revoked. Photos of whiteboards, screenshots of contracts, and saved attachments live in the device’s camera roll and files app indefinitely.

    The legal exposure is even worse. If that employee goes to a competitor, takes client data with them, and your company can’t prove you had policies and controls in place to prevent it, you may have limited legal recourse. If you handle regulated data (healthcare, financial, education), the departure of an unmanaged device with PII on it is a reportable breach under HIPAA, GLBA, or FERPA.

    What should have been in place: A written BYOD policy that every employee acknowledges before connecting personal devices to company resources. An MDM platform that creates a managed work container on personal devices, separating company data from personal data. A selective wipe capability that lets IT erase only the work container when someone leaves — without touching personal photos, apps, or messages. An offboarding checklist that includes device access revocation as a same-day action item.

    The fix isn’t complicated. Platforms like Jamf, Intune, and Hexnode all support work profile separation and selective wipe. Android has this built into the OS natively with Android Enterprise Work Profiles. Apple supports managed containers through User Enrollment. The technology exists and has existed for years.

    The problem isn’t technology. The problem is that most small businesses don’t know they need a BYOD policy until after the data walks out the door. If you have employees using personal devices for work and you don’t have a policy in writing, you don’t have a security posture — you have a liability. Use our BYOD Policy Builder to create your framework in 5 minutes.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Build Your BYOD Policy

  • Why Your Phone’s Default Settings Are a Liability

    Lock It Down // Deep Dive

    Why Your Phone’s Default Settings
    Are a Liability

    By Rich Durfee, Ph.D. — RichnTech

    When you unbox a new phone, it’s configured to be as open and connected as possible. That’s great for user experience. It’s terrible for security. Every default setting that makes your life slightly more convenient also makes your device slightly more exposed. Here’s what’s actively working against you right now.

    Bluetooth is broadcasting your device identity. Unless you’ve explicitly turned it off, your phone is constantly broadcasting Bluetooth signals that can be used to track your location, identify your device model, and in some cases execute relay attacks. Bluetooth Low Energy (BLE) beacons are used in retail stores to track customer movement. The same technology can be used by bad actors in public spaces.

    Wi-Fi auto-connect is a trap. Your phone remembers every Wi-Fi network you’ve ever connected to and will automatically rejoin any network with the same name. An attacker can set up a hotspot called ‘Starbucks WiFi’ or ‘Airport Free WiFi’ and your phone will connect without asking. Once connected, they can intercept traffic, inject malicious redirects, or harvest credentials. Turn off auto-join for open networks.

    No SIM lock means your number can be hijacked. Most phones ship without a SIM PIN. That means if someone removes your SIM card and puts it in another phone, they have your phone number — which means they can receive your 2FA codes, reset your email password, and cascade into your bank accounts. Set a SIM PIN in Settings → Cellular → SIM PIN (iOS) or Settings → Security → SIM card lock (Android).

    Location services are over-shared. By default, many apps request ‘Always’ location access when ‘While Using’ would be sufficient. Some apps don’t need location at all. Every app with location access is a potential data leak — your movement patterns, home address, and workplace are all derivable from location data. Audit permissions and switch everything to ‘While Using’ or ‘Never’ unless there’s a genuine reason for ‘Always.’

    Lock screen notifications reveal too much. By default, message previews appear on your lock screen — meaning anyone who picks up your phone can read incoming texts, emails, and notifications without unlocking it. This includes 2FA codes sent via SMS. Go to Settings → Notifications and change notification previews to ‘When Unlocked’ for all apps.

    USB debugging and developer options are potential backdoors. On Android, if you’ve ever enabled developer options or USB debugging (common for tech enthusiasts), your phone can be accessed and controlled via a USB connection without your knowledge. Disable developer options when you’re not actively using them.

    None of these defaults are bugs — they’re design choices that prioritize ease of use. But they create an attack surface that most people never think about. The fix takes 10 minutes. The breach that results from ignoring them takes months to recover from.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Check Your DMMM Score

  • The 10-Minute New Device Security Setup

    Lock It Down // Essentials

    The 10-Minute New Device
    Security Setup

    By Rich Durfee, Ph.D. — RichnTech

    Every new phone, tablet, or laptop ships with default settings that prioritize convenience over security. Bluetooth is broadcasting. Wi-Fi auto-connects to any network it recognizes. Your lock screen timeout is too long. App permissions are wide open. None of this is malicious — it’s just how manufacturers ship devices to reduce friction during setup. But it means your first 10 minutes with a new device should be spent locking it down.

    Minute 1-2: Set a strong passcode and enable biometrics. Skip the 4-digit PIN. Use a 6-digit minimum or, better, an alphanumeric password. Then enable Face ID or fingerprint authentication on top of it. The passcode is your fallback — biometrics are your daily driver. On Android, avoid pattern unlock — it’s the easiest to shoulder-surf.

    Minute 3-4: Enable device encryption. On iOS, encryption is automatic when you set a passcode — there’s nothing extra to do. On Android, go to Settings → Security → Encryption and verify it says ‘Encrypted.’ On Windows laptops, enable BitLocker (Pro/Enterprise) or device encryption (Home). On Mac, turn on FileVault in System Settings → Privacy & Security.

    Minute 5-6: Configure auto-lock and auto-updates. Set your screen to lock after 30 seconds to 1 minute of inactivity — not 5 minutes. Then go to Software Update settings and turn on automatic updates for both the OS and apps. Unpatched devices are the number one entry point for endpoint attacks.

    Minute 7-8: Audit app permissions. Go to Settings → Privacy (iOS) or Settings → Apps → Permissions (Android). Review which apps have access to your camera, microphone, location, contacts, and photos. Revoke anything that doesn’t need it. Your flashlight app does not need access to your contacts. Your weather app does not need your microphone.

    Minute 9-10: Set up remote wipe and disable unnecessary radios. Enable Find My iPhone or Find My Device (see our Remote Wipe guide). Turn off Bluetooth when you’re not using it — Bluetooth relay attacks are real. Disable Wi-Fi auto-join for open networks. On Android, turn off NFC if you don’t use contactless payments.

    This 10-minute routine should happen on every device you buy, every device your employees receive, and every device you hand your kids. It’s not comprehensive endpoint security — it’s the baseline. Everything else (MDM enrollment, policy enforcement, compliance monitoring) builds on top of these fundamentals.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Check Your DMMM Score

  • Remote Wipe: Set It Up Before You Need It

    Lock It Down // Essentials

    Remote Wipe: Set It Up
    Before You Need It

    By Rich Durfee, Ph.D. — RichnTech

    Your phone gets stolen at a coffee shop. Your laptop disappears from an airport lounge. In that moment, the question isn’t whether you had a strong password — it’s whether you can erase everything on that device right now, from wherever you are. If the answer is no, you have a problem.

    Remote wipe is the single most important device security feature that most people never configure. Both Apple and Google offer it for free, built directly into their ecosystems. On iOS, it’s Find My iPhone — which also supports remote lock, location tracking, and Activation Lock. On Android, it’s Find My Device through your Google account. Both let you erase the device remotely from any browser.

    Here’s how to set it up on iOS: Go to Settings → [your name] → Find My → Find My iPhone. Turn on Find My iPhone, Find My network, and Send Last Location. That’s it. If the device is lost, go to icloud.com/find from any browser, sign in, and you can lock it, play a sound, show a message on the lock screen, or erase it entirely.

    On Android: Go to Settings → Security → Find My Device and make sure it’s turned on. Your Google account needs to be signed in, and location services need to be enabled. To remotely wipe, go to android.com/find from any browser. You’ll see the device on a map with options to play a sound, secure the device (lock + display message), or erase it.

    For managed devices in a business context, remote wipe gets more nuanced. MDM platforms like Jamf, Intune, and Hexnode support selective wipe — removing only company data containers while leaving personal photos, apps, and messages intact. This is critical for BYOD environments where you can’t legally erase an employee’s personal device entirely.

    The gap most people miss: remote wipe only works if the device is online. If someone steals your phone and immediately puts it in airplane mode or removes the SIM, remote wipe won’t execute until the device reconnects. That’s why encryption matters as a complementary layer — even if they can’t be wiped, encrypted devices are effectively useless to a thief without the passcode.

    Action items you should do right now: Verify Find My iPhone or Find My Device is enabled on every device you own. Test it — go to icloud.com/find or android.com/find and confirm your devices appear. Make sure your spouse or partner knows how to access it too. If you’re a business owner, check whether your MDM supports selective wipe for BYOD devices. If you don’t have an MDM, that’s a different conversation — but start with Find My.

    Ready to Level Up?

    See where your device management stands and get actionable next steps.

    Check Your DMMM Score