Tech Insight : Personal Activities … On Work Laptops (Part 2)

Table of Contents

In this second part article, where we review the issues around employees engaging in personal activities on company-issued devices, we look deeper into the legal and compliance implications and provide real-world case studies of security breaches. We also examine how businesses can protect themselves against these growing threats.

Last Week 

In the previous article, with the help of an ESET study, we explored the risks of employees using their work laptops for personal activities and the potential consequences for both the employee and the business. Continuing along those lines, legal and compliance issues are the next area for serious consideration for businesses whose laptops may be used by employees for risky purposes.

Legal and Compliance Implications 

The legal implications of employees engaging in risky behaviour on work laptops can be severe for businesses, particularly in industries where sensitive data is routinely handled. For instance, companies operating in sectors such as finance or healthcare must comply with stringent data protection regulations, such as the UK General Data Protection Regulation (GDPR). Under GDPR, businesses are responsible for protecting personal data, and failure to do so can result in penalties of up to £17.5 million or 4 per cent of global turnover, whichever is higher.

Also, businesses can face legal liability if company devices are used for illegal activities. This includes accessing pirated content, illegal gambling, or visiting the dark web. If such activities are traced back to a business’s network or devices, it could suffer reputational damage or face legal action. This is particularly concerning for companies with distributed or remote workforces, where personal and professional activities on work devices are harder to monitor.

In highly regulated industries, such as finance, companies must also ensure compliance with sector-specific guidelines. For example, the Financial Conduct Authority (FCA) in the UK has strict rules governing data protection, and failure to meet these standards can lead to fines and sanctions. Recent cases have shown that even seemingly innocuous personal activities on work devices can have far-reaching consequences.

Examples of High-Profile Security Breaches Involving Work Laptops 

Several high-profile security breaches in recent years have highlighted the risks associated with employee misuse of work laptops. For example:

– Back in 2016, Tesco Bank faced a £16.4 million fine from the Financial Conduct Authority after cybercriminals exploited weaknesses in the bank’s systems, partly due to poor endpoint security on employee devices. This breach affected thousands of customers and highlighted the importance of robust security protocols on corporate devices.

– In 2018, British Airways suffered a £20 million fine after a data breach exposed the personal data of over 400,000 customers. The attack was traced back to weak endpoint security, underscoring the risks of inadequate protection on work devices.

– In 2020, Travelex, a global currency exchange company, experienced a significant ransomware attack, forcing it offline for several weeks! The attack was caused by an employee’s unsafe behaviour, leading to a ransom demand of £20 million and significant financial losses.

– More recently, in 2021, Colonial Pipeline, the Colonial Pipeline attack in the US disrupted fuel supplies across the eastern states after a single compromised employee password was exploited. This incident demonstrated the catastrophic potential of weak endpoint security on employee devices.

As well as illustrating the devastating consequences of poor endpoint security, these examples may also serve as cautionary tales for businesses, especially as hybrid work and employee mobility continue to grow.

Benefits of Managed Corporate Devices 

Despite the risks, there are clear benefits to allowing employees to use company-provided laptops, particularly in remote and hybrid work settings. Flexible work environments contribute to higher employee morale and productivity. However, businesses must ensure that security is not compromised in pursuit of these benefits.

Mobile Device Management

Many companies have successfully implemented Mobile Device Management (MDM) systems, which allow IT departments to manage, monitor, and secure corporate devices remotely. These systems enable businesses to enforce security policies, such as encryption and regular software updates, while providing IT teams with visibility over potential threats. Companies like IBM and Google, for example, have adopted stringent MDM solutions, ensuring that employees can work flexibly without putting the business at risk.

What Does This Mean for Your Business? 

The growing risks associated with employees using work laptops for personal activities demand that businesses take a more proactive approach to cybersecurity. The rise of hybrid and remote work appears to have blurred the lines between personal and professional device use, creating new vulnerabilities that need to be addressed.

To mitigate these risks, businesses need to establish clear guidelines for acceptable use of work devices. This includes not only educating employees about the dangers of risky behaviour but also ensuring they understand the legal and compliance implications of their actions. Regular cybersecurity training, particularly on topics like phishing, malware, and safe browsing practices, could, therefore, be crucial.

In addition to clear policies, businesses may also benefit from investing in robust endpoint security solutions that can detect and block threats in real-time. Popular solutions, such as Microsoft Defender for Endpoint (there are, of course, many others), can provide the necessary protection while allowing IT teams to monitor threats without invading employees’ privacy.

Ultimately, businesses that implement a comprehensive cybersecurity strategy, invest in cutting-edge security solutions, and foster a culture of awareness and responsibility among their employees will be better positioned to thrive in today’s increasingly flexible work environment. Ensuring that company devices are secure and that employees are well-informed about their responsibilities is not just a technical issue but is critical for long-term business success.

Recent Blog Posts

As the countdown to October 14, 2025 continues, the end of support for Windows 10 ...

What is an IT support specialist? Technology is at the core of every ...

Google has filed a set of proposed remedies in its high-profile antitrust case ...

Client Testimonials

Stuart B.
10:16 10 Sep 24
Flyford have helped out IT throughout our growth. So, matching our systems to not only what we need now, but what we will be needing in the future; future proofing.They just make it all easy, and take the stress out of IT for us.
Xanthe S.
12:12 06 Jul 22
We would highly recommend Flyford’s services. They are always on hand for help and advice, nothing is ever too much trouble. All the guys are knowledgable, helpful and friendly. You can’t want much more from a company! Many thanks from us all at Green Mile Trees.
Alan G.
18:08 23 May 22
I messed up my Dell laptop downloading non standard updates and lost the inbuilt system update. I tried for a week to rectify my mistake and couldn’t. Then I installed BT Cloud and that wouldn’t work either. John from Flyford sorted it out within 30 minutes. Big thanks to everyone, highly recommended.👍
Hanicks L.
11:34 26 Mar 22
Excellent support
Stephanie M.
15:33 10 Feb 22
Flyford run the IT for our accountancy firm in Retford. We rely heavily on IT for our business and they are always efficient dealing with our requests and keeping us up and running at all times. They also help us forward plan for our growing needs, keeping in mind budgets and working to our time frames
The team at Flyford are great for our business based in Lincoln. We are only a small company, so its great to know we have help with our computers should we need it. We have recommended Flyford to other business’s in the area.

Areas we cover

We provide it support, telephony and it managed services to the following locations and their surrounding areas:

Doncaster, Sheffield , Tickhill , Maltby , Rotherham, Swallownest , Barnsley , Lincoln, Nottingham, Worksop, Retford, Newark, Harworth, Edwinstowe, Barlborough

Freqently Asked
Questions:

If you have any further questions please feel free to contact us

Contact Us >

We offer a wide range of services, including IT computer supportmanaged services IT supportIT consultancycybersecurity, and more. Whether you’re looking for company IT support or help with specific issues, we’ve got you covered.

We pride ourselves on providing tailored IT support solutions for businesses of all sizes. Our expert team delivers high-quality, 24/7 IT support, ensuring that your systems are always running smoothly.

IT support is essential for increasing productivity, safeguarding your valuable data, and reducing downtime, helping your business run smoothly and efficiently. With reliable IT support in place, you can focus on your core operations while knowing your systems are secure, reliable, and performing at their best. Additionally, you’ll have the peace of mind that expert assistance is always on hand whenever you need it.
There are different levels of IT support, including remote IT support, 24/7 IT support, and on-site assistance. Services range from basic troubleshooting to full IT management support.
IT support provides assistance for managing and troubleshooting technology. It’s essential for businesses that rely on technology to ensure smooth operations and reduce downtime.

2nd Line / 3rd Line IT Support Engineer 

We are an established MSP providing in-house IT Services and rapid response IT Support to companies across Doncaster and the surrounding areas. Due to business growth, we are looking to add a 2nd Line / 3rd Line IT Support Engineer to our growing team. The ideal candidate will have all the experience, skills, and personality to thrive in this new role.

  • Microsoft 365 Services

  • Azure Services

  • Windows Virtual Desktop

  • Intune

  • Firewall Configuration

  • Hyper and Vmware Infrastructure

  • Solid knowledge of networking technologies and concepts such as LAN/WAN, DHCP etc

  • Experience of and enjoy providing customer service as well as building and maintaining customer relationships.

  • Ability to communicate clearly and concisely at all levels.

  • An ability and desire to adapt and learn new software and programs.

  • Good time-keeping and organisational skills.

  • You love solving problems.

  • Ability to recognise where improvements can be made internally and for clients, then plan ,schedule and execute the project

  • Reliable and punctual.

  • Driving licence in case you need to visit with clients across the area (usually up to about a one-hour radius of Doncaster).

  • Experience with Microsoft Power Platform particularly Power Automate and PowerApps is advantageous but not essential.
  • Provide remote technical support via email and telephone to end users so that operational problems and queries are diagnosed and resolved as quickly as possible.

  • Implementing MS365 and networking solutions for client and internal projects.

  • Onsite support and installation of hardware and software.

  • Specifying, recommending, providing, configuring, and implementing many varied items of equipment i.e., desktops, servers, printers etc. and supporting software in accordance with client requirements.

  • Production of standard configurations, documentation, and procedures.

  • Consider where the team can streamline processes and produce efficiencies within the company and in the services provided to clients.

  • Building and maintaining relationships with new and existing clients where the Company provide their IT support.

  • Liaising with 3rd party vendors and suppliers on behalf of clients.

Upload Your CV