In many Swiss SMEs, it has become common for employees to check their work emails on their personal smartphones, finalize a document on their tablet on the train, or work from their private laptop. This practice has a name: BYOD, an acronym for "Bring Your Own Device."
BYOD has measurable advantages: according to a Cisco study, companies that allow BYOD save an average of USD 350 per employee per year in hardware costs, and employees gain 58 minutes of daily productivity. However, this flexibility hides significant security risks. Unlike company-provided devices, personal devices are not under your direct control: you don't know what applications are installed on them, whether security updates are performed, or whether the device is protected by a strong password.
Concrete example: an employee loses their personal phone on public transport. If this phone contains work emails with customer information, accounting documents, or access to your systems, your entire company may be exposed. A personal device can be shared with other family members, connected to unsecured public Wi-Fi networks, or infected with malware that could spread to your servers.
For a Swiss SME, these risks have concrete and quantifiable consequences:
The first step to securing BYOD is to establish a written usage policy. This does not mean writing a fifty-page document filled with technical jargon, but formalizing simple rules that all your employees can understand and apply.
An effective BYOD policy should cover four essential points:
A good BYOD policy must also respect the privacy of your employees. If you implement a solution to remotely erase professional data in case of theft, your employees must understand that this will only concern professional data — not their personal photos or private messages.
Key Data: According to the Ponemon Institute (2023), companies with a formalized BYOD policy reduce their risk of data breaches related to personal devices by 60% compared to those that do not.
This policy should not remain in a drawer. Communicate it to each new arrival and remind them at least once a year, for example during a short information session or a memo.
There are simple and effective protections to implement, without advanced IT expertise. Here are the four fundamental measures:
All personal devices accessing company data must be protected by a PIN code of at least 6 digits, a password, or biometric recognition. The device should lock automatically after 2 to 3 minutes of inactivity.
Operating systems regularly receive patches that fill exploitable vulnerabilities. In 2023, 60% of data breaches involved a vulnerability for which a patch existed but had not been applied (Ponemon Institute). Enable automatic updates or install them as soon as they are available.
Install an antivirus or endpoint protection solution, especially on laptops. On smartphones and tablets, only download applications from official stores (App Store for Apple, Google Play for Android) and check the permissions requested.
| Measure | Difficulty of Implementation | Cost | Effectiveness |
|---|---|---|---|
| PIN/Biometric Lock | Very Low | Free | High |
| Automatic Updates | Very Low | Free | Very High |
| Antivirus (PC) | Low | 20–50 CHF/year | High |
| Official App Stores Only | Very Low | Free | Medium |
To better protect your company's information, implement a clear separation between professional and personal data. On smartphones and tablets, this is done through containerization solutions: a secure and isolated space is created on the device, protected by additional measures, and remotely erasable without affecting the employee's personal data.
| Solution | Hosting | Indicative Price | Strengths |
|---|---|---|---|
| Microsoft Intune | Microsoft Cloud | ~8 USD/user/month | Microsoft 365 integration, complete management |
| VMware Workspace ONE | Cloud or on-premise | On request | Flexibility, large companies |
| kDrive (Infomaniak) | Switzerland 🇨🇭 | From 4.99 CHF/month | Data sovereignty, nLPD compliance |
| Proton Drive | Switzerland 🇨🇭 | From 3.99 EUR/month | End-to-end encryption, open source |
Swiss solutions like Infomaniak's kDrive or Proton Drive are particularly suitable for SMEs wishing to guarantee data sovereignty and compliance with the nLPD, as their data remains hosted on Swiss territory.
On laptops, require a separate user account for professional activities or encourage the use of a browser dedicated to the company's online applications. Also, ensure that your professional web applications are properly secured against unauthorized access.
Not all your employees need access to all your company's data. The principle of least privilege consists of limiting access based on each person's role: a person from the sales department does not need to consult sensitive accounting documents, and vice versa.
This principle is even more critical in a BYOD context, where personal devices are statistically less well protected than company workstations. According to Verizon (Data Breach Investigations Report 2023), 74% of data breaches involve a human element, often related to overly broad access.
Two-factor authentication (2FA or MFA) requires double verification before accessing sensitive data: a password, plus a code sent by SMS or generated by an application. According to Microsoft (2023), 2FA blocks 99.9% of automated attacks on accounts.
| Solution | Hosting | Integrated 2FA | Price |
|---|---|---|---|
| Proton Pass | Switzerland 🇨🇭 | Yes | Free / 3.99 EUR/month (Pro) |
| Bitwarden | Cloud (open source) | Yes | Free / 10 USD/year (Pro) |
| 1Password | Cloud | Yes | ~3 USD/user/month |
Proton Pass, based in Switzerland, is particularly suitable for Swiss SMEs wishing to combine security, nLPD compliance, and data sovereignty.
Even the best technical solutions are only effective if your employees understand why they are important and how to use them. According to the Verizon DBIR 2023 report, 82% of data breaches involve human error — phishing, weak password, or misconfiguration.
You can organize short awareness sessions (30 minutes per quarter is sufficient), send regular tips by email, or use phishing simulation tools to train your employees in a concrete way. The goal is to create a security culture where everyone feels responsible.
Measurable Result: companies that organize regular cybersecurity training reduce their click rate on phishing emails by an average of 75% (KnowBe4, 2023).
Even with all precautions, a device can be lost or stolen. According to Kensington, a laptop is stolen every 53 seconds worldwide. The important thing is to have planned how to react before the incident occurs.
A robust backup strategy will allow you to quickly restore the necessary data without depending on the lost device. For companies favoring Swiss solutions, Infomaniak's Swiss Backup offers cloud backup with triple replication in Swiss datacenters, guaranteeing nLPD compliance and optimal availability.
Legal Obligation: the nLPD requires notifying the Federal Data Protection and Information Commissioner (FDPIC) as soon as possible in the event of a data breach likely to create a high risk for the persons concerned.
For a Swiss SME without a dedicated IT team, managing all these aspects internally can quickly become complex. An external partner specializing in cybersecurity like Bexxo can assist you in:
A good partner does not just sell you software. They take the time to understand your business, your constraints, and your real needs, and offer you proportionate, realistic, and applicable solutions on a daily basis.
BYOD is a reality in many Swiss SMEs. Completely prohibiting it is neither realistic nor desirable. On the other hand, managing it with clear rules and adapted security measures is essential.
| Step | Action | Priority | Estimated Cost |
|---|---|---|---|
| 1 | Draft and communicate a written BYOD policy | Immediate | Free |
| 2 | Require PIN, updates, and antivirus on all devices | Immediate | Low |
| 3 | Implement a containerization or MDM solution | Short term | Medium |
| 4 | Enable 2FA on all professional access | Immediate | Free to low |
| 5 | Train employees (quarterly session) | Short term | Low |
| 6 | Test and document the emergency procedure | Short term | Free |
These measures do not require colossal investments or a radical transformation of your organization. They are based above all on common sense, a little method, and continuous awareness. And if you need help implementing them, do not hesitate to contact our experts who are familiar with the challenges of Swiss SMEs.
BYOD (Bring Your Own Device) refers to the use of personal devices for professional purposes. It is a risk for SMEs because these devices escape the company's control: they may not be updated, may be shared with third parties, or may connect to unsecured networks, thus exposing professional data to leaks or cyberattacks.
Yes, provided that appropriate technical and organizational measures are put in place: written BYOD policy, data separation, access control, and notification procedure in case of violation. The nLPD, in force since September 2023, imposes strict obligations for the protection of personal data, regardless of the device used.
The first step is to draft and communicate a clear BYOD policy: which devices are authorized, which data is accessible, and what procedure to follow in case of loss or theft. This step is free and reduces the risk of data breaches by 60% according to the Ponemon Institute (2023).
It is not a legal obligation, but it is strongly recommended for Swiss SMEs processing sensitive data. Solutions like kDrive (Infomaniak), Proton Drive, Proton VPN, or Swiss Backup ensure that your data remains hosted in Switzerland, facilitating nLPD compliance and data sovereignty.
Thanks to containerization and mobile device management (MDM) solutions like Microsoft Intune or VMware Workspace ONE, it is possible to remotely erase only the secure professional space, without affecting the employee's personal photos, messages, or applications.