{"id":20325,"date":"2021-06-29T15:00:11","date_gmt":"2021-06-29T14:00:11","guid":{"rendered":"https:\/\/www.n-able.com\/?p=20325"},"modified":"2024-03-04T15:45:10","modified_gmt":"2024-03-04T15:45:10","slug":"the-top-7-risks-of-bring-your-own-device-msps-should-remember","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember","title":{"rendered":"The Top 7 Risks of Bring Your Own Device (BYOD) MSPs Should Remember"},"content":{"rendered":"<p class=\"p1\">In recent years, using personal devices in working environments has become commonplace. But as employees inevitably hop between corporate tools and personal applications on their own devices, their actions introduce a number of possible risks that should be managed and mitigated with careful consideration.<\/p>\n<p class=\"p1\">This article will outline of some of the most significant risks associated with allowing the use of personal devices on company networks, so MSPs can take them into consideration when implementing these policies for themselves and their customers.<\/p>\n<h2 class=\"p1\">The rise of BYOD<\/h2>\n<p class=\"p1\">It\u2019s important to acknowledge how widespread BYOD practices have become in the workplace. Here are a few notable statistics about the increasing popularity of the trend and its growing market:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\">According to a recent report, the global bring-your-own-device security market accounted for $68.810 billion in 2019 and is expected to reach $252.290 billion by 2026.<\/li>\n<li class=\"li1\"><a href=\"https:\/\/www.forbes.com\/sites\/lilachbullock\/2019\/01\/21\/the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future\/\" target=\"_blank\" rel=\"noopener\">61% of Generation Y workers<\/a>\u00a0and 50% of workers over the age of 30 believe their personal tech tools are more productive and effective than the ones they use in working environments. Similarly, 60% of workers use a smartphone for work, while 31% of workers want to use one.<\/li>\n<li class=\"li1\"><a href=\"https:\/\/www.dmstechnology.com\/3-big-risks-of-byod\/\" target=\"_blank\" rel=\"noopener\">A Cisco<\/a>\u00a0study noted that companies leveraging these practices benefited from an average of $350 in savings for every employee, each year.<\/li>\n<li class=\"li1\">Companies allowing employees to use their personal technology tend to save a significant amount of time, with portable devices saving employees an average of <a href=\"https:\/\/www.linkedin.com\/pulse\/world-bring-your-own-device-byod-ryan-coleman-mba\/\" target=\"_blank\" rel=\"noopener\">58 minutes each day<\/a>\u00a0and improving productivity by 34%.<\/li>\n<\/ul>\n<p class=\"p4\">BYOD practices certainly have some potential benefits, but they also can carry with them legal, cultural, and practical challenges.<\/p>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h2 class=\"p1\">What this means For MSPs<\/h2>\n<p class=\"p1\">The new trend means the role and responsibilities of MSPs are more complex because they often have to manage numerous customer networks and employee-owned devices, as well as juggle different policies for multiple clients.<\/p>\n<p class=\"p1\">Fortunately, there are tools available that can help MSPs address the challenges associated with supporting employee-owned devices. Dedicated tools can help businesses achieve greater control over best practices, affording employees and companies access to the benefits of BYOD while mitigating the disadvantages.<\/p>\n<h2 class=\"p5\">Top BYOD risks<\/h2>\n<p class=\"p1\">If your business does decide to allow employees use of their personal mobile devices for work purposes, you should be aware of the following risks:<\/p>\n<h3>1. Data theft<\/h3>\n<p class=\"p1\">If you let your employees use their own devices unchecked, it\u2019s likely that some of the personal applications they use may not be as stringent with their security requirements. If an account they have for personal use is hacked, it could ultimately end up exposing corporate data and confidential information.<\/p>\n<p class=\"p1\">Cybercriminals are always looking for opportunities to steal potentially valuable corporate data, and improperly managed personal devices can provide the perfect opportunity. BYOD software can help MSPs significantly reduce the risk of data theft by allowing technicians to gain visibility into managed devices in order to spot suspicious activity or monitor application usage.<\/p>\n<h3>2. Malware<\/h3>\n<p class=\"p1\">Employees use personal devices to download various types of information and files, such as PDFs and applications. If an employee isn\u2019t carefully distinguishing between valuable corporate data and data used for personal purposes, this could compromise security. For example, an employee might download a game to their mobile device that carries a hidden virus or malware. This malware could then be passed onto the company network when the employee next logs in from the infected device. Implementing strict usage policies can help mitigate the risk of malware infiltrating corporate systems.<\/p>\n<h3>3. Legal problems<\/h3>\n<p class=\"p1\">The reputation of a business, particularly an MSP, can be irreparably damaged in the event of a security breach. Customers expect MSPs to protect their devices\u2014so if an employee-owned device results in a leak or breach of corporate data, this could have serious ramifications, including the possibility of litigation.<\/p>\n<p class=\"p1\">Defending against legal challenges can be extremely costly and may even bankrupt smaller organizations. This is why MSPs need to be proactive about precautions when it comes to establishing BYOD practices for their clients. Furthermore, we highly recommend you work closely with legal counsel on developing any documents around bring your own device policies.<\/p>\n<h3>4. Lost or stolen devices<\/h3>\n<p class=\"p1\">If an employee\u2019s device is stolen or goes missing, the best-case scenario is that this is an inconvenience. But in the worst-case scenario, you\u2019re dealing with a complete disaster. If the employee wasn\u2019t following corporate security protocols when using their device, loss or theft could cause a major breach. For instance, the employee might be storing their passwords (both personal and corporate) in an unsecured notes application, which would make it easy for someone who acquires the device to hack corporate accounts.<\/p>\n<p class=\"p1\">Even if the employee followed policy down to the letter, hacking technology has become so sophisticated in recent years that a robust password or fingerprint authentication requirement may not be sufficient to keep them locked out of the device. Mobile device management (MDM) software can provide a solution to this problem, often allowing companies to remotely wipe the device so hackers don\u2019t have the opportunity to access sensitive data.<\/p>\n<h3>5. Improper mobile management<\/h3>\n<p class=\"p1\">When a staff member leaves an organization, a vulnerability can be created if they continue to have access to company applications from their personal mobile devices. To help ensure an employee can\u2019t continue to access a system or app after they leave the company, it is crucial that companies are able to reset passwords and revoke access as soon as the employee is no longer authorized. If a security breach does occur, a company should also have systems in place to enable them to track down the device responsible.<\/p>\n<h3>6. Insufficient employee training<\/h3>\n<p class=\"p1\">Many security issues and breaches are caused by human mistakes. This usually happens when an employee doesn\u2019t fully understand the corporate policy, particularly when it comes to the importance and details of device security. When training employees in device security, you should consider how best to disseminate information. For example, you might implement quarterly training sessions or have an employee read and sign a document stating they are aware of company policy. Keep in mind that insufficient training will likely result in unnecessary employee errors, which could compromise your company\u2019s security.<\/p>\n<h3>7. Shadow IT<\/h3>\n<p class=\"p1\">Shadow IT involves information technology being managed outside of the company\u2019s IT department without their knowledge or permission, and is a mounting concern in business environments. This happens more than you might think, as <span class=\"s2\"><a href=\"https:\/\/track.g2.com\/resources\/shadow-it-statistics\" target=\"_blank\" rel=\"noopener\">80% of workers<\/a> admit to using SaaS applications at work without getting approval from IT<\/span><span class=\"s3\">.<\/span> When employees bring in consumer-grade technologies and products without the supervision or management of the IT department or their MSP, a number of problems can be created. <span class=\"s3\">Any software or hardware an employee introduces without your review or approval introduces a potential risk, whether that&#8217;s a USB drive with potential malware on it or an open-source application with low security standards.<\/span><\/p>\n<h2 class=\"p5\">Safeguarding your MSP against the risks of BYOD<\/h2>\n<p class=\"p1\">Despite the associated risks, it doesn\u2019t look like the BYOD trend will go away anytime soon. In fact, whether or not companies implement a policy around the use of personal devices, it is almost inevitable that employees will bring them to work and connect to the corporate network. As such, it is crucial that MSPs and other businesses take steps to proactively reduce their risks. The best way to achieve this is by leveraging all-in-one <a href=\"https:\/\/www.n-able.com\/features\/byod-software\">MSP software with built-in features for managing mobile devices<\/a>.<\/p>\n<p class=\"p1\">N&#8209;able<sup>\u2122<\/sup> RMM is a remote monitoring and management tool that combines personal device management with <a href=\"https:\/\/www.n-able.com\/features\/managed-antivirus?promo=blog\" target=\"_blank\" rel=\"noopener\">cloud-based antivirus<\/a>\u00a0solutions, endpoint detection and response, remote access, and more into a single solution. This tool lets you secure and manage devices, helping you minimize risk with rapid, automated maintenance and setup of your complete mobile fleet. Key features include the ability to remotely lock phones, wipe devices, and reset passwords, all from within the user-friendly RMM console. <a href=\"https:\/\/www.n-able.com\/products\/rmm\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\">A 30-day free trial<\/a>\u00a0of RMM is available for download.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BYOD is on the rise\u2014find out what this means for MSPs and read about the risks your MSP should be aware of.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-20325","post","type-post","status-publish","format-standard","hentry","topic-remote-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 7 risks of bring your own device (BYOD) - N-able<\/title>\n<meta name=\"description\" content=\"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 7 risks of bring your own device (BYOD) - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T14:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T15:45:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/06\/210524_NA_Top7RisksOfBYOD_1200x628_v01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/06\/210524_NA_Top7RisksOfBYOD_1200x628_v01.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Top 7 Risks of Bring Your Own Device (BYOD) MSPs Should Remember\",\"datePublished\":\"2021-06-29T15:00:11+01:00\",\"dateModified\":\"2024-03-04T15:45:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\"},\"wordCount\":1344,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\",\"name\":\"Top 7 risks of bring your own device (BYOD) - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2021-06-29T15:00:11+01:00\",\"dateModified\":\"2024-03-04T15:45:10+00:00\",\"description\":\"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top 7 Risks of Bring Your Own Device (BYOD) MSPs Should Remember\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 7 risks of bring your own device (BYOD) - N-able","description":"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember","og_locale":"pt_BR","og_type":"article","og_title":"Top 7 risks of bring your own device (BYOD) - N-able","og_description":"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-06-29T14:00:11+00:00","article_modified_time":"2024-03-04T15:45:10+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/06\/210524_NA_Top7RisksOfBYOD_1200x628_v01.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/06\/210524_NA_Top7RisksOfBYOD_1200x628_v01.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Top 7 Risks of Bring Your Own Device (BYOD) MSPs Should Remember","datePublished":"2021-06-29T15:00:11+01:00","dateModified":"2024-03-04T15:45:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember"},"wordCount":1344,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember","url":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember","name":"Top 7 risks of bring your own device (BYOD) - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2021-06-29T15:00:11+01:00","dateModified":"2024-03-04T15:45:10+00:00","description":"Read about the most common risks and vulnerabilities associated with MSP bring your own device (BYOD) activities.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/the-top-7-risks-of-bring-your-own-device-msps-should-remember#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"The Top 7 Risks of Bring Your Own Device (BYOD) MSPs Should Remember"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/20325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=20325"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/20325\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=20325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}