Skip to main content

Personal devices touch company data,
whether you have a policy or not.

Most SMBs let staff check email on personal phones. Very few have written down what is allowed and what is not. The policy gap shows up the day a staff member leaves with a phone full of client data.

Get the template, sent to your inbox

Your email + business name. That's all. We send the PDF immediately and add you to Tech News Monthly (unsubscribe any time).

Download the template

Instant access. No credit card, no phone call.

By downloading you agree to receive Tech News Monthly (monthly summary of cyber + IT news for Aus SMBs). Unsubscribe any time. See our privacy policy.

What's inside

  • A ready-to-issue BYOD policy you can deploy with onboarding paperwork
  • Clear sections on minimum device requirements, enrolment, and what the company can wipe
  • A line on what the company cannot do (your staff need to know this too)
  • A signature block that creates a record

Format

10-page PDF · A4 · ~321 KB · readable on any device

Written for Australian SMB owners and HR managers

You'll get value from this if

  • You let staff use personal phones or laptops for work but never wrote down the rules
  • You are about to roll out Microsoft 365 and want a BYOD policy to go with it
  • A staff member just left and you are not sure what data left with them

This is not

  • A legal-grade contract (have your HR or legal advisor review before publishing)
  • A device management tool (the policy is the rules; you still need Intune or equivalent to enforce them)
  • An employment agreement

Cyber Posture Snapshot

Your details 1 / 10

How exposed is your business?

Six quick questions, two short ones to tailor the result, and you'll see where your business stands. About two minutes. Plain English, no jargon.

We'll use your email to send a copy of your result. No spam, no pushy sales calls.

Question 1 of 9

When your team logs in to email and business apps, do they need a code from their phone as well as a password?

Question 2 of 9

If a ransomware attack locked all your files tomorrow, could you restore them from a backup?

Question 3 of 9

When Microsoft or Apple release a critical security update, how fast does it land on your computers?

Question 4 of 9

How many people in your business can install software or change system settings on any work computer?

Question 5 of 9

If a staff member got a fake invoice or "urgent" email pretending to be from you right now, what would happen?

Question 6 of 9

When a staff member leaves, when does their access to email, files, and apps actually get cut off?

Question 7 of 9

How many people work in your business?

Question 8 of 9

Who looks after your IT today?

Question 9 of 9

What sort of business are you?

Tailoring your result...

Hi there, here's where your business stands.

Your Cyber Posture
Critical gaps Critical
Notable exposure Notable
Mixed picture Mixed
On the right track On track

Notable exposure

Your two biggest gaps

  1. 1
  2. 2

Where this leaves you on Essential Eight

  • MFA Multi-factor authentication
  • Backups Regular backups
  • Patching Covers 2 of 8: Patch applications + Patch operating systems
  • Admin access Restrict administrative privileges

This snapshot covers 5 of the 8 Essential Eight controls. The full IT Maturity Assessment covers all 8, plus Microsoft 365 hardening, device management, and staff training.