Lesson 3.7 — Tablets and mobile devices: company-owned, BYOD and cloud access

This lesson helps the learner identify all tablets and mobile devices that are in scope for Cyber Essentials, including company-owned devices, personally owned devices used for business access, and devices that connect to organisational cloud services.

CE questionnaire questions: A2.8

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • create a checked inventory of in-scope tablets and mobile devices
  • record quantities
  • make and operating system versions
  • identify BYOD and mobile access risks
  • carry unresolved issues into the later secure configuration
  • update

Why This Matters

It explains why mobile devices must not be ignored just because they are not traditional computers.

The most common problems are:

  • assuming phones do not count;
  • counting only company-owned phones and ignoring personal phones used for work;
  • ignoring mobile access to cloud services;
  • saying “no mobile devices” while staff have work email on phones;

The Core Rule

A2.8 asks for the quantities of tablets and mobile devices in scope.

You must include make and operating system versions.

Common Mistakes

  • assuming phones do not count;
  • counting only company-owned phones and ignoring personal phones used for work;
  • ignoring mobile access to cloud services;
  • saying “no mobile devices” while staff have work email on phones;
  • ignoring directors’ phones;
  • ignoring contractor or volunteer phones;

Copy This

Work through the workbook activity for this lesson. Each question maps directly to the CE questionnaire.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What does A2.8 ask for?
  • [ ] Do devices that connect to cloud services need to be included?
  • [ ] Is a Cyber Essentials scope that excludes end-user devices acceptable?
  • [ ] Should personal phones used for work email be ignored because the organisation does not own them?
  • [ ] Is “iOS” or “Android” specific enough for A2.8?

Your Action

Do this now — it takes 10–20 minutes.

List all tablets and mobile devices in scope. Note which are company-owned and which are BYOD. Add to Section A2.

Key Takeaway

The mobile inventory created here feeds directly into secure configuration, security updates, user access control, MFA, malware protection and Cyber Essentials Plus preparation.

Your Workbook Activity

Complete: Tablet and mobile device inventory

This covers questionnaire questions: A2.8

Next Lesson

In the next lesson: Cloud services: SaaS, PaaS, IaaS and social media accounts