Get a Pentest and security assessment of your IT network.

Cyber Security

Employer Monitoring: Personal Device Home Network

TL;DR

Whether your employer can see your home network usage on a personal device depends heavily on what software they’ve installed, the agreements you signed, and how you connect to their resources. It’s likely they *can* monitor activity related to work, but full access to your browsing history is less common without explicit consent or legal justification. Protect yourself by using separate profiles/devices for work and personal use.

Understanding the Risks

Employers often need to secure company data. This leads them to implement monitoring solutions on devices used for work, even if those are personally owned (BYOD – Bring Your Own Device). Here’s a breakdown of what they might be able to see:

What Can Your Employer See?

  1. Company Email & Apps: They almost certainly monitor activity within company email accounts, messaging apps (Slack, Teams), and cloud storage services.
  2. VPN Connections: If you connect to the company network via a VPN, they can see all traffic passing through that connection. This includes websites visited while connected.
  3. MDM Software: Mobile Device Management (MDM) software gives employers significant control over devices. They may be able to track location, install/remove apps, and monitor data usage.
  4. Endpoint Detection & Response (EDR): EDR solutions are more advanced security tools that can detect threats on your device. They often log detailed activity, including website visits and application usage.
  5. Web Filtering: Some companies use web filters to block access to certain websites or categories of websites. This means they know what sites you’re trying to reach.

What Can’t Your Employer See (Usually)?

Without specific software installed, your employer generally *cannot* see:

  • Browsing History: Unless they have MDM or EDR software installed, they typically can’t access your full browsing history on personal devices.
  • Personal App Usage: They shouldn’t be able to monitor apps you use that aren’t related to work.
  • Direct Network Traffic: Without a VPN connection or specific monitoring software, they won’t see all the data flowing through your home network.

How to Check for Monitoring Software

  1. Review Your Employment Agreement: Look for clauses about device usage, monitoring policies, and BYOD agreements.
  2. Check Installed Applications: On Windows:
    Control Panel > Programs > Programs and Features

    On macOS:

    Applications folder

    Look for unfamiliar software with names related to security, device management, or endpoint protection.

  3. Task Manager/Activity Monitor: Check running processes for suspicious activity.
    • Windows:
      Ctrl + Shift + Esc
    • macOS:
      Cmd + Spacebar, type 'Activity Monitor'
  4. Network Settings (Advanced): Look for VPN profiles or unusual network configurations.

Steps to Protect Your Privacy

  1. Separate Work & Personal Devices: The best solution is to use a dedicated device for work and another for personal activities.
  2. Use Separate Browser Profiles: If you must use the same device, create separate browser profiles for work and personal browsing. This helps isolate your activity.
  3. Be Careful with VPNs: Understand that anything you do while connected to a company VPN is likely monitored.
  4. Review App Permissions: Regularly check the permissions granted to apps on your device. Revoke unnecessary access.
  5. Use Strong Passwords & Two-Factor Authentication: Protect your accounts with strong, unique passwords and enable two-factor authentication whenever possible.

cyber security Best Practices

Remember that even if your employer isn’t actively monitoring you, it’s always good practice to maintain good cyber security habits. This includes keeping your software up to date, being cautious about clicking on suspicious links, and using a strong antivirus program.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation