SB198 Does not use unapproved device for work purposes
Using unapproved devices for work purposes increases security risks. This could be for a variety of reasons including things such as the absence of effective security controls or malware protection. Unapproved devices are also less likely to be set up in such a way that makes it easy for security teams can manage risk to you or your organisation in the event of a cyber attack.
Why is it important?
Using unapproved devices for work activity negates the security controls and protections that are in place on company-approved devices. With unapproved devices, risk increases alongside the inability for security teams to respond to security incidents.
Priority Tier
Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Risk Mitigated

Malware Infection
Malware infections occur when malicious software makes its way on to a device or network.

Data Leak
A data leak is when data is accidentally or intentionally disclosed to unauthorised people.

Data Theft
Data theft is the intentional stealing of data.
Further reading
https://www.core.co.uk/blog/byod-effect-security-risks-personal-devices-work
https://www.zdnet.com/article/stop-using-your-work-laptop-or-phone-for-personal-stuff-because-i-know-you-are/