Always Beyond White Icon Logo Small
Is Your Business Secure?
Take our FREE 2-minute IT Security Scorecard and get instant insights—no strings attached.
👉 Start Assessment
Insights & Guides
Modern Managed Services

Corporate Mobile Phones, BYOD, and the Smarter Way to Run Both

Why a fixed mobile stipend beats company-paid plans, plus how Conditional Access and Intune app protection lock down BYOD phones without invading employee privacy.
May 22, 2026
5 mins read

Picture the scene every Canadian office manager knows. An employee leaves. They had a company iPhone. The carrier wants to confirm the SIM transfer, the previous person's voicemail still answers business calls, the device hasn't been wiped, and nobody can find the original IMEI on the asset list. Meanwhile someone else just got promoted and needs a phone today.

Multiply that by the number of staff who have business-issued phones, add the carrier admin time, the device refresh cycle, the lost handsets, the personal use grey areas, and the small but real possibility that your IT person knows everyone's voicemail PIN. It is rarely worth it.

There is a much cleaner answer. Pay people a fixed monthly amount toward their personal phone, and use Microsoft 365 to control your data inside their phone — not the device itself. This post walks through why that combination works for most Calgary and Canadian SMBs, what it costs, and the specific Conditional Access and app protection settings that make BYOD safe enough to actually use.

46%Of breached corporate logins came from BYOD or unmanaged devices
88%Of small business breaches involved ransomware
$1,674Average annual all-in cost of a company-issued phone (CAD equivalent)
~$50Typical monthly BYOD stipend that replaces it

Sources: Verizon 2025 Data Breach Investigations Report; Compt 2025 Lifestyle Benefits Benchmarking Study; Oxford Economics / Samsung Maximizing Mobile Value study.

The hidden cost of running a corporate mobile fleet

Most owners think of a company phone as the cost of the device plus the monthly plan. The Compt 2025 benchmarking data shows the actual figure is roughly three times that once everything is added in: hardware (~$652 per employee), the business plan (~$504 per year), MDM software (~$60 per year), and IT support and admin overhead (~$458 per year). All-in, that is around $1,674 per employee per year for a single corporate-liable line.

And that is before the operational tax that nobody puts on a spreadsheet. Someone has to:

  • Negotiate and renew the master agreement with Telus, Rogers, or Bell every two or three years.
  • Track the assets — who has which IMEI, who upgraded, who has a damaged device that needs replacing.
  • Handle on/off-boarding for every hire, departure, and role change, including SIM transfers and number ports.
  • Decode the carrier bill every month and reconcile any roaming charges, premium SMS, or feature add-ons.
  • Mediate the personal-use question — what is reasonable, what is taxable benefit territory, what counts as misuse.
  • Field the support requests from staff who would rather not deal with the carrier directly.
⚠️  If someone in your company already "handles the cell phones," calculate how many hours a month they spend on it. For most SMBs we work with at Always Beyond, the answer is between four and ten hours every month — time that does not contribute to the business in any way.

The argument for absorbing all of this used to be control: the company owns the line, the company controls the device, the company can wipe it. That argument is now weaker than it sounds. As we will get to in a moment, you can get all of the data control you actually need without owning the device at all.

The fixed stipend: pay it, forget it, move on

The simpler model is to pay a fixed monthly amount toward the employee's personal phone plan and let them use whatever device and carrier they prefer. The Oxford Economics/Samsung study found 98 percent of organizations with a BYOD policy provide a full or partial stipend, with most paying between $30 and $50 per month.

The numbers favour this approach almost regardless of how you cut them:

Cost componentCompany-paid lineBYOD with stipendAnnual difference
Device~$652 amortizedEmployee-owned~$652 saved
Plan~$504/year~$480-600/year stipendRoughly equal
MDM software~$60/year/deviceNot required (use MAM)~$60 saved
Admin & support~$458/yearNear zero~$458 saved
All-in per employee~$1,674/year~$480-600/year~$1,000+ saved

Figures are approximate and drawn from the Compt 2025 benchmarking study and Oxford Economics survey data. Actual numbers vary by employer size, carrier negotiation leverage, and stipend amount.

Why employees usually prefer it too

Most people would rather carry one device than two. They get to choose their handset, keep their phone number across jobs, upgrade on their own schedule, and stop juggling two chargers. As long as the stipend is fair and the security model does not feel invasive, BYOD is genuinely the more popular option.

✅  Pick a stipend that lands at or slightly above the median Canadian unlimited plan. $50 to $75 per month covers virtually every staff member, removes the "is this enough?" friction, and is still cheaper than any company-paid alternative once admin time is counted.

When a corporate phone still makes sense

BYOD is not for everyone. There are roles where a company-owned device is genuinely the right call:

  • Frontline or field roles where the phone takes physical abuse, gets dropped, or is shared between shifts.
  • Highly regulated environments where every device needs to be locked down end-to-end (full MDM rather than just MAM).
  • Executives or specific roles where the company wants to provide premium hardware as part of compensation.

For most office staff in a typical Calgary SMB, none of these apply. The stipend model wins on cost, simplicity, and employee experience.

The middle path: company-owned number on the employee's phone (eSIM)

There is one scenario that does not fit neatly into either bucket: when the company wants to own the phone number — typically because it is published on a website, business card, CRM record, or in a customer's address book — but does not particularly want to own the hardware or manage another device. A salesperson's direct line, a dispatcher's number, or a leadership member's published mobile are all examples. If that person leaves, you want the number to stay with the role, not walk out the door.

The clean solution is an eSIM provisioned on the employee's personal phone. Modern iPhones and most current Android devices support dual-SIM via eSIM, which means a single device can carry both a personal line and a separate company-owned line side by side, with their own numbers, their own bills, and their own usage. The company pays the carrier directly for the corporate eSIM line. The employee runs their personal line however they like.

💡  The cleanest setup at most Canadian carriers is a separate business account in the company's name with the eSIM line provisioned to the employee's device. When the employee leaves, the carrier deactivates that eSIM and ports the number to whoever takes over the role — usually the same day. The personal half of the phone is never touched.

Why this works better than a second physical phone

It captures every benefit of corporate-owned numbers without most of the cost or admin:

  • Number ownership: The line is on the company's account. When someone leaves, the number stays.
  • No second device: No hardware purchase, no second charger, no "which phone is ringing," no employees forgetting their work phone at home.
  • Same MAM controls apply: Outlook, Teams, OneDrive, and Edge are still protected by the Intune app protection policy described later in this post — the security model does not change.
  • Cleaner separation: Personal calls and texts go through one number, work calls and texts go through the other. The employee can silence the work line after hours without missing personal calls.
  • Lower stipend, or no stipend: Because the company is paying the corporate line directly, the personal-line stipend can be reduced or removed entirely for these roles.
⚠️  A few practical notes. The phone must support eSIM — most iPhones from XS onward and most flagship Android devices from the last few years do, but older or budget Android handsets often do not. The employee also needs to be willing to add a corporate line to their personal device, which is a different conversation than installing work apps. Always Beyond can scope which roles are good candidates and handle the carrier coordination.

The real BYOD security risk (and why it isn't the device)

Whenever we propose moving a client to a stipend model, the next question is always the same: isn't BYOD a security nightmare? It can be — but probably not for the reasons people think.

The Verizon 2025 Data Breach Investigations Report flagged BYOD as a major exposure point: 46 percent of devices found in infostealer logs with corporate credentials were unmanaged personal devices. That number is striking, but the underlying problem is not really "the phone" — it is that work data was on a phone where the organization had no controls of any kind.

What actually goes wrong

The real-world BYOD incidents we see at Always Beyond fall into four buckets:

  • Smishing and mobile phishing. An employee gets a text message pretending to be from the CEO or a vendor, taps a link, and enters their Microsoft 365 password into a fake login page. The attacker now has a credential and goes after email.
  • Personal apps with corporate data. An employee forwards a contract to their Gmail to print at home, or saves a customer list into a personal note-taking app. Nothing was malicious — but the data is now outside your control.
  • Lost or stolen devices. Phone gets left in an Uber. The screen lock is a four-digit PIN. Email and OneDrive are signed in and there is no remote wipe option because the device was never enrolled or protected.
  • Departures. Someone quits. Their personal phone still has the Outlook app signed into your tenant, the OneDrive cache, and a copy of the customer pipeline. Without the right controls, you have no clean way to remove your data.
🚨  The single largest BYOD risk for Canadian SMBs is not malware on the phone. It is corporate data being copied out of work apps into personal apps, personal cloud storage, or screenshots — quietly, by good people doing their job. PIPEDA and Quebec's Law 25 hold the organization accountable for that data wherever it ends up.

MAM, MDM, and the difference that matters for BYOD

There are two ways to control a phone with Microsoft 365. Most owners only know about the heavy one, which is part of why BYOD feels riskier than it actually is.

Mobile Device Management (MDM) takes control of the entire device. The company can require a passcode, disable the camera, force encryption, and remotely wipe everything. It is the right tool for company-owned phones. It is the wrong tool for BYOD — most employees will not let you fully manage their personal phone, and frankly they should not have to.

Mobile Application Management (MAM), implemented through Intune App Protection Policies, takes a different approach. It does not touch the device. It controls the work apps — Outlook, Teams, OneDrive, Word, Excel, Edge — and the data inside them. The personal half of the phone is untouched.

CapabilityMDM (full device)MAM (app-level)
Best forCompany-owned devicesBYOD / personal devices
Require PIN/biometricOn the whole phoneOn work apps only
Force encryptionYes, device-wideYes, on work data only
Block copy/paste to personal appsYesYes
Block backup of work data to iCloud/GoogleYesYes
Remote wipeWipes the entire deviceWipes only work data
Visible to employee personal usageYes — IT can see everythingNo — personal half is private
Employee privacy concernsHighLow
💡  The MAM model is the answer to the privacy objection most employees have about BYOD. You are not watching what they do on their phone. You are not seeing their photos, their browsing, or their personal apps. You are putting a locked container around the work data — and only the work data.

Conditional Access: the policy that makes it actually work

MAM on its own is not enough. If an employee can sign into Outlook in a web browser, or use the iPhone built-in Mail app instead of Outlook, the protection is bypassed. This is where Conditional Access does the heavy lifting.

Conditional Access is a Microsoft Entra (formerly Azure AD) feature that evaluates every sign-in against a set of rules and decides whether to allow it, block it, or require something more — such as multi-factor authentication or a managed app. For BYOD mobile, the rule that matters is this: if you are signing in from a phone, you must be using an Intune-protected app.

📋  The current best-practice grant control is "Require app protection policy." Microsoft has confirmed that the older "Require approved client app" control retires in early March 2026 and should not be used in new policies. "Require app protection policy" is the modern equivalent and is what Always Beyond deploys today.

What this looks like in practice for your team

Once configured, the experience for an employee is straightforward. The first time they try to access work email or files on their personal phone:

  1. They are redirected to install the Outlook app and Microsoft Authenticator (or Company Portal on Android).
  2. They sign in with their work account.
  3. The phone registers with Microsoft Entra (a lightweight identity record — not full enrollment).
  4. Intune applies the app protection policy — they will be asked to set a separate work PIN, and the app starts enforcing the data rules.
  5. After that, work email "just works" inside Outlook, work files inside OneDrive, work chat inside Teams. The built-in iPhone Mail app and similar non-protected apps are blocked from the tenant entirely.

What gets blocked, and what stays personal

When the policy is in place, the phone behaves like this:

  • Inside work apps (Outlook, Teams, OneDrive, Word, Excel, Edge in work mode): full access, with the protections active.
  • Outside work apps (Apple Mail, Gmail app, third-party email clients, browser tabs without identity protection): blocked from accessing your tenant.
  • Copy/paste from a work email into a personal app: blocked, or stripped, depending on policy.
  • Save As from a work document to the personal Files app or iCloud: blocked. Saving back to OneDrive for Business: allowed.
  • Screenshots of work data on Android: blocked. (iOS does not allow this without full MDM, which is a fair trade-off for BYOD.)
  • Personal usage — calls, texts, Instagram, banking apps, photos: completely untouched and invisible to the company.

Always Beyond's BYOD mobile baseline

When we onboard a client to this model, the configuration we deploy as a default is built around Microsoft's Level 2 ("Enterprise Enhanced") data protection framework, which is the recommendation Microsoft itself makes for most organizations. The settings cluster into three buckets:

1. Identity and access

  • Conditional Access policy: On iOS and Android, accessing Microsoft 365 cloud apps requires a sign-in from an app with an Intune app protection policy applied.
  • Block legacy authentication: Older mail protocols (IMAP, POP, basic auth Exchange ActiveSync) are blocked tenant-wide. They cannot be made safe.
  • MFA enforced for all sign-ins from mobile devices.

2. Work app protection

  • Work PIN: Six-digit minimum, distinct from the device passcode, required when launching a work app after idle time.
  • Encryption: All organizational data inside work apps is encrypted at rest.
  • Save As: Permitted only to OneDrive for Business and SharePoint. Blocked to local storage, iCloud Drive, Google Drive, Dropbox, and personal accounts.
  • Cut/copy/paste: Limited to other policy-managed apps. Pasting into a personal app is blocked or sanitized.
  • Backup: Work data is excluded from iCloud and Google cloud backups.
  • Open-in: Work files can only be opened in other policy-managed apps, not personal apps.

3. Conditional launch

  • Jailbreak/root detection: Compromised devices are blocked from accessing work data.
  • Minimum OS version: Older iOS or Android versions that no longer receive security updates are blocked.
  • Offline grace period: If a device cannot check in for a defined period, work data is wiped from the work apps automatically.
  • Selective wipe on departure: When an employee leaves, IT removes only the corporate data inside the work apps. The personal half of the phone is untouched.
✅  The selective wipe is the offboarding feature that makes the entire model worth doing. Within 60 seconds of the offboarding ticket, the departing employee's Outlook, Teams, OneDrive, and Office app data — every email, file, and cached document — is gone from their phone. Their personal photos, contacts, and apps are exactly where they left them.

Don't forget the mobile phishing angle

Even with strong app protection, the phone screen is still a phishing surface, and a particularly effective one. SMS messages do not look or feel like email. There is no obvious "From" header. URLs are usually shortened. There is no security training poster taped to the phone case.

Smishing (SMS phishing) campaigns aimed at Canadian businesses typically follow predictable patterns:

  • Fake CEO texts: "Hi, this is Shawn — are you free? I need a quick favour." Sent on a Friday afternoon, often during a known leadership absence.
  • Fake delivery notifications: "Canada Post: your parcel is held — confirm address: [link]." The link harvests Microsoft 365 credentials.
  • Fake banking alerts: Pretending to be from RBC, BMO, or TD, often with the company name in the message body.
  • Fake MFA prompts: Push fatigue / prompt bombing. Verizon 2025 noted prompt bombing as a top new attack technique.

⚠️  Report fraudulent texts to the Canadian Anti-Fraud Centre (CAFC) and forward suspicious SMS to 7726 (SPAM) — most Canadian carriers honour this and use it for network-level blocking. Always Beyond can build phishing-aware reflexes into your team's training cadence so these messages get reported, not clicked.

Putting it together: what the right model looks like

For most Canadian SMBs, the answer is rarely "all corporate phones" or "BYOD with no controls." It is a clear, tiered model:

  1. Pay a fixed monthly stipend (typically $50-$75 CAD) to anyone whose role requires mobile email, calls, or messaging. Add it to payroll, document the policy, and stop being in the carrier business.
  2. Use a company-owned eSIM on the employee's personal phone for roles where the phone number itself is a business asset (sales, dispatch, leadership lines). Same device, two numbers, the company keeps the line.
  3. Enforce Microsoft 365 controls on every phone that touches work data using Intune app protection policies and Conditional Access — so the work data stays inside Outlook, Teams, OneDrive, Word, Excel, and Edge, and nowhere else.
  4. Keep a small fleet of company-owned phones for the specific roles where it genuinely matters (frontline, regulated functions, shared-shift devices), and apply MDM to those.
  5. Train people regularly on mobile-specific phishing patterns. The phone is the device most likely to be used outside business hours, when guard is down.
💡  The end state is unglamorous but powerful: a leaner mobility line item on the budget, a quiet inbox for whoever "handles the phones," stronger data protection than most enterprises had five years ago, and an offboarding process that takes less than a minute. None of this requires you to know what "Conditional Access" means — but your IT partner should.

Frequently asked questions

Is it legal to require security controls on a personal phone we don't own?

Yes, with a clear written BYOD policy. PIPEDA and Quebec's Law 25 require organizations to protect personal information they hold, regardless of where it sits — which means you are legally on the hook for work data on personal phones whether you have controls or not. The policy simply needs to spell out what the company sees (only work data inside work apps), what it does not see (everything else), and what happens at offboarding (selective wipe of work data only). Always Beyond provides this policy template as part of our mobile rollout.

What does the employee actually have to install on their phone?

The Microsoft Outlook app, the Microsoft Authenticator app (on iOS), or the Intune Company Portal app (on Android, used for sign-in only — not full enrollment), and any other Microsoft work apps they use such as Teams, OneDrive, Word, or Excel. They are all free, all from the official app stores, and the install takes a few minutes. The Authenticator and Company Portal apps do not give the company any visibility into the personal phone.

Can we still wipe the phone if it's lost or stolen?

You can wipe the work data — instantly. The personal data on the device is the employee's responsibility (their iCloud/Google backup, Find My iPhone, etc.). For lost-device scenarios this is actually a feature, not a limitation: the employee deals with their personal account and you deal with your corporate data, and neither side is touching the other.

How is the stipend taxed in Canada?

Canada Revenue Agency generally treats a reasonable mobile stipend as a non-taxable allowance when the phone is genuinely required for work and the amount is consistent with actual costs. We recommend confirming the structure with your accountant — most clients we work with treat it as a non-taxable benefit at $50-$75 per month, but the right structure depends on your payroll setup. Always Beyond can connect you with our partner accounting firms if you do not already have advice on this.

What if an employee refuses to install the work apps on their personal phone?

This is rare but happens. The clean answer in your BYOD policy is that mobile access to corporate email and files is a privilege that requires the security controls — not a right. Employees who decline the controls do not access work data on their phone, and instead use a desktop or laptop. For roles where mobile access is essential (sales, leadership, on-call IT), provide a company-owned phone with full MDM. Most employees, once they understand the controls only touch work apps, opt into the BYOD model without issue.

Does this work with Google Workspace instead of Microsoft 365?

The architecture is similar but the tooling is different. Google offers app management and context-aware access, which provides equivalent (though not identical) controls. Most of our Calgary SMB clients run Microsoft 365, which is why this post focuses on Intune and Conditional Access. If you are on Google Workspace, reach out and we will walk through the equivalent controls.

If we provide a company eSIM on a personal phone, is that a taxable benefit?

Generally no, when the corporate line is genuinely required for work and is used primarily for business calls and texts. The CRA's framework for employer-provided phone service is the same whether the line lives on a company-owned device or as an eSIM on a personal device — what matters is the business purpose, not the SIM. As with the stipend question, confirm with your accountant; the structure is straightforward but the right tax treatment depends on your overall payroll setup.

Ready to get out of the carrier business and put real controls on BYOD? Always Beyond scopes and deploys the entire mobile model — stipend policy, Microsoft Entra Conditional Access, Intune app protection, BYOD policy template, and end-user rollout — as a single project. Reach out to start the conversation.
On this page

Ready to Make IT One Less Thing to Worry About?

Book a no-pressure consultation to see how Always Beyond can help you simplify, secure, and future-proof your IT.

See exactly how your current IT setup measures up to our Hack Free standards. Enter your business email to receive:

  • Free 10-point security scorecard for your business
  • Complete Hack Free Guarantee eligibility checklist
  • Exclusive case studies from our protected clients