Chapter 9
Juliet Capulet Rolls Out BYOD at Verona Health
Juliet Capulet, Security Awareness Trainer at Verona Health (a 4,000-employee regional hospital network), is the operational lead on a long-delayed BYOD program. Clinicians want to use their personal phones for secure messaging, on-call notifications, and EHR access at bedside. The CFO wants to stop buying corporate phones for every nurse. The CISO wants to make sure the next breach report does not name Verona Health.
The pre-rollout state is unsettling. Several hundred clinicians have already self-enrolled their phones in the EHR vendor's mobile app using only their Active Directory passwords — no MFA, no posture check, no way to know which devices are jailbroken or running an unpatched OS. The corporate WLAN is one flat SSID with a single shared PSK that has not rotated in three years; guest, BYOD, and the building's IoT cameras all share the same Layer-2 segment. Email security is similarly behind: SPF is set to soft-fail and there are no DKIM signatures or DMARC policy at all. The corporate recursive resolver has no validation enabled, so a downstream poisoned response would be accepted without question. The CMDB has not been reconciled with reality in over a year, and a recent ransomware tabletop exercise revealed that nobody could produce an accurate list of EHR-adjacent endpoints.
Juliet's six-month program must address all of this — endpoint posture for BYOD, wireless segmentation, email authentication, DNS integrity, change/asset discipline, and an honest plan for the legacy MRI workstation that runs Windows 7 and cannot be replaced for two years.
Complete Juliet's BYOD and network-hardening plan by selecting the correct option for each blank.