mexicancartel@lemmy.dbzer0.com to Memes@lemmy.mlEnglish · 11 months agoThey say use whatsapp, they say use zoomlemmy.dbzer0.comimagemessage-square115fedilinkarrow-up1947arrow-down128
arrow-up1919arrow-down1imageThey say use whatsapp, they say use zoomlemmy.dbzer0.commexicancartel@lemmy.dbzer0.com to Memes@lemmy.mlEnglish · 11 months agomessage-square115fedilink
minus-squareBobert@sh.itjust.workslinkfedilinkarrow-up63arrow-down1·edit-211 months agoI mean they’re not wrong, BYOD is an absolutely ginormous attack vector.
minus-squarecrispy_kilt@feddit.delinkfedilinkarrow-up7arrow-down11·11 months agoIf an organisations’ security relies on the end device configuration there is no security.
minus-squareBobert@sh.itjust.workslinkfedilinkarrow-up4·11 months agoWho needs defense in depth, right?
minus-squareContend6248@feddit.delinkfedilinkarrow-up3·11 months agoYou can bring your own devices, but you don’t get permission to access anything? Or what are you even trying to say about what the end users device being able to do anything
minus-squarecrispy_kilt@feddit.delinkfedilinkarrow-up1arrow-down1·11 months agoI don’t think I said anything about what a device can and cannot do
minus-squareChickenAndRice@sh.itjust.workslinkfedilinkarrow-up5arrow-down11·edit-211 months agoFor the user or the company? Assuming the user isn’t a moron with computers? Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine
minus-squareAeroLemming@lemm.eelinkfedilinkEnglisharrow-up14·11 months agoBoth. The company puts shit on the user’s computer and the user may not meet the company’s security standards. It’s just a bad idea.
minus-squarebufordt@sh.itjust.workslinkfedilinkarrow-up14·11 months ago Assuming the user isn’t a moron with computers? Lol
minus-squareBobert@sh.itjust.workslinkfedilinkarrow-up13·11 months agoFor the company, and no one should ever assume for a moment that everyone has their guard up at all times and is infallible.
minus-squareMetype @lemmy.worldlinkfedilinkarrow-up2·11 months agoAs far as I’ve heard you actually assume quite the opposite.
minus-squareContend6248@feddit.delinkfedilinkarrow-up2·edit-211 months agoIf a user doesn’t understand that having complete control over every device in your network is essential, he’s being a complete moron with computers. You should do your work, not worrying about patching all the 128 tools you think you need, that’s other peoples job.
I mean they’re not wrong, BYOD is an absolutely ginormous attack vector.
If an organisations’ security relies on the end device configuration there is no security.
Who needs defense in depth, right?
You can bring your own devices, but you don’t get permission to access anything?
Or what are you even trying to say about what the end users device being able to do anything
I don’t think I said anything about what a device can and cannot do
For the user or the company? Assuming the user isn’t a moron with computers?
Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine
Both. The company puts shit on the user’s computer and the user may not meet the company’s security standards. It’s just a bad idea.
Lol
For the company, and no one should ever assume for a moment that everyone has their guard up at all times and is infallible.
As far as I’ve heard you actually assume quite the opposite.
If a user doesn’t understand that having complete control over every device in your network is essential, he’s being a complete moron with computers.
You should do your work, not worrying about patching all the 128 tools you think you need, that’s other peoples job.
deleted by creator