You are viewing a single thread.
View all comments View context
0 points
*

I mean they’re not wrong, BYOD is an absolutely ginormous attack vector.

permalink
report
parent
reply
0 points

If an organisations’ security relies on the end device configuration there is no security.

permalink
report
parent
reply
1 point

Who needs defense in depth, right?

permalink
report
parent
reply
0 points

You can bring your own devices, but you don’t get permission to access anything?

Or what are you even trying to say about what the end users device being able to do anything

permalink
report
parent
reply
0 points

I don’t think I said anything about what a device can and cannot do

permalink
report
parent
reply
0 points
*

For the user or the company? Assuming the user isn’t a moron with computers?

Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine

permalink
report
parent
reply
0 points
*

If a user doesn’t understand that having complete control over every device in your network is essential, he’s being a complete moron with computers.

You should do your work, not worrying about patching all the 128 tools you think you need, that’s other peoples job.

permalink
report
parent
reply

Memes

!memes@lemmy.ml

Create post

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

Community stats

  • 11K

    Monthly active users

  • 5.8K

    Posts

  • 39K

    Comments