mexicancartel@lemmy.dbzer0.com to Memes@lemmy.mlEnglish · 1 year agoThey say use whatsapp, they say use zoomlemmy.dbzer0.comimagemessage-square122fedilinkarrow-up1853arrow-down123
arrow-up1830arrow-down1imageThey say use whatsapp, they say use zoomlemmy.dbzer0.commexicancartel@lemmy.dbzer0.com to Memes@lemmy.mlEnglish · 1 year agomessage-square122fedilink
minus-squareBobert@sh.itjust.workslinkfedilinkarrow-up57arrow-down1·edit-21 year agoI mean they’re not wrong, BYOD is an absolutely ginormous attack vector.
minus-squareChickenAndRice@sh.itjust.workslinkfedilinkarrow-up5arrow-down8·edit-21 year agoFor the user or the company? Assuming the user isn’t a moron with computers? Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine
minus-squareBobert@sh.itjust.workslinkfedilinkarrow-up13·1 year agoFor the company, and no one should ever assume for a moment that everyone has their guard up at all times and is infallible.
minus-squareMetype @lemmy.worldlinkfedilinkarrow-up2·1 year agoAs far as I’ve heard you actually assume quite the opposite.
minus-squarebufordt@sh.itjust.workslinkfedilinkarrow-up12·1 year ago Assuming the user isn’t a moron with computers? Lol
minus-squareContend6248@feddit.delinkfedilinkarrow-up2·edit-21 year agoIf a user doesn’t understand that not having complete control over every device in your network is essential, he’s being a complete moron with computers.
minus-squarecrispy_kilt@feddit.delinkfedilinkarrow-up5arrow-down9·1 year agoIf an organisations’ security relies on the end device configuration there is no security.
minus-squareContend6248@feddit.delinkfedilinkarrow-up3·1 year agoYou can bring your own devices, but you don’t get permission to access anything? Or what are you even trying to say about what the end users device being able to do anything
minus-squarecrispy_kilt@feddit.delinkfedilinkarrow-up0arrow-down1·1 year agoI don’t think I said anything about what a device can and cannot do
I mean they’re not wrong, BYOD is an absolutely ginormous attack vector.
For the user or the company? Assuming the user isn’t a moron with computers?
Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine
deleted by creator
For the company, and no one should ever assume for a moment that everyone has their guard up at all times and is infallible.
As far as I’ve heard you actually assume quite the opposite.
Lol
If a user doesn’t understand that not having complete control over every device in your network is essential, he’s being a complete moron with computers.
deleted by creator
If an organisations’ security relies on the end device configuration there is no security.
Who needs defense in depth, right?
You can bring your own devices, but you don’t get permission to access anything?
Or what are you even trying to say about what the end users device being able to do anything
I don’t think I said anything about what a device can and cannot do