• crispy_kilt@feddit.de
      link
      fedilink
      arrow-up
      7
      arrow-down
      11
      ·
      11 months ago

      If an organisations’ security relies on the end device configuration there is no security.

      • Contend6248@feddit.de
        link
        fedilink
        arrow-up
        3
        ·
        11 months ago

        You can bring your own devices, but you don’t get permission to access anything?

        Or what are you even trying to say about what the end users device being able to do anything

    • ChickenAndRice@sh.itjust.works
      link
      fedilink
      arrow-up
      5
      arrow-down
      11
      ·
      edit-2
      11 months ago

      For the user or the company? Assuming the user isn’t a moron with computers?

      Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine

      • AeroLemming@lemm.ee
        link
        fedilink
        English
        arrow-up
        15
        ·
        11 months ago

        Both. The company puts shit on the user’s computer and the user may not meet the company’s security standards. It’s just a bad idea.

      • Bobert@sh.itjust.works
        link
        fedilink
        arrow-up
        14
        ·
        11 months ago

        For the company, and no one should ever assume for a moment that everyone has their guard up at all times and is infallible.

      • Contend6248@feddit.de
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        11 months ago

        If a user doesn’t understand that having complete control over every device in your network is essential, he’s being a complete moron with computers.

        You should do your work, not worrying about patching all the 128 tools you think you need, that’s other peoples job.