this post was submitted on 16 Aug 2023
904 points (97.1% liked)

Memes

44108 readers
2975 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] testuserpleaseupvote 96 points 10 months ago (4 children)

Oh, wait until you get a job in most offices. Microsoft, Microsoft everywhere.

BYOD with Linux? "We can't install the company's spyware on it, get that security risk out of here."

[–] [email protected] 62 points 10 months ago* (last edited 10 months ago) (2 children)

I mean they're not wrong, BYOD is an absolutely ginormous attack vector.

[–] [email protected] -4 points 10 months ago (2 children)

If an organisations' security relies on the end device configuration there is no security.

[–] [email protected] 4 points 10 months ago

Who needs defense in depth, right?

[–] [email protected] 3 points 10 months ago (1 children)

You can bring your own devices, but you don't get permission to access anything?

Or what are you even trying to say about what the end users device being able to do anything

[–] [email protected] 0 points 10 months ago

I don't think I said anything about what a device can and cannot do

[–] [email protected] 54 points 10 months ago (1 children)

When you're supporting ten thousand machines on four continents and confirming to twenty different data protection doctrines the last thing you need is some neckbeard rocking up demanding to store data in their unauditable homebrew fork of Haiku or some shit.

[–] [email protected] 10 points 10 months ago

What is achieved with GPOs and agents is compliance, not security.

In other words, company issued devices don't protect the data, but they ensure conformity with relevant regulations and standards. Which is what most organisations actually care about.

Many good IT people really do care about actual information security, but not those in charge.

The result are devices that hinder some people's work but provide questionable actual security.

[–] MindSkipperBro12 11 points 10 months ago

Look! A Linux user! SCATTER, BEFORE HE CATCHES YOU!!