Eh, it doesn’t need to be, you just need to do the work of putting together granular access controls that can account for your risk profiles.
The risk isn’t much different between a company owned telephone and a personal telephone.
They’re both susceptible to most of the same attacks, or being left on the bus.
PrettyFlyForAFatGuy@feddit.uk 1 year ago
In my current job the old manager okayed working on our own devices.
I would use my personal workstation to ssh into and do work on my work mac, did that for a few years. saved me disassembling my desk between uses every day or buying a costly KVM.
They seem to be getting a lot more uptight about security these days (although the “you can work on personal devices” rule hasnt been explicitly rescinded) so i have stopped interaction between my personal devices and work devices.
Having a M2 mac recently makes it easier, i can lie in bed and work pretty much all day on a single charge so my desk remains intact
pearsaltchocolatebar@discuss.online 1 year ago
I remote into my work laptop too, but I don’t have any work data on my personal devices. And, my desktop is more secure than my work laptop.