this post was submitted on 29 Oct 2024
24 points (100.0% liked)
Cybersecurity
5677 readers
114 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Work laptop or personal laptop?
If it's a work-supplied laptop then it's their device, and you should not use it for personal stuff. Always assume that company-supplied devices are monitored. Having said that, IT won't sit there watching your every move, but they will care if you watch porn or download torrents.
If it's a personal laptop then they can go pound salt.
As someone that has managed MDM platforms before, I absolutely agree with this. If it’s a work laptop, then yeah they have the right to install MDM on it. If it’s a personal laptop, I really wouldn’t recommend it.
MDM gives the admins full control over the device. They can run commands to wipe the device, install software, set policies, gather inventory data, or any custom action they want.
The MDM platforms I’ve used can’t be used to spy on people, but they absolutely have the power to install software or run scripts that can spy on you. IT probably doesn’t have time to actually watch individual employees, but anything they do likely has a built in report that can give data on who did what, prioritizing based on whatever the company is looking for.
Always assume that companies are monitoring everything going on with the computers and WiFi networks that they own. They likely are checking things out to make sure activity is safe and appropriate.
This is the correct answer. Assuming it’s a work owned device, the answer to “can they monitor me?” is always yes.
However, unless you’re constantly tripping their automated alarms, or management has come to them with a productivity issue about you, they’re not gonna do much.
Work laptop of course, if it was my personal device I wouldn't even care what they say. I think I'm going to isolate my work laptop from my home network now though.
This is always a good idea. Your work IT department doesn't trust you, and you shouldn't trust them.
Hey I don't know your technical capability, but Steve Gibson pointed out the lowest knowledge way to get an isolated network just by buying two more cheap NAT routers. Your current router stays routing internet, but in LAN1 you plug in one of the new routers, let's call it your home network, and LAN2 of your internet router plug in the other router and call it insecure. Plug in your WiFi access points into home and your devices. Plug in work laptop and other IoT to insecure. Home won't be able to talk to insecure, and insecure can't talk to home. This is all because of NAT. Just make sure the home network range is a different range to the insecure.
Otherwise it's just a vlan on router and switches and access points with no firewall rules that allow INSECURE to HOME.
You might already know all this in which case never mind!
https://www.grc.com/nat/nat.htm
Thanks, I did know that but I'm glad it is here for anyone else who may need to know.
HR might care, IT probably not.
In IT, and have been since 99. I cared more about porn(adware, viruses, etc used to be more frequent on them) than other groups I expected to caresometimes. A regional managers laptop was acting slow, so sent back to us. During cleanup I found porn among other issues, and reported it to their manager. The response was basically:
"How much longer before you can return the laptop to them?" They just wanted em up and running again. Now at an MSP, and we've found porn on fileservers, often time by the owners of the company.
Yeah it's generally advised to avoid trying to solve a HR problem with technology or at least with anything complicated.