24
Can MDM software be used to spy on employee ?
(sh.itjust.works)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
Work laptop of course, if it was my personal device I wouldn't even care what they say. I think I'm going to isolate my work laptop from my home network now though.
This is always a good idea. Your work IT department doesn't trust you, and you shouldn't trust them.
Hey I don't know your technical capability, but Steve Gibson pointed out the lowest knowledge way to get an isolated network just by buying two more cheap NAT routers. Your current router stays routing internet, but in LAN1 you plug in one of the new routers, let's call it your home network, and LAN2 of your internet router plug in the other router and call it insecure. Plug in your WiFi access points into home and your devices. Plug in work laptop and other IoT to insecure. Home won't be able to talk to insecure, and insecure can't talk to home. This is all because of NAT. Just make sure the home network range is a different range to the insecure.
Otherwise it's just a vlan on router and switches and access points with no firewall rules that allow INSECURE to HOME.
You might already know all this in which case never mind!
https://www.grc.com/nat/nat.htm
Thanks, I did know that but I'm glad it is here for anyone else who may need to know.