A new survey shows that the vast majority of senior executives say would’ve approached their return-to-work push “differently.”

  • couragethebravedog@lemmy.world
    link
    fedilink
    arrow-up
    22
    arrow-down
    5
    ·
    edit-2
    1 year ago

    Security is definitely a legitimate argument for some companies. The average home network is nowhere near as secure as an enterprise network and BYOD is not nearly as secure as the systems setup and managed by your organization.

    Edit: Everyone saying “use a VPN that’s how you secure your home” needs to do more research. I have a comment below explaining how just using a VPN doesn’t make you safe.

    • silvercove@lemdro.id
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      3
      ·
      1 year ago

      I doubt it. The home network does not need to be secure. That is why you have VPNs and other such technology.

        • ngdev@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          1 year ago

          In those cases it’s justifiable to have to work in-person. I don’t think we’d want closed networks (presumably for stuff like nuclear power) exposed to the open internet.

          • ZoopZeZoop@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            1 year ago

            True, but that won’t be most of the work force. There will always be exceptions for security/defense and some other areas. I suspect those areas already had a process for monitoring the comings and goings of staff and any off-site work. I also suspect the amount of off-site work was limited to begin with if it impacted security/defense.

        • atx_aquarian@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          1 year ago

          Those networks are also not accessible from home networks, then. That is to say it’s a valid point regarding each industry and company having different constraints, but it’s not a concern over the security of home networks. If home/remote network security is ever the limiting concern, that can be mitigated by VPN.

          • couragethebravedog@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            1 year ago

            The issue of using a work device outside of the office is if you ever connect it to your home network off of the VPN, then there is a chance the device is compromised. A malicious actor could have targeted you because they want to gain access to your company and they saw on your LinkedIn that you work remotely. So they simply use some OSINT to find your address, run a geo search on shodan and wiggle to identify your homes IP, then use that as an entry point to compromise your router and wait for your device to connect to continue the attack. This may sound complicated or a lot of work but this is actually quite simple to do and takes only 10 - 15 minutes.

      • couragethebravedog@lemmy.world
        link
        fedilink
        arrow-up
        3
        arrow-down
        3
        ·
        1 year ago

        It’s also about physical security, protecting access to your work laptop and protecting IP. That VPN is completely useless if someone can get into your home and access your device. It’s way easier to get into someone’s home than into a properly secured office.

        • TheCraiggers@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          1 year ago

          That’s also why you encrypt your drives. The average enterprise figured out how to let somebody work from an airport long ago. It’s really not a huge deal.

    • TipRing@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      If you use vdi that runs on a corporate thin client security is basically a non-issue. Data never leaves the data center and so long as you harden the thin client it should be difficult to breach it.

      • couragethebravedog@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        2
        ·
        1 year ago

        It’s also about physical security, protecting access to your work laptop and protecting IP. That VPN is completely useless if someone can get into your home and access your device. It’s way easier to get into someone’s home than into a properly secured office.

        • TipRing@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          1 year ago

          Right… that’s why you would use a VDI. There’s nothing local except a thin client that runs your citrix/vmware/whatever client. There’s a reason that VDI is generally used for PCI-compliant business cases but VPN is not.

    • Kangie@lemmy.srcfiles.zip
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      1 year ago

      Having implemented this sort of stuff for the mind if companies you probably think of when you’re thinking of enterprise… You’re making a mountain out of a molehill.

      The use of a VPN to secure data in transit and the use of strong encryption on the device, endpoint protection and management features, along with good password security make it easy for any organisation not dealing with literal SECRET or TOP SECRET information to enable remote with.