@[email protected] to [email protected]English • 1 year agoThey say use whatsapp, they say use zoomlemmy.dbzer0.comimagemessage-square129fedilinkarrow-up1932arrow-down128
arrow-up1904arrow-down1imageThey say use whatsapp, they say use zoomlemmy.dbzer0.com@[email protected] to [email protected]English • 1 year agomessage-square129fedilink
minus-square@[email protected]linkfedilink-4•1 year agoIf an organisations’ security relies on the end device configuration there is no security.
minus-square@[email protected]linkfedilink3•1 year agoYou can bring your own devices, but you don’t get permission to access anything? Or what are you even trying to say about what the end users device being able to do anything
minus-square@[email protected]linkfedilink0•1 year agoI don’t think I said anything about what a device can and cannot do
If an organisations’ security relies on the end device configuration there is no security.
Who needs defense in depth, right?
You can bring your own devices, but you don’t get permission to access anything?
Or what are you even trying to say about what the end users device being able to do anything
I don’t think I said anything about what a device can and cannot do