• mark3748@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    ·
    10 months ago

    The data is valuable and it provides some amount of data security. Any MDM worth a shit will wall off your Android with a work profile and that’s the only part that’s actually controlled by the MDM. They can also mandate a minimum level of security before accessing the work profile.

    Webmail can be used as a workaround, but allowing it is more of a convenience issue than a security consideration. Depending on your security team it could be a major hole or not an issue. Authentication requirements can offset the vulnerabilities somewhat, such as short timeouts, MFA, etc.

    In my experience, users like you are what make MDM a requirement in any environment. People that refuse to participate in any security processes because they think they know better than the people whose job is literally cybersecurity are almost always the cause of major incidents. That’s how my current employer got a huge ransomware attack and why I’m not allowed to install anything on my phone or laptop without spending several hours on hold with the help desk.

    • jballs@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      Gotta love getting down voted for trying to learn more about a topic. Looks like Reddit culture is seeping in here.

      Anyway, when you say:

      They can also mandate a minimum level of security before accessing the work profile.

      What does that mean? I thought MDM was just making it so I couldn’t copy data and that my employer could wipe/locate my phone. But it sounds like you’re saying it’s actually doing something more like creating a separate environment, almost like a VM, on my phone? Or is it different than that? My work MDM said they want to look at applications that you have installed. That was too much of a privacy invasion for me, so I chose not to use work apps on my phone.

      In my experience, users like you are what make MDM a requirement in any environment. People that refuse to participate in any security processes because they think they know better than the people whose job is literally cybersecurity are almost always the cause of major incidents.

      Yeah, our IT systems would be exponentially more secure if we didn’t have users too. One can dream, I suppose.