• crispy_kilt@feddit.de
      link
      fedilink
      arrow-up
      7
      arrow-down
      11
      ·
      1 year ago

      If an organisations’ security relies on the end device configuration there is no security.

    • ChickenAndRice@sh.itjust.works
      link
      fedilink
      arrow-up
      5
      arrow-down
      11
      ·
      edit-2
      1 year ago

      For the user or the company? Assuming the user isn’t a moron with computers?

      Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine