It’s also about physical security, protecting access to your work laptop and protecting IP. That VPN is completely useless if someone can get into your home and access your device. It’s way easier to get into someone’s home than into a properly secured office.
Comment on Forcing Workers Back to the Office Might Not Have Been a Good Idea After All
silvercove@lemdro.id 1 year agoI doubt it. The home network does not need to be secure. That is why you have VPNs and other such technology.
couragethebravedog@lemmy.world 1 year ago
TheCraiggers@lemmy.dbzer0.com 1 year ago
That’s also why you encrypt your drives. The average enterprise figured out how to let somebody work from and airport long ago. It’s really not a huge deal.
KnightontheSun@lemmy.world 1 year ago
Some networks are not accessible via vpn.
ngdev@lemmy.world 1 year ago
In those cases it’s justifiable to have to work in-person. I don’t think we’d want closed networks (presumably for stuff like nuclear power) exposed to the open internet.
atx_aquarian@lemmy.world 1 year ago
Those networks are also not accessible from home networks, then.
couragethebravedog@lemmy.world 1 year ago
The issue of using a work device outside of the office is if you ever connect it to your home network off of the VPN, then there is a chance the device is compromised. A malicious actor could have targeted you because they want to gain access to your company and they saw on your LinkedIn that you work remotely. So they simply use some OSINT to find your address, run a geo search on shodan and wiggle to identify your homes IP, then use that as an entry point to compromise your router and wait for your device to connect to continue the attack. This may sound complicated or a lot of work but this is actually quite simple to do and takes only 10 - 15 minutes.