Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.

TL;DR: Keep browsing to your local instance at work for now.

  • @LostDeer@infosec.pub
    link
    fedilink
    4621 year ago

    Don’t use company computers for personal stuff, it all gets logged and can be used against you at the very least as evidence that you weren’t working come performance reviews.

    • @givesomefucks@lemmy.world
      link
      fedilink
      English
      2191 year ago

      It’s fucking insane people don’t know this in 2023.

      Work computers are for work, and pretty much every employer monitors what you do on it.

      • @lagomorphlecture@lemm.ee
        link
        fedilink
        551 year ago

        I occasionally click on the little wether icon and see what the forecast looks like. Hope I don’t get fired!

        At my old job we had to research customers which frequently involved looking on Facebook and other sites. I was very intentionally not logged in, which probably wouldn’t work now, and kept any and all searches to items that I could prove were related to a work item. It’s insane that people don’t follow that advice.

        • @penguin@sh.itjust.works
          link
          fedilink
          341 year ago

          Things like weather will be fine unless you have an unreasonable boss/job.

          But people should only use work computers the way they would if they knew the entire company was watching a live stream of their desktop.

          Even for working from home, I put my work laptop on the isolated guest wifi because I don’t trust them the same way they don’t trust me.

      • @IsoKiero@sopuli.xyz
        link
        fedilink
        English
        171 year ago

        Work computers are for work, and pretty much every employer monitors what you do on it.

        Depends heavily on where you work. My employer don’t track what we use the computers for (of course there’s a ‘TOS’ of sorts which says that it’s company property and should only be used for company stuff) but as long as you are at least somewhat reasonable on what you use the system for it’s fair play. Things like checking your personal email and occasional visit to lemmy/whatever your social media poison is doesn’t raise any flags as long as you get the job done and that’s it. Of course you can’t install anything on the system but as long as a browser session on incognito mode is enough and it doesn’t harm your duties, while technically forbidden, no one really cares.

        And yes, I know this for sure, as I’m one of the guys who enforces the policies for our gear. YMMV.

        • @_danny@lemmy.ml
          link
          fedilink
          31 year ago

          Good advice always has its exceptions. But in general you should never use a work device for personal use because it’s very easy for that information to be either compromised and/or used against you.

          My personal guidance is “if you don’t own the device, pretend the owner is looking over your shoulder” it’s incredibly easy for them to install keyloggers and trackers remotely and silently.

          • @IsoKiero@sopuli.xyz
            link
            fedilink
            English
            21 year ago

            it’s incredibly easy for them to install keyloggers and trackers remotely and silently.

            And in here that’s very much illegal thing to do without prior consent from the employee and even with permission it’s requlated on what you can do with the data. Of course companies are permitted to restrict traffic and otherwise limit what users can do on the devices they’re given to, but it’s still illegal to spy individual users and what they do. Strong(ish) worker rights are a very nice thing to have around.

        • @klyde@lemmy.world
          link
          fedilink
          English
          -41 year ago

          Then your job probably isn’t that serious then like others where they get monitored.

          • @Oisteink@feddit.nl
            link
            fedilink
            0
            edit-2
            1 year ago

            Intelligent reasoning! Remarkable!
            Here’s another take: it’s all down to the laws you let your law-makers write. If I quit my my boss is not allowed to read through or keep my account active - in their system.

      • @wizardbeard@lemmy.dbzer0.com
        link
        fedilink
        English
        211 year ago

        Even if you don’t, there’s plenty of different ways to identify a user on company wifi.

        For example, have your cellphone named “Stephano’s iPhone”? Narrows it down to the Stephanos working in range of that access point.

      • @Bongles@lemm.ee
        link
        fedilink
        41 year ago

        I usually used a VPN if I was on the WiFi. Made me feel better even if I’m just browsing memes

        • @Ajen@sh.itjust.works
          link
          fedilink
          31 year ago

          Connecting to an “unauthorized” VPN is against IT policy for some companies, especially if your job involves handling sensitive data.

      • @smeg@feddit.uk
        link
        fedilink
        English
        01 year ago

        Always use a VPN when on a network you can’t trust. There are plenty of free and trustworthy ones you can activate with one click, and then all the company sees is noise.

          • @smeg@feddit.uk
            link
            fedilink
            English
            61 year ago

            I use the free tier of Proton VPN, it’s been well audited and proven safe!

          • @outdated_belated
            link
            English
            31 year ago

            Different threat models. There’s the threat of being punished or fired by workplace surveillance;

            Separately, there’s also the threat of some unknown third-party snooping on your data for whatever other reason (identify fraud, etc).

            The post discusses the first and I’d argue that’s more compelling for most people, but the second is also valid.

          • @XpeeN@sopuli.xyz
            link
            fedilink
            2
            edit-2
            1 year ago

            RiseupVPN, calynx and protonvpn are pretty great and trustworthy. 2 first ones are non profit based on donations only. And proton VPN is well audited (but require account while the first two doesn’t)

          • ferret
            link
            fedilink
            English
            01 year ago

            Cloudflare’s free VPN is trustworthy and very fast. You don’t get to pick server location though so it is only useful for cases like this.

        • @visak@lemmy.world
          link
          fedilink
          41 year ago

          If the company owns the endpoint there’s lots they can do to monitor your traffic even with a VPN. For phones if you sign in to work mail with your phone and allow them to manage your device just assume they have control of it now.

          • @smeg@feddit.uk
            link
            fedilink
            English
            61 year ago

            Never putting any of their software on your personal device is a good rule in general

            • Saik0
              link
              fedilink
              English
              11 year ago

              Work computers are by definition not personal devices.

              • @Ajen@sh.itjust.works
                link
                fedilink
                English
                01 year ago

                And refusing to install your company’s software on your work computer is a good way to get fired for cause.

                But some people have the option to access work email, etc on their personal devices, as long as they install their company’s monitoring/security software.

    • @uberrice@feddit.de
      link
      fedilink
      141 year ago

      Depends on your work. I agree with you, but for example my work is different.

      Yes, we have managed devices as well, but my department specifically went for unmanaged devices. Just plain old laptops. Install whatever OS you want, do whatever you want. I only have the base windows install on there for some compatibility reasons, I mostly just use PopOS.

      And we’re also explicitly allowed to browse private content - as long as the work gets done and we stay in budget, do whatever.

      • @theDoctor
        link
        211 year ago

        If you are on their network they can see what you are doing. At the end of the day, the business will protect itself.

        Do what you want at your own risk. But never assume that any company is on your side.

        • @monobot@lemmy.ml
          link
          fedilink
          4
          edit-2
          1 year ago

          This is so simple, whatever policy they have if something goes wrong they will try their best to find a scape goat.

          Why do you people have phones with gigabytes of daya for?

          Additionally, do your best not to be part of the company where you might get into trouble for just using internet.

        • @uberrice@feddit.de
          link
          fedilink
          11 year ago

          Of course they can. That’s why I usually use my phone as a hot spot when I’m browsing private stuff ;)

      • @ludwig@lemmy.world
        link
        fedilink
        21 year ago

        Do the other departments use managed devices? IT might get pretty mad if your department went over them and bought computers themselves, lol.

        It’s not optimal from a security and legal point of view.

          • @ludwig@lemmy.world
            link
            fedilink
            21 year ago

            Alright. Seems reasonable as long as the devices are sandboxed from the company network and resources.

            • @uberrice@feddit.de
              link
              fedilink
              21 year ago

              They aren’t, and our private phones are also connected to the network ;)

              But then again, it’s a fairly large organization vpn’d up over multiple locations, with server farms in different VLANs and so on, so the network we usually access when working are in a different subnet.

              I do know what you mean though - it really depends on what the company does. Prior, I worked at a company that developed and manufactured hardware cryptography devices - I learned proper security procedures there :) our ‘actual work computers’ weren’t even connected to the Internet, and the unmanaged laptops accessed the same WiFi guests would access that, well, only went to the Internet. Just wpa2.

              • @ludwig@lemmy.world
                link
                fedilink
                11 year ago

                They aren’t, and our private phones are also connected to the network ;)

                Why though‽ Most consumer routers even have a guest network enabled by default.

                it really depends on what the company does.

                That’s true, but an attack could probably cause a lot of damage to any company (especially a big one) without proper security. Regardless of what they do.

                Well at least you don’t have to deal with ITs PC policies, which can get pretty annoying. Allowing any device to join the company network seems incredibly stupid though.

                Let’s just hope that none of your unmanaged machines get compromised.

                At my previous company, only domain work computers could join the PC WiFi (with a certificate, so no passwords) and work smartphones could only join the work WiFi for mobiles.

                Private devices and very limited amount of non domain computers were only allowed on the guest network and couldn’t connect to any other.

                The company didn’t do anything special that needed extra security.

    • @inspxtr@lemmy.world
      link
      fedilink
      71 year ago

      agreed with the point. However, lemmy might soon be the new reddit for information, asking questions, troubleshooting.

      So I guess a solution for accessing lemmy for such resources on company computer without being flagged would be good, especially this gets a bit more complicated with the decentralized nature of the fediverse (multiple domains of lemmy)