YSK: Browsing "ALL" at work might get you pulled into an office, even with NSFW off.
Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.
TL;DR: Keep browsing to your local instance at work for now.
Don’t use company computers for personal stuff, it all gets logged and can be used against you at the very least as evidence that you weren’t working come performance reviews.
I occasionally click on the little wether icon and see what the forecast looks like. Hope I don't get fired!
At my old job we had to research customers which frequently involved looking on Facebook and other sites. I was very intentionally not logged in, which probably wouldn't work now, and kept any and all searches to items that I could prove were related to a work item. It's insane that people don't follow that advice.
Work computers are for work, and pretty much every employer monitors what you do on it.
Depends heavily on where you work. My employer don't track what we use the computers for (of course there's a 'TOS' of sorts which says that it's company property and should only be used for company stuff) but as long as you are at least somewhat reasonable on what you use the system for it's fair play. Things like checking your personal email and occasional visit to lemmy/whatever your social media poison is doesn't raise any flags as long as you get the job done and that's it. Of course you can't install anything on the system but as long as a browser session on incognito mode is enough and it doesn't harm your duties, while technically forbidden, no one really cares.
And yes, I know this for sure, as I'm one of the guys who enforces the policies for our gear. YMMV.
Good advice always has its exceptions. But in general you should never use a work device for personal use because it's very easy for that information to be either compromised and/or used against you.
My personal guidance is "if you don't own the device, pretend the owner is looking over your shoulder" it's incredibly easy for them to install keyloggers and trackers remotely and silently.
it’s incredibly easy for them to install keyloggers and trackers remotely and silently.
And in here that's very much illegal thing to do without prior consent from the employee and even with permission it's requlated on what you can do with the data. Of course companies are permitted to restrict traffic and otherwise limit what users can do on the devices they're given to, but it's still illegal to spy individual users and what they do. Strong(ish) worker rights are a very nice thing to have around.
Intelligent reasoning! Remarkable!
Here’s another take: it’s all down to the laws you let your law-makers write. If I quit my my boss is not allowed to read through or keep my account active - in their system.
Always use a VPN when on a network you can't trust. There are plenty of free and trustworthy ones you can activate with one click, and then all the company sees is noise.
RiseupVPN, calynx and protonvpn are pretty great and trustworthy. 2 first ones are non profit based on donations only. And proton VPN is well audited (but require account while the first two doesn't)
If the company owns the endpoint there's lots they can do to monitor your traffic even with a VPN. For phones if you sign in to work mail with your phone and allow them to manage your device just assume they have control of it now.
And refusing to install your company's software on your work computer is a good way to get fired for cause.
But some people have the option to access work email, etc on their personal devices, as long as they install their company's monitoring/security software.
Depends on your work. I agree with you, but for example my work is different.
Yes, we have managed devices as well, but my department specifically went for unmanaged devices. Just plain old laptops. Install whatever OS you want, do whatever you want. I only have the base windows install on there for some compatibility reasons, I mostly just use PopOS.
And we're also explicitly allowed to browse private content - as long as the work gets done and we stay in budget, do whatever.
They aren't, and our private phones are also connected to the network ;)
But then again, it's a fairly large organization vpn'd up over multiple locations, with server farms in different VLANs and so on, so the network we usually access when working are in a different subnet.
I do know what you mean though - it really depends on what the company does. Prior, I worked at a company that developed and manufactured hardware cryptography devices - I learned proper security procedures there :) our 'actual work computers' weren't even connected to the Internet, and the unmanaged laptops accessed the same WiFi guests would access that, well, only went to the Internet. Just wpa2.
They aren't, and our private phones are also connected to the network ;)
Why though‽ Most consumer routers even have a guest network enabled by default.
it really depends on what the company does.
That's true, but an attack could probably cause a lot of damage to any company (especially a big one) without proper security. Regardless of what they do.
Well at least you don't have to deal with ITs PC policies, which can get pretty annoying. Allowing any device to join the company network seems incredibly stupid though.
Let's just hope that none of your unmanaged machines get compromised.
At my previous company, only domain work computers could join the PC WiFi (with a certificate, so no passwords) and work smartphones could only join the work WiFi for mobiles.
Private devices and very limited amount of non domain computers were only allowed on the guest network and couldn't connect to any other.
The company didn't do anything special that needed extra security.
agreed with the point. However, lemmy might soon be the new reddit for information, asking questions, troubleshooting.
So I guess a solution for accessing lemmy for such resources on company computer without being flagged would be good, especially this gets a bit more complicated with the decentralized nature of the fediverse (multiple domains of lemmy)