this post was submitted on 16 Sep 2024
412 points (97.7% liked)

Technology

59534 readers
3195 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] EncryptKeeper@lemmy.world 4 points 2 months ago* (last edited 2 months ago) (2 children)

Oh no you don’t, not likewise. There’s zero chance you have any real world experience under your belt, that much you’ve made very clear. You’ve already let it slip that you’re just a consultant lol. A glorified salesman playing around in SMB land no doubt. At best, maybe an old fart who actually dipped his toes into IT generalism two decades ago before getting out of the game and into consulting? I know the type lol.

It’s probably best if you were to stay in your lane and let the professionals worry about security.

Exactly. We use a VPN to connect to anything somewhat important, and anything truly important requires manual access and approvals. I'm in a pretty senior dev position, and if I lost my laptop:

  1. they'd have to break my password or biometric login (disk is encrypted) - with this they get access to most of our code, but no secrets
  2. they'd need to hack my phone to access any internal documentation or test environments due to 2FA
  3. they'd need to hack my password manager to access anything non-documentation - code repos, prod logs, etc
  4. they'd need to hack someone else's machine to get access to actual prod data, which is probably what they really want

And I'm not doing anything special here (and I'm certainly not a security professional), that's everyone's machines due to company policy. We also don't handle anything particularly sensitive, the most sensitive thing I have is proprietary algorithms, and we'd sue anyone if we suspected they stole our code.

Oh, and if they try to run something sus, it'll send a report to our IT dept. I actually got contacted by our IT dept because I ran something unfamiliar (I really like my CLI tools), so they added an exception after personally verifying with me that it's not a hack.

We have teams across the globe, both inside the org and outside, and we haven't had any issues with security, and we do regular audits. Our security team isn't particularly special either, I'm sure many other companies have much tighter security than we do.

[–] gencha@lemm.ee 0 points 2 months ago (1 children)

I wish you knew how stupid you look for writing that

[–] EncryptKeeper@lemmy.world 1 points 2 months ago* (last edited 2 months ago) (1 children)

Oh brother read the room why don’t ya. It’s not too late to delete this lmao.

[–] gencha@lemm.ee 0 points 2 months ago (1 children)

I rather let it stand for the handful of people that need to know 95% of the room are challenged in their ability to evaluate the situation

[–] EncryptKeeper@lemmy.world 1 points 2 months ago

You got public humiliation kink or something? No judgement lol.

Thank goodness for the downvote system so your comments can be safely buried where they can’t misinform people.