As opposed to completely unmanaged devices with software and hardware that I have zero idea what exploits are available for it?
If it’s because you’ve had some dumbass BYOD policy then that’s a you problem. I always tell my users to not put company policies on their private devices. On company devices, and especially government, I want my capacity to control my domain better.
To clarify: I’m not opposed to the concept of MDM, but the available solutions for implementing it are garbage. The MDM agent is one of the first things a nation state attacker goes after because it’s ubiquitous and usually worse code than the OS itself.
As opposed to completely unmanaged devices with software and hardware that I have zero idea what exploits are available for it?
If it’s because you’ve had some dumbass BYOD policy then that’s a you problem. I always tell my users to not put company policies on their private devices. On company devices, and especially government, I want my capacity to control my domain better.
To clarify: I’m not opposed to the concept of MDM, but the available solutions for implementing it are garbage. The MDM agent is one of the first things a nation state attacker goes after because it’s ubiquitous and usually worse code than the OS itself.
Exactly.
Also be aware that if you add an Outllook account to iOS, IT may be able to wipe your entire phone.