Many of us have left the idea of carrying a dedicated work phone. After all, when you can get all the things you need on your personal smartphone, why bother?
Here’s a reason: Your business account can spy in the background.
When you add an email address to work with your phone, you may be prompted to install something called Mobile Device Manager Profile (MDM). Chances are, you will blindly accept it.
MDM is set up by your company’s IT department to access your phone in the background so that they can secure your device, find out if your phone is stolen and then remotely access your data. Can erase from
From your company’s perspective, there are clear security reasons for setting up an MDM on an employee’s phone.
But for the staff, it’s hard to know what these invisible files are behind the scenes, because they give invisible control over your computer to your company’s people.
That’s why when it comes to your phone, how confident you are in your IT department, it is recommended that you separate work and pleasure.
Are staring at my life
MDM profiles associated with device management tools allow companies to track employee phones in a dashboard.
They can reduce security breaches or potential losses from an evil employee; If you work in a law firm, for example, and your boss is worried about leaking sensitive emails from your smartphone, they can remotely wipe your data.
MDM profiles can force you to use a long password on your device rather than a simple PIN between the other policies.
Prior to launching an iPhone for the first time in more than a decade and offering smartphones to the common people, it was common for companies to issue BlackBerry or Palm Pilot, which would allow their employees to check email and work more. Permission was granted.
When the iPhone came, the employee suddenly wanted to use their new, influential phone in the office, rather the busy phone with the actual keyboard.
If they can, they’ve added a professional email to their smartphone, or made easy-to-use solutions to access them.
Before this change the MDM function was present, but with the speed of smart phones, it became an essential part of the IT policy.
Companies were happy to allow employees to use e-mail on their own devices to save the cost of buying separate work phones and data plans, but it also meant that those who accepted the system Have lost control over their sensitive data.
In many cases, MDM provides the ability to track your company and install VPN for the company.
This means that they can route your traffic through a company-owned network – and if they have that network, then the company can monitor traffic and without any reference to your life, one-sided Mirror can provide.
Some third-party MDM tools connect it to labor productivity.
For example, Hexaneod puts his equipment in the market by saying, “Monitoring the location report of these devices can be assessed by the employee’s performance” and that “the length of time it takes on a particular site is Gives an overview. ”
Technically, iOS and Android do not allow the tracking of location data without the user’s consent. However, third-party solutions can force you to install an app that makes tracking itself while adding a corporate email address to your device.
These tools often allow administrators to use the phone, call records, record SMS, and most extreme cases, to restore web browsing logs.
You can expect such a surveillance on a dedicated business tool, but probably not on your personal phone. Once you have got the work email and MDM installed, both are similar.
Do you trust your supervisor
A bad representative in the IT department can misuse their access to track the location of the employee, or can see the private life of the people without knowing that it is happening.
There is no fundamental way for you to see who has access to your data, whether it is displayed or not. Only the administrator can show a record that will show it, even if it contains information about any device you may have
Last year, The New York Times wrote that how the Internet enables things from domestic abuse, and there are many similarities that the IT tool is not kept by the companies in order to protect users under their control.
You can understand well that your boss can access your email – even for the real reason – but what is the need to keep track of each step?
The device blindly assumes that IT departments and management are trustworthy and accurate and do not consider that the attacker can have direct access to it or how to use these tools to disturb someone within the company can go.
Therefore, it is good to stop while adding an email to work with your device.