this post was submitted on 03 May 2026
1027 points (98.7% liked)

Technology

84413 readers
4235 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Aceticon@lemmy.dbzer0.com 6 points 3 days ago (1 children)

They can do that, but in my experience they do not, if only because it would be a vector for external attackers (who could control that machine via those connections routed directly to the Internet) to get into the company's intranet without actually having to go through the company's firewalls.

[–] Flatfire@lemmy.ca 3 points 3 days ago

This is what strong endpoint security is for. EDR software is also common. Routing everyone's internet traffic is pretty strenuous.