If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is unmanaged, it leaves the company vulnerable to attack.
Read full article on Help Net Security