Chapter 20
Reining in Your Devices
IN THIS CHAPTER
Securing your device and keeping bad guys out
Checking your sign-in activity
Signing out from services
For a family of empty nesters, I have enough computers and mobile devices at home to pass as a part time IT support person. Add to that the Internet of Things (IoT) devices from my new appliances, security cameras, grow lights, hydroponics controls, and other gadgets, and I’m starting to think I need to build a Star Trek–like mission control room.
Like most information workers, I use my Bring Your Own Device (BYOD) laptop for work and personal tasks. I do have a company-issued device but I find my BYOD laptop more convenient, so when I’m at the kitchen catching up on a Netflix show while having lunch, I can stay on top of Teams messages — especially when I’m participating in a critical discussion.
It’s the same thing with my mobile device. Some days I start a meeting from my laptop and then switch the meeting over to my phone to start my commute or a trip to the dentist.
As I look around my office, I’m counting three laptops, two mobile phones, and seven Internet-connected devices. But wait, there’s more! I’m also running virtual ...
Get Microsoft 365 For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.