I don’t mean compromised, I mean your IT manager has an acceptable use policy, which all staff agree to in writing, and the IT folks have to pass audits that say they can assure management they know what happens in the company network.
I agree that keyloggers are dystopian, and honestly overkill unless you are paranoid about proprietary data. But you should follow the same philosophy as your network architecture: Zero Trust.
I don’t mean compromised, I mean your IT manager has an acceptable use policy, which all staff agree to in writing, and the IT folks have to pass audits that say they can assure management they know what happens in the company network.
I agree that keyloggers are dystopian, and honestly overkill unless you are paranoid about proprietary data. But you should follow the same philosophy as your network architecture: Zero Trust.
if it is recording its environment like with mic and cam then yes it is pretty much compromised.