Insights
Has it ever crossed your mind what your employees may be using their work computers for other than work? Or perhaps you have a tendency to look for your next weekend away yourself using your work laptop? In today’s digital age, we are becoming more reliant than ever before on technology, whether that’s for work, leisure, shopping and pretty much anything else you can think of.
The convenience of using laptops, PCs, mobiles and tablets to get stuff done is attractive; why would you want fight the shopping crowds on a Saturday when you can leisurely peruse retail sites on a Monday evening, and have your new outfit arrive within a couple of days?
Off the back of this intriguing thought, we decided to delve into the world of computer usage at work, by asking 2,000 UK office workers about what they’re using their work computers for. Here are our findings…
Here’s what we asked: Thinking about using your computer at work, which, if any, of these have you done? [Tick all that apply].
Here are the answers we offered:
Perhaps unsurprisingly, using a work computer for social activities is a popular admission, with planning personal leisure time activities or online shopping coming in at the top of our poll at a staggering 90%.
You’ve then got the lure of social media, of which 43% stated they’d checked in on their personal accounts using their work PC. This is perhaps less surprising; we’d even assume that this percentage will continue to rise with social media being a fully established part of everyday life for most people.
Facebook, Instagram and Twitter usage are closely followed by sending comms to colleagues, friends or partners (which you know your boss wouldn’t approve of), sitting at a fairly high 40%. Whether that’s GIFs, reminders, gossip or general chit chat, two in five of us are doing it!
Moving onto less common social confessions, 21% cited having downloaded or streamed content online (think Netflix, ITV Player, etc.), and 12% of the 2,000 employees asked said they’d spent time scrolling through online dating sites such as Plenty of Fish and Match.com.
When it comes to viruses, ransomware and other general malware, unfortunately every now and again an unsolicited email will make its way in your inbox, and the user will unknowingly click the link or open the attachment. Viruses come in many forms, some with comedic intent, but most can be truly detrimental to the business through disrupting or damaging the system.
Our poll revealed that nearly half of those surveyed (49%) have visited websites or opened email attachments in the past that caused malware to saturate their system. Although having a well-managed IT service in place is crucial to securing systems, here are some common tell-tale signs that you’ve received an unwelcome email:
Although only a small percentage, it’s also important to note the statistics which detail inappropriate behaviour. Our survey highlighted that 15% have previously accidentally sent a message about a colleague to that person when it was intended for someone else.
There’s also a small minority (9%) who admitted to having attempted to access content described as ‘crude’ or ‘inappropriate’.
Although sending an email to someone it was not intended for is not deemed professional, and in most cases is unfortunately down to old-fashioned human error, there are measures which can be put into place to stop access to harmful or potentially dangerous content. For example, at Aura Technology, we offer comprehensive strategy solutions where we would work with you to identify exactly what your business requirements are and put a plan in place to protect and serve your business efficiently.
Although you’re not going to want to spend your days checking up on how your employees are using their PCs, the good news is there are some things you can put in place which will help you to keep your business safe and secure…
Here at Aura Technology, we can support you and your business in a variety of different ways. Our clear vision of proactive IT services paths the way for us work with you with to build and manage thorough IT strategies and connectivity solutions, all the way through to software development and integration, all with 24-hour support.
Get in contact with us if you want to learn more about how we can protect and serve your business.