You Already Have a Bring Your Own Device Policy: What We've Discovered About How We Now Work

Bring Your Own Device (BYOD) is a policy in which a company allows users to use their own device (computer, smartphone, tablet) to do company work. With the shift to remote working, company devices are now being used at home more than ever.

Instead of a codified “Bring Your Own Device” policy, that would allow access to company apps and files on an employee’s personal device, we now have the opposite happening: employees are connecting their personal apps and files to their work devices, and using those devices for leisure. Behold, the rise of Bring Your Company Device (BYCD)!

With the move to an entirely distributed workforce that many organizations are experiencing, it shouldn't be surprising that this has happened. Some employees have always used work devices for personal use, even in a traditional office environment. But what is surprising is the increased frequency of users accessing sites generally considered inappropriate for work between 2020 and now.

We looked at over 1 million active company machines (processing roughly 3 billion DNS queries per single day) on our network and saw that the percentage of network traffic to streaming sites grew nearly 300% from February 2020 to February 2021—employees are spending more time than ever watching streaming content at work.

We also noticed a peculiar pattern of when users were looking at streaming content and other sites.

Starting at 10 a.m., that's when users were most likely to visit adult content on work devices. An hour later, at 11 a.m., was the most frequent time of day for them to check out dating sites. By 12:30 (and for roughly the length of 2-hour movie), users were more likely to view streaming. And at 1 p.m. is when gaming sites were most-often visited.

Traffic to dating sites also grew 59% between 2020 and 2021.

Interestingly, though social media is a known time-waster, only 10% of businesses on our network are blocking social media access to their employees. Our customers are most likely to block Snapchat (9.6% blocked) or Instagram (5.9% blocked). Twitter, Facebook, and TikTok are all blocked on our network at nearly the same rate, between 3.4% and 3.9% (respectively). When we polled our employees internally asking them which social sites were most blocked on our network, the most common answer was Facebook.

Finally, when it comes to cybersecurity, we were able to determine a pattern between the successful identification of a phishing scam between users who were using their company devices during work hours, or during leisure time. Employees using such devices during work correctly flag sites as phishing 90% of the time. But users are nearly 40% less likely to correctly flag phishing sites when browsing during their leisure time. It seems that context is everything.

Although the concept of BYOD has been around for years, it has been flipped on its head. Your company-owned device is now doing double duty in the off hours. This creates additional security risk because of shadow IT applications, visits to risky websites, and filesharing occurring off-network. Blending work and pleasure on a single device is here to stay, but make sure your cybersecurity accounts for the myriad of ways in which each device will be used, not just usage in a 9-5 work context.

A content filtering tool that gives you the ability to schedule policies for certain times can greatly increase productivity and lower your cybersecurity vulnerability by locking down visits to high-risk sites, and keeping users off time wasters. Get a free trial of DNSFilter.

Search
  • There are no suggestions because the search field is empty.
Latest posts
How to Block Unwanted Websites On The Company Network How to Block Unwanted Websites On The Company Network

Internet access is essential to the productivity of most organizations—but not everything on the Internet is work-appropriate or safe. From time-wasting sites to phishing domains, employees can unintentionally expose your company to productivity loss, legal risks, or cyber threats just by visiting the wrong webpage. And before you think it couldn’t happen to you or your team—even the most cybersecurity aware can be duped by emerging threats like ...

DNS Filtering: How Does It Work? DNS Filtering: How Does It Work?

DNS Overview: What Is It and Why Does It Matter?

When you type a web address (like www.example.com) into your browser, a Domain Name System (DNS) lookup occurs behind the scenes. This process translates the website’s domain name into its corresponding IP address (e.g., 123.45.67.89). Some people compare DNS to a phonebook or directory for the internet.

DNSFilter Data Analytics Platform: From Fragmented Data Mess to a Living DataMesh DNSFilter Data Analytics Platform: From Fragmented Data Mess to a Living DataMesh

When I stepped into the role of Senior Director of Data Platform Engineering at DNSFilter nearly 3 years ago, one sentiment stood out: We had plenty of data, but very little “truth.”

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.