Bring Your Own Device (BYOD) is a policy in which a company allows users to use their own device (computer, smartphone, tablet) to do company work. With the shift to remote working, company devices are now being used at home more than ever.
Instead of a codified “Bring Your Own Device” policy, that would allow access to company apps and files on an employee’s personal device, we now have the opposite happening: employees are connecting their personal apps and files to their work devices, and using those devices for leisure. Behold, the rise of Bring Your Company Device (BYCD)!
With the move to an entirely distributed workforce that many organizations are experiencing, it shouldn't be surprising that this has happened. Some employees have always used work devices for personal use, even in a traditional office environment. But what is surprising is the increased frequency of users accessing sites generally considered inappropriate for work between 2020 and now.
We looked at over 1 million active company machines (processing roughly 3 billion DNS queries per single day) on our network and saw that the percentage of network traffic to streaming sites grew nearly 300% from February 2020 to February 2021—employees are spending more time than ever watching streaming content at work.
We also noticed a peculiar pattern of when users were looking at streaming content and other sites.
Starting at 10 a.m., that's when users were most likely to visit adult content on work devices. An hour later, at 11 a.m., was the most frequent time of day for them to check out dating sites. By 12:30 (and for roughly the length of 2-hour movie), users were more likely to view streaming. And at 1 p.m. is when gaming sites were most-often visited.
Traffic to dating sites also grew 59% between 2020 and 2021.
Interestingly, though social media is a known time-waster, only 10% of businesses on our network are blocking social media access to their employees. Our customers are most likely to block Snapchat (9.6% blocked) or Instagram (5.9% blocked). Twitter, Facebook, and TikTok are all blocked on our network at nearly the same rate, between 3.4% and 3.9% (respectively). When we polled our employees internally asking them which social sites were most blocked on our network, the most common answer was Facebook.
Finally, when it comes to cybersecurity, we were able to determine a pattern between the successful identification of a phishing scam between users who were using their company devices during work hours, or during leisure time. Employees using such devices during work correctly flag sites as phishing 90% of the time. But users are nearly 40% less likely to correctly flag phishing sites when browsing during their leisure time. It seems that context is everything.
Although the concept of BYOD has been around for years, it has been flipped on its head. Your company-owned device is now doing double duty in the off hours. This creates additional security risk because of shadow IT applications, visits to risky websites, and filesharing occurring off-network. Blending work and pleasure on a single device is here to stay, but make sure your cybersecurity accounts for the myriad of ways in which each device will be used, not just usage in a 9-5 work context.
A content filtering tool that gives you the ability to schedule policies for certain times can greatly increase productivity and lower your cybersecurity vulnerability by locking down visits to high-risk sites, and keeping users off time wasters. Get a free trial of DNSFilter.
When researchers talk about DNS security, they often refer to anything that protects DNS infrastructure. Although protective DNS and DNS security fall under the cybersecurity umbrella, protective DNS takes a different approach to cybersecurity than standard DNS security. Both security strategies are important for the stability of your business, but protective DNS reduces risks from your weakest link–human error. Protective DNS is critical for you...
This month there was a high level of focus on compliance issues spanning several focus areas from governments and oversight agencies around the world. And while there were actions taken with regard to specific vulnerabilities, a larger spotlight was placed on bigger picture security considerations in a more general context.
Explore More Content
Ready to brush up on something new? We've got even more for you to discover.