• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Most Employees Use Work Computers For Outside Activities

December 12, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

GFI Software, a leading software tool provider for companies like Tech Experts, recently released a report that found the personal use of company computers and other devices is leading to major downtime and loss of confidential data in many businesses.

The study of about 1,000 small business employees who used a company-provided desktop or laptop computer found that 39 percent of them said their businesses have suffered a major IT disruption caused by staff members visiting non-work related websites with work-issued hardware, resulting in malware infections and other related issues.

Even more alarming, the study showed nearly 36 percent of staff members said they would not hesitate to take company property, including email archives, confidential documents and other valuable intellectual materials, from their work-owned computer before they returned the device if they were to leave their company.

Since laptops are usually brought home, the study found, they frequently get used outside of work hours for both work and non-work activities.

The study also found that over 90 percent of employees said they have at least some understanding of their company’s policy on company-provided desktop or laptop computer usage, and 94 percent said they follow it to at least some degree.

Nearly 70 percent said they believe their employer can monitor iOS, Android or Windows-based tablet use as easily as their employer can monitor conventional PC use.

File Security on Red Keyboard Button.Almost half of those surveyed said they use a personal cloud-based file storage solution (e.g. Box, Dropbox, OneDrive) for storing and sharing company data and documents.
More than a quarter of those surveyed said they have had to get their IT department (or outside IT vendor) to fix or reload their computer after an issue occurred as a result of non-work use, usually a virus.

How can businesses control data security challenges?

Content controls are critical to ensure data does not leak outside of a company or expose a business to legal and regulatory compliance penalties. Businesses can also better control data security challenges if they adopt clear policies and guidelines for employees, and then follow through with them.

It is also important to lock down machines to prevent the installation of unauthorized software, and rigorously update anti-virus and anti-malware programs.

Employee Internet use should also be strictly limited and monitored to prevent data loss and system infections.

(Image Source: iCLIPART)

Filed Under: Antivirus, E-Mail, Internet, Monitoring, Productivity, Security, Viruses, Work From Home Tagged With: Internet, monitoring, Productivity, Viruses

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.