This month’s Cloud Security report is focused on productivity. While employees are working from home, productivity is an obvious concern for businesses; 82% of managers worry about the effect of virtual teams on productivity. Our data highlights some of the positive and negative effects of remote working.

Our research team also unearthed a number of phishing campaigns using high profile brands; these were detected and blocked for our customers.

Increased access to inappropriate content by up to 100%

Relative to pre-pandemic times, there has been a notable increase of up to 100% in connections to inappropriate content during office hours. While employees are working remotely, there is an obvious need to ensure that acceptable usage policies are still being adhered to on mobile devices.

The two key components of inappropriate content are gambling and adult content. As the consumption of inappropriate content has grown, we can see that connections to adult and gambling sites are growing at an equal rate and staying roughly constant.

Shorter working days - by up to 75 minutes

We’ve seen hourly connections to productivity services like Microsoft 365, Salesforce and Slack grow slightly during the working day. However the average working day has become shorter by around an hour and a quarter. While employees may be logging less ‘working’ hours, it seems like they’re being more productive during the core hours.

Android devices are 5.3x more likely to have a vulnerable app installed than iOS devices.

Top 5 apps leaking your location

1 | il Meteo
2 | Sports Tracker
3 | ConnectMobile
4 | Living Earth – Clock & Weather
5 | Flipboard: Your Social News Magazine

Android users also took longer to update their apps after a major vulnerability was found in an older version of Whatsapp, as shown in the graph above.

Phishing: A constant threat to remote workers

Throughout the course of the pandemic, phishing has been a continual threat. In June, we noticed an uptick in a number of high profile brands being used to conduct phishing attacks. In June, employees were most commonly targeted by phishing threats dressed up as the following popular brands:

ICYMI: June's Security News Roundup

Data Science Monthly

This month we have investigated how various sources consume data, in both browser and non-browser traffic. Most browser traffic uses a relatively small amount of data when users visit websites, and forms a sharp peak in the histogram. Further along we find both music and video streaming services consuming larger amounts of data, which can be the cause of large data overages. App downloads and OS updates also featured among the sources consuming the most data.

Data usage per connection from various sources

We're here to help you

The world of work is being completely reshaped, and remote working has become critical for business continuity. If you need any assistance with your remote working challenges, please get in touch.

Get in Touch