The concert is on! And it’s not all good

It’s that time of year when everyone is looking for a little extra cash to pay for a few vacation bills or a trip to somewhere hot. In today’s digital economy, the equivalent of a part-time job is getting into the gig economy. Even before the recent wave of layoffs pushed people to find other avenues of employment in August, the gig economy was up 31% from a year ago.

Our research has shown that the unauthorized use of third-party works on enterprise devices has increased by more than 200% in the last 12 months. To some extent, that makes sense. As we have moved to a predominantly hybrid work-from-home environment, people have felt more comfortable mixing company activities with their other pursuits. Where employees once had separate laptops for their personal and work lives, when people work from home the distinction between which machine to use for work or play diminishes.

Some companies have policies that strictly prohibit the use of business laptops for anything other than company business. But many don’t, hence the rise of shadow IT and third-party work on company machines. For the most part, these open companies believe that their employees work hard enough and make smart enough decisions to keep their machines and, by extension, the business safe. On the whole, this assumption is true.

However, there is always someone biting the hand that feeds them. Sometimes employees work on their own while they are on the company clock. Again, in this new world of working from home, the line between when people are working or not working has become blurred. Still, we found more than a few instances where it was clear an employee wasn’t focused on their day job because they were working on a side gig.

We also found something a little more concerning at play. Some employees use company intellectual property, such as applications or databases, for on-demand work that directly competes with the company. of their employer. For example, an enterprising social marketer used his employer’s Adobe Creative Cloud application to provide services to a competitor during business hours.

What should a business do to make sure the new year is a good one? First, and as always, it’s important to have clear policies from HR on how company machines can be used. It seems obvious, but as we have seen in the examples above, people sometimes blindly ignore what is not beneficial to them.

We’ve found six unique indicators that can help you identify remote workers using corporate devices for third-party work. In some cases, that might not be a big deal, like an employee running rugby league on the laptop of an engineering company that sells emulsifiers. In other cases, we can help you find employees who work on the sidelines during company work hours or, worse, who engage in conflicts of interest. Either way, by understanding the intent, you can take appropriate action.

Contact us to book a demo or take a virtual tour to see how DTEX can help you.

The post The concert is up! And It’s Not All Good appeared first on DTEX Systems Inc.

*** This is a syndicated blog from DTEX Systems Inc’s Security Bloggers Network, written by Kellie Arbuckle. Read the original post at:

Leave a Reply