Constantly connected Brits put work data at risk

Constantly connected Brits put work data at risk

New research by OneLogin, a leader in cloud-based Identity & Access Management (IAM), reveals that the UK is a constantly connected nation, with a quarter of employees admitting that work apps are the first thing they view on their mobile devices when they wake up, coming before social media (18 per cent) and news sites (11 per cent).

In addition, two-thirds (66 per cent) check their work apps while on public transport, 37 per cent whilst in bed, 30 per cent in the car and 18 per cent on a night out. There’s no denying that connectivity is crucial in modern business, but as the habit of accessing work data out of the office increases, as does the opportunity for unauthorised personnel to put this data at risk.

UK employees are quite literally never leaving work, with almost half (46 per cent) of respondents having one to two work apps on their mobile device and almost a quarter (23 per cent) admitting to have more than three. All respondents admit to checking their work apps at least once a day while outside of work.

Although staying connected is great for an organisation’s productivity, it may not be best for employee’s work-life balance, with around a third (28 per cent) worrying that they are too connected and should check work apps less. Almost one in ten (7 per cent) actually check their work apps more than they check their personal ones.

Briton’s work obsession is now putting corporate data at risk. Although three-quarters have security software set up on their work devices (potentially due to organisation’s security policies), employees are making a habit of bypassing simple security procedures. One-in-ten would readily give colleagues access to their work device (11 per cent) and a further one-in-ten (9 per cent) would grant their partners access. 35 per cent would actually share their passwords for work-related technology (devices, apps and emails) with close friends and family. By default these additional people are then granted access to the corporate network.

Further issues arise when employees use their personal devices at work, especially when they aren’t particularly security savvy. 54 per cent of workers access work apps on their personal device, while 33 per cent of those surveyed have no security software set up on these devices.

Constantly connected Brits put work data at risk

“Whether we like it or not, the UK is becoming a nation of workaholics, quite literally carrying work around in our pockets, on public transport with us, on holiday, and even to the bathroom”, comments Per Stritich, VP of EMEA at OneLogin (pictured above).

“Remote and desk-less employees are of course largely beneficial to organisations in terms of productivity and scaling down on costs. However, the correct measures need to be put in place to ensure remote workforces are accessing data securely and that it’s not placed in the hands of others. For example, single sign-on technologies and IAM solutions will ensure only the employee can access work data, no matter who else gets their hands on the device.”

[su_button url=”https://www.onelogin.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on OneLogin click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

AppsFlyer

AppsFlyer Collaborates with AWS

AppsFlyer has announced the expansion of its AppsFlyer Data Collaboration Platform (DCP) offering for brands and commerce…
NHS

Are your medical records safe?

Cyberattacks on healthcare demand robust data management, secure disposal practices, and collaborative cybersecurity measures…
IoT

IoT: Secure and Connected

Hannah Larvin, Features Editor of Security Buyer explores how IoT is transforming security with advanced integration and interoperability…
BeyondTrust

BeyondTrust solidifies leadership position

BeyondTrust, the leader in intelligent identity and access security, has announced significant recurring growth in 2023…
Hacker

Cybersecurity CEO blasts Microsoft for email breach

Microsoft executives had their emails hacked, with the company saying the attack was carried out by a Russian intelligence group…
Southco

Improving Medical Equipment Security

The increasing mobility of equipment in the medical environment raises new cause for concern, especially when managing access to valuable…
Antoine Harb_Team Leader Middle East_Kingston Technology. (1)

Healthcare entities and employees ‘must overcome cybercrime’

Boasting world-class data protection capabilities has never been more essential for companies across industries. While tremendous…
Veeam

Mediclinic Middle East Partners with Veeam

Veeam Software announced it was selected by Mediclinic Middle East to modernize its business-continuity facilities and enhance…
Microsoft

G42 and Microsoft unlock new opportunities

G42 and Microsoft have embarked on the next phase of their ongoing strategic collaboration and announced a multifaceted…

Android device migration

The exchange of smartphones has a significant complication in transferring data to the new device. To overcome this problem, Cloning applications were introduced to overcome this problem, which will clone the entire device to the new one…
Scroll to Top