094 90 48200    Get SUPPORT

Aniar IT Services Blog

The State of the Internet in a Pandemic

The State of the Internet in a Pandemic

Millions of Americans are suddenly working from home. Students are now learning online. We’re all surviving the quarantine by binge watching our favorite shows on Netflix and Zooming with our friends and family. How does this bode for the Internet, and security in general? Let’s discuss some recent findings.

A Look at the Numbers

Before the pandemic hit, it was believed that roughly 5.2 percent of Americans worked out of their home. That’s about 8 million people, and that number is fairly recent, from 2017. By the end of 2019, we can estimate it was maybe between 5.5 percent to 6 percent.

We can simplify this and say one out of every 20 American workers worked from home before the pandemic.

According to the Bureau of Labor Statistics, only a mere 29% of Americans can actually work from home. That takes into consideration jobs that simply require a person to be at the workplace, like many in the food industry, delivery, construction and many more.

At the time of writing this, I have yet to find solid statistics for the number of Americans working from home right now, but there is a general consensus that it’s somewhere around one in five to one in three. 

That falls right in line with what the Bureau of Labor Statistics shows, and we’re talking about the whole of the United States - things are going to feel different in different states and different areas.

How is the Internet Holding Up?

Back on topic, up to a third of all workers are now doing their jobs from home, plus kids of all ages are taking classes and doing their homework online, on top of the normal traffic that we see everyday. I’m talking about Netflix and other streaming services, online video games, YouTube and social media; all of these services are seeing a huge swing in traffic as more people are stuck at home.

Netflix’s usage, which is normally about 15% of all global Internet traffic, has hit all-time highs, and ISPs are seeing record-breaking amounts of Internet traffic all in all. Thankfully, many ISPs and mobile carriers have loosened or temporarily lifted data caps that would have otherwise caused massive expenses for users trying to work from home (Interestingly, these data caps were supposedly in place to ensure the service functions well. It turns out that in general, the service can still work as intended without them. Let’s hope service providers don’t revert back to the old ways after all this is over).

All that said, it’s not perfect for everyone. Rural users with limited access to broadband are still struggling, and in larger, more populated areas where the infrastructure might be a little older have been bumping into frustrating downtime. Still, all in all, a large part of our workforce is able to get things done effectively while maintaining quarantine, and that’s huge.

Cybersecurity is More Important Than Ever

Here’s the thing; being able to stay in business and keep your customers happy and your employees safe during this trying time is a big deal. That said, you can’t do all of that without also understanding the additional risks you might be opening up to. This isn’t meant to sound like doom and gloom - I want businesses to survive and strive. I want to hear success stories. I want business owners coming out of this with a new perspective on how they operate their business, trust their employees, and bolster their bottom line.

This could be a renaissance for the modern office, shifting the paradigm to normalize a remote workforce. Suddenly, you have fewer expenses, happier employees, and everyone can wear comfy pants more often. Or, maybe we’ll all decide we miss working together in the office so much and never look back. Either way, I digress...

Your business might not be able to see how this all turns out if you don’t secure all those new endpoints. Everyone who is working from home on a personal device just opened up a new weakness in your IT’s armor, especially if you aren’t providing the proper means of accessing company data and applications.

Ensuring that your users are able to work securely is going to be critical, because the last thing you need to deal with is additional downtime or data breaches.

Aniar IT Services can help review your needs and provide the right solutions to ensure your remote workforce can effectively do their jobs without risking your data. If you need help or advice, give us a call at 094 90 48200 to get started.

How to Safely Use Wireless Internet to Work from H...
Tip of the Week: Stay Positive When Disaster Strik...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 27 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Productivity Business Computing Best Practices Email Cloud Privacy Workplace Tips Efficiency User Tips Network Security Google Hosted Solutions Innovation Internet Data Microsoft IT Support Software Hackers Hardware Collaboration Users Business Smartphones Mobile Device VoIP Communication Small Business Data Backup Managed IT Services Data Recovery Cybersecurity Android Tech Term Windows 10 Phishing Cloud Computing Mobile Devices Computer Smartphone Communications IT Services Malware Network Gadgets Backup Outsourced IT Windows Business Continuity Browser Miscellaneous Saving Money Internet of Things Artificial Intelligence Business Management Managed Service Facebook Spam Information Disaster Recovery Office 365 Save Money Upgrade Social Media Chrome BDR Passwords Server Quick Tips Covid-19 Automation BYOD Holiday Router Wi-Fi How To Microsoft Office Blockchain Operating System Paperless Office Mobile Office Word Cybercrime Computers Data Security Applications Encryption Data Storage Apps Networking Windows 7 Vulnerability Government Data Breach Remote Work Data Protection Patch Management HIPAA Ransomware Telephone System Mobile Device Management Remote Monitoring Connectivity Settings Money Virtualization Two-factor Authentication Display Managed IT Human Resources Infrastructure History Staff Bandwidth Bring Your Own Device Virtual Assistant Managed IT services Business Technology Redundancy Voice over Internet Protocol Vendor Management Big Data IT Management App Telephone Systems Hard Drive Website Meetings Health Social Engineering Avoiding Downtime Office Google Drive Education Managed Services Provider Identity Theft Servers WiFi Audit Wireless Comparison Vendor Procurement Private Cloud IT Plan OneNote Help Desk Google Docs Sports Conferencing Machine Learning Access Control Compliance Digital Signage Law Enforcement Cryptocurrency Telephony Employee/Employer Relationship CES Unsupported Software Fraud Software as a Service Scam Augmented Reality Training Update Business Intelligence Keyboard Content Management Botnet VPN Remote Spam Blocking Processor Password Procedure Document Management Camera Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Peripheral Wireless Internet Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Going Green Legal Wiring Managed IT Service Sales Search Engine Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Project Management Quick Tip USB Firewall Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time Criminal Twitter Windows 10s Digital Signature SharePoint Bing Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Wire Physical Security Apple Entertainment Warranty Excel GDPR Digitize Google Apps Employer-Employee Relationship Employee Bitcoin Regulations Electronic Medical Records Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Supply Chain Management Addiction OLED Using Data Credit Cards PDF HVAC Flash SMS Gmail Cast File Sharing ISP Value Workforce Data Management Printer Tip of the week Remote Computing IT Assessment Workers Specifications Batteries PCI DSS Mobile Computing Default App Shopping Evernote Cleaning Trending Managed Services Public Cloud Biometric Security Information Technology HaaS Virtual Machine AI Recycling Devices Cryptomining Computer Fan RMM YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive 5G Authentication Data loss Google Search Virtual Private Network Policy Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Cache Software Tips Telecommuting Manufacturing Computing Hacker Amazon Shortcuts Hypervisor The Internet of Things eWaste Thought Leadership Remote Worker Database Remote Workers FENG Employees Microchip Computer Care Copiers Cortana Alert Save Time Competition Customer Relationship Management IP Address Managed Service Provider Managing Stress Hiring/Firing Customer Service Fun Personal Information Domains Windows 10 Financial Public Speaking Presentation Lithium-ion battery Hard Drives Search Tech Support Wireless Technology Regulation Safety IBM Marketing CrashOverride Productivity Budget Company Culture Emergency