Many staff are still using work devices for personal and illegal activities

laptop
(Image credit: Shutterstock / ESB Professional)

Since the transition to remote working, businesses have failed to communicate the importance of sticking to cybersecurity policies and preventing cross-contamination between work and personal activities, new data from Yubico suggests.

The password security company surveyed 3,000 remote staff from around Europe and found that almost half (42%) use work-issued devices for personal tasks. Roughly a third of this group use corporate tech for banking and shopping, while 7% visit illegal streaming websites.

What’s more, senior members of staff are among the worst offenders; 43% of business owners and 39% of C-level executives admit to misusing work devices, with many also dabbling in illegal activities online.

Although using a work computer for a bit of online shopping does not in itself pose a threat to cybersecurity, the overlap between personal and professional activities could amplify risks associated with shadow IT, including the accidental compromise of corporate data.

With employees accessing the web and other services for personal reasons, the risk of malware or ransomware infection is also increased.

Remote working security

Another area of vulnerability for many businesses operating under a remote model is password hygiene.

According to Yubico, 54% of employees use a single password across multiple work accounts and services. Meanwhile, 22% of staff still write down their passwords on paper, including 32% of executives.

However, IT departments aren’t holding up their side of the bargain either, the report suggests. Yubico found that more than a third (37%) of remote employees are yet to receive any form of cybersecurity training, which goes some way to explaining the lapses in judgement on the part of employees.

Further, only 22% of respondents said their company has adopted two-factor authentication, which is described as “the best line of defence” to protect against account takeover.

“Virtual working patterns bring new opportunities for businesses and employees, but also introduce additional risk. This includes new avenues for bad actors to breach corporate defences,” said Yubico.

“With millions of workers focused on the pressures of completing tasks in varying and sometimes unusual circumstances, security best practices are often put on the backburner.” 

“Organizations that don’t get a handle on these hazards risk lasting financial and reputational damage from attacks that can leave their assets in tatters.”

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
A computer being guarded by cybersecurity.
Deepfakes and AI attacks are worker's biggest security worries
Giant eye watching at man working at the computer. Surveillance, hacking, internet security concept. Flat vector illustration.
85% of UK employers admit to spying on their employees – and workers aren't happy
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
A digital representation of a lock
Gen Z and Millennial social media accounts are ripe for the taking and this doesn’t surprise me
African Business Team Working On Computer. Software App Development
IT decision makers are blindly trusting suppliers and wasting tech, research shows
Latest in Security
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Polish space agency says it was hit by a cyberattack
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in News
Michelle, Keats, and Doctor Amherst looking unimpressed and worried in The Electric State
Netflix drops trailer for The Electric State, and I'm getting serious District 9 vibes
YouTube TV
YouTube TV might be planning a big Netflix update that puts the best streaming services first
Google Pixel 9 Pro
Here are the 7 best Pixel 9 and Pixel Watch 3 features landing in March’s Pixel Feature Drop
Bang & Olufsen Beogram 4000C Saint Laurent Rive Droite Edition
Bang & Olufsen's latest reworked turntable is a masterpiece of retro revival, in a breathtaking wooden presentation box
Apple Watch Series 10
Apple unveils new Apple Watch bands – here's what's in the Spring 2025 collection
iPad Air M3
Apple makes one hardware change to the iPad Air that might be the best indicator of its true lightweight tablet intentions