Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The State of the Internet in a Pandemic

The State of the Internet in a Pandemic

Millions of Americans are suddenly working from home. Students are now learning online. We’re all surviving the quarantine by binge watching our favorite shows on Netflix and Zooming with our friends and family. How does this bode for the Internet, and security in general? Let’s discuss some recent findings.

A Look at the Numbers

Before the pandemic hit, it was believed that roughly 5.2 percent of Americans worked out of their home. That’s about 8 million people, and that number is fairly recent, from 2017. By the end of 2019, we can estimate it was maybe between 5.5 percent to 6 percent.

We can simplify this and say one out of every 20 American workers worked from home before the pandemic.

According to the Bureau of Labor Statistics, only a mere 29% of Americans can actually work from home. That takes into consideration jobs that simply require a person to be at the workplace, like many in the food industry, delivery, construction and many more.

At the time of writing this, I have yet to find solid statistics for the number of Americans working from home right now, but there is a general consensus that it’s somewhere around one in five to one in three. 

That falls right in line with what the Bureau of Labor Statistics shows, and we’re talking about the whole of the United States - things are going to feel different in different states and different areas.

How is the Internet Holding Up?

Back on topic, up to a third of all workers are now doing their jobs from home, plus kids of all ages are taking classes and doing their homework online, on top of the normal traffic that we see everyday. I’m talking about Netflix and other streaming services, online video games, YouTube and social media; all of these services are seeing a huge swing in traffic as more people are stuck at home.

Netflix’s usage, which is normally about 15% of all global Internet traffic, has hit all-time highs, and ISPs are seeing record-breaking amounts of Internet traffic all in all. Thankfully, many ISPs and mobile carriers have loosened or temporarily lifted data caps that would have otherwise caused massive expenses for users trying to work from home (Interestingly, these data caps were supposedly in place to ensure the service functions well. It turns out that in general, the service can still work as intended without them. Let’s hope service providers don’t revert back to the old ways after all this is over).

All that said, it’s not perfect for everyone. Rural users with limited access to broadband are still struggling, and in larger, more populated areas where the infrastructure might be a little older have been bumping into frustrating downtime. Still, all in all, a large part of our workforce is able to get things done effectively while maintaining quarantine, and that’s huge.

Cybersecurity is More Important Than Ever

Here’s the thing; being able to stay in business and keep your customers happy and your employees safe during this trying time is a big deal. That said, you can’t do all of that without also understanding the additional risks you might be opening up to. This isn’t meant to sound like doom and gloom - I want businesses to survive and strive. I want to hear success stories. I want business owners coming out of this with a new perspective on how they operate their business, trust their employees, and bolster their bottom line.

This could be a renaissance for the modern office, shifting the paradigm to normalize a remote workforce. Suddenly, you have fewer expenses, happier employees, and everyone can wear comfy pants more often. Or, maybe we’ll all decide we miss working together in the office so much and never look back. Either way, I digress...

Your business might not be able to see how this all turns out if you don’t secure all those new endpoints. Everyone who is working from home on a personal device just opened up a new weakness in your IT’s armor, especially if you aren’t providing the proper means of accessing company data and applications.

Ensuring that your users are able to work securely is going to be critical, because the last thing you need to deal with is additional downtime or data breaches.

Total Tech Care can help review your needs and provide the right solutions to ensure your remote workforce can effectively do their jobs without risking your data. If you need help or advice, give us a call at 866-348-2602 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Communication IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Saving Money Holiday Social Media Tech Term Chrome Virtualization Gadgets Automation Managed Service Microsoft Office Managed IT Services Artificial Intelligence Facebook Cybercrime Operating System Computers BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Internet of Things Telephone Systems Information Information Technology Managed Service Provider Remote Spam Covid-19 Office 365 Alert Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR App History Application Password Money Data Breach Encryption Applications Human Resources Big Data Remote Monitoring Law Enforcement Mobile Computing Managed IT Blockchain Data Storage Paperless Office Office Tips Patch Management Training Apps VPN Remote Computing Government Mobile Office How To Private Cloud Website Budget Bring Your Own Device Data Management Wireless Work/Life Balance Vulnerability Windows 7 Word Gmail Infrastructure Settings Voice over Internet Protocol Servers Google Drive Two-factor Authentication Data Security Mouse Avoiding Downtime HaaS Flexibility Marketing WiFi IT solutions Entertainment Risk Management RMM Hacker USB Software as a Service Conferencing Telephone System Staff Cleaning Machine Learning The Internet of Things Lithium-ion battery Scam Connectivity Remote Work End of Support Education Physical Security Vendor Management Firewall Safety Sports HIPAA Virtual Reality Redundancy Apple Keyboard Data Protection Social Vendor User Error Managed Services Display Meetings Save Time Employee/Employer Relationship Biometrics Data storage Virtual Assistant Authentication Virtual Desktop Automobile Computing DDoS Computing Infrastructure Business Intelligence IT Consultant Going Green SharePoint Update Worker Audit IT Management Humor Digital Signage Google Docs Battery Shadow IT Identity Theft Customer Service Botnet Environment IT Plan Legal Procurement Internet Exlporer Fax Server Workplace Strategy Unsupported Software Net Neutrality Augmented Reality PDF Charger SaaS Help Desk Fraud Printing Remote Worker Compliance OneNote Computer Care Proactive IT Current Events Cryptocurrency Network Congestion Best Practice eWaste Virus Telephony Managed Services Provider Samsung YouTube Black Market Database Unified Threat Management Computer Accessories Comparison Remote Workers Value CES Electronic Medical Records Wearable Technology Document Management Spam Blocking Processor Solid State Drive Wireless Technology Retail Hard Drives Instant Messaging How to Downtime Business Technology Content Management Hard Drive Hiring/Firing Access Control Printer Robot Excel Bluetooth Tip of the week Copiers webinar 5G Emergency Employer Employee Relationship Uninterrupted Power Supply Printer Server Workforce Professional Services Quick Tip Public Cloud Colocation Virtual Private Network Ergonomics Assessment Smartwatch Cables Windows Server 2008 Development Monitor OLED Virtual Machine Nanotechnology Telecommuting Tools Science PCI DSS Project Management 2FA Fiber Optics Television Employee Cortana Messaging Reputation Cabling Streaming Media Digital Signature Warranty Hypervisor Tech Support Distributed Denial of Service Customer Relationship Management Content Policy Analyitcs Dark mode Techology Trend Micro Public Computer Laptop HVAC Google Apps Analysis Programming Regulations SMS Customers Default App Transportation Administrator Saving Time Rootkit Devices Audiobook Procedure Computer Fan dark theme Shopping Touchpad Enterprise Content Management Google Search Accountants Antivirus AI Workers MSP Consultant IT Infrastructure Benefits Microchip Thought Leadership Analytics Bing Credit Cards Politics Windows 8 FinTech FENG Advertising Social Network IBM Password Management Password Manager IT service Multi-Factor Security Flash Best Available Investment Smart Technology Notifications Search Engine WIndows 7 Employee/Employer Relationships Twitter Tablet Employees Windows 365 Software Tips Supercomputer NIST ISP Business Mangement Domains Smart Tech Trending Sync Video Conferencing Emails Relocation ROI Bitcoin Addiction IaaS Shortcuts Amazon Maintenance Sales Bloatware Point of Sale Video Games Personal Cryptomining Recycling Two Factor Authentication Practices Worker Commute Supply Chain Management Netflix Wiring Root Cause Analysis User Batteries Cache PowerPoint Amazon Web Services Windows Media Player Experience Tablets Monitoring Entrepreneur Windows 8.1 HBO Scalability Digitize Knowledge Safe Mode Music Criminal Hosted Computing Skype Business Owner GDPR Windows Server 2008 R2 Data loss Managing Stress NarrowBand Wireless Internet Online Shopping Shortcut Customer relationships Cost Management Email Best Practices Outlook Search IT Assessment Leadership File Sharing Manufacturing Troubleshooting Inventory Cameras Specifications Social Networking Start Menu iPhone Camera Computer Tips Screen Mirroring Managed IT Service Loyalty Wire Security Cameras Evernote Travel Virtual CIO Frequently Asked Questions OneDrive Biometric Security Books Running Cable Millennials Mobile Peripheral Windows 10s Files Printers Digital Security Cameras Cast Using Data Chromecast Smart Office Wireless Charging Memory

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code