fbpx

Who’s stealing all the bandwidth?

Click…wait. Click…wait. Click…ARGH! Sounds like someone is running out of bandwidth.

What is bandwidth?

Bandwidth is a lot like plumbing. The bigger the pipes, the more water can flow through. Similarly, the more bandwidth you have, the more data you can send or receive at any given time. An internet connection with a larger bandwidth can move a set amount of data (say, a video file) much faster than an internet connection with a lower bandwidth. However, be aware that with greater bandwidth comes greater cost and responsibility.

Is someone or something taking your bandwidth?

Our dedicated team of experts has put together a list for you to help you determine who/what’s stealing all the bandwidth? Don’t fall victim to these bandwidth bandits!

Who’s stealing all the bandwidth?

Not so long ago, it would have been ridiculous to ask an employer to give you free TV, free movies, free music and a free TV camera and crew at your house in case you wanted to work from home and conduct a meeting with coworkers. Yet, with the internet, all of these things and more are at the fingertips of most office employees and their remote counterparts. Naturally, a growing number of employees will use some or all of these services for personal use while under your roof and on the clock wasting your valuable bandwidth.

Many employees use much more bandwidth than necessary to do their jobs. As a business owner, what can you do about it? First of all, you’ve got to let your employees know that bandwidth is more than a commodity. Just like electricity, water, and leasing building space, bandwidth is a necessary expense you need to keep your business running. But unlike all the other expenses, the amount of bandwidth you truly need varies based on the workload and what you allow. It can be overused by employees who stream videos, stream music or play video games between completing company tasks. So, what are the most abused “Bandwidth Bandits”? Let’s take a look.

VIDEO:

Does your company upload or store video content on a daily basis? Many companies do these days, especially for marketing and training purposes. In addition to these, what about the videos that are being watched inbetween company projects? Viewing TV shows or movies online uses about 1 GB of data per hour for standard definition video, and up to 3 GB per hour for HD video. Downloading and streaming consume about the same amount of data. Since just about everything online is HD quality, you can see that those streaming and storing video content are usually the guiltiest bandwidth abusers in your office.

WI-FI:

Everything that is available to your employees through their internet connection is available through Wi-Fi. The extra strains Wi-Fi puts on bandwidth are caused by the users who connect their phones to Wi-Fi so they can save on their personal data plan. At no extra cost to them, they can stream video and surf online on their phones. Some people even use their phones to play video games while on (or off) their lunch breaks. Just being connected puts a small drain on your Wi-Fi, but all the rest can slow your network down to a crawl.

THE CLOUD:

Using the Cloud adds a lot of flexibility to your business. The scalability allows you to tailor your bandwidth needs as your company’s needs grow or shrink, but the amount of bandwidth usage varies as more and more files and programs are shared through the Cloud. With subscription-based software programs becoming the norm, there’s data floating in and out of your employee’s workstations all day. If you use heavy-hitting data drainers like HD video files that are shared between two or more employees, your Cloud gets weighed down fairly quickly. If not monitored properly, excess data usage through the Cloud can clog your system like hair in a bathtub drain.

VIDEO CONFERENCING:

Whether you’re working from home, meeting with clients, or even interviewing potential new employees, video conferencing is definitely a tool that makes good business sense. Many business trips have been replaced by video conferencing, and that’s good for your budget. But now you’re sending that information through your internet connection which needs to be factored into your bandwidth needs. The good news is that video conferencing costs a lot less than travel, so spending a little more on bandwidth is probably the most cost-effective way to meet with people one-on-one.

STREAMING MUSIC:

Many people enjoy listening to music while at work, and if the company allows it, then it’s no big deal. Right? Well, mostly right. Problems may arise when the streaming music is left running 24 hours a day or multiple people are competing, blasting their own tunes. The more people stream music, the more it will cause a drain on your bandwidth. Even though music streams at a low data rate, some services allow users to store their music files on the Cloud, and that causes a bump in the data flow. Accessing personal music files and streaming internet radio may not take up too much bandwidth, but the number of employees who are constantly listening to music adds up. If most of your employees listen to streaming music, then data usage should be monitored.

SOCIAL MEDIA:

Humans are social creatures and they search out ways to stay connected to people they are close to. Social media gives us many ways to stay in touch with others, but in the office, that comes at a price. When business owners calculate the bandwidth requirements for start-ups, they often don’t factor in their employee’s social media habits. Sure, most functions utilized through social media don’t use much data at all, but increasingly, video attachments are sent along with text messages. Even in a compressed state, video files are among the greediest bandwidth thieves.

As you can see, there are many ways your bandwidth is being used throughout the day and it can impact your business in a variety of ways. For example, just a few years ago, it was taboo for employees to spend time watching videos on YouTube or looking at pictures of their nephew’s graduation on Facebook during work hours. Today, it is generally accepted that employees will spend some time doing these things.

As a business owner, you can place limits or controls on these habits, but these actions may cost you in other ways. Employee morale is linked to online habits, and if employees can’t stay in touch with their friends on your time, they’ll probably take more breaks than they used to so they can wish Aunt Edna a happy birthday.

It’s a challenge to find a balance between the bandwidth your business needs and the bandwidth your employees need. As the one who writes the checks, it may not seem fair that you’re funding someone else’s online habits, but in today’s business arena, it’s the price of doing business. In the next blogs, we’ll show you how to rein in these data hogs all while maintaining positive company culture and avoiding mutiny.

How To Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers would have moved on to their next idea for swindling people out of their identities and money. How do you spot a phishing attack and avoid falling victim yourself?

Look for these red flags:

  • Sender Email Address: Always check to make sure that the email address is legitimate. Amateur hackers will send things from Gmail or Hotmail accounts and hope you don’t notice. More sophisticated hackers will closely mimic an actual email domain, like amazonprime.com rather than amazon.com. Double check the email address before responding, clicking, or opening, even if the from name appears correct.
  • Discrepancies in Writing Format: If the attack is coming from overseas, you’re likely to notice some small issues in writing format, like writing a date as 4th April, 2019 rather than April 4, 2019. While this is subtle, it should be a red flag.
  • Grammar Issues: We all fall victim to the occasional typo, but if you receive an email riddled with grammar and spelling mistakes, consider the source. It’s likely from a hacker, especially if the email supposedly comes from a major organization.
  • Sender Name: This one is also difficult to track, but phishing emails will typically close with a very generic name to avoid raising suspicion. You should recognize the people that send you emails, or at the very least clearly understand their role at the organization.
  • Link Destination: Before you click on any link in an email be sure to hover over it. The destination URL should pop up. Check out the domain name of this URL. Similar to the sender email address, make sure that this address is legitimate before clicking.
  • Attachments: Is it realistic to expect an attachment from this sender? Rule of thumb, don’t open any attachment you don’t expect to receive, whether it’s a Zip file, PDF or otherwise. The payload for a ransomware attack often hides inside.
  • Email Design: A cooky font like Comic Sans should immediately raise red flags, especially if you don’t clearly recognize the sender.
  • Links to Verify Information: Never ever click on a link to verify information. Instead, if you think the information does need updating go directly to the website. Type in your email and password, and update your information from the Account tab. Always go directly to the source.

Odd Logo Use: Hackers try their best to mimic a websites’ look and feel. Oftentimes, they get very close; but they won’t be perfect. If something feels off, it probably is.

While there is no fool-proof method for avoiding falling victim to a phishing attack, knowing how to spot likely culprits is one step in the right direction. We’ll cover other protective measures to reduce your risk of falling victim to phishing attacks in our next blog.