Two thirds of remote workers use a faulty device so they don’t get into trouble! copy
June 8, 2022
|
4
min read

Highlights
A new report has discovered that 67% of remote workers are using faulty tech when they work remotely.
And often that’s because they’ve accidentally damaged the tech themselves…
A company that sells refurbished technology surveyed 2,500 UK employees.
It found that laptops were most likely to be broken, followed by keyboards, monitors and PCs.
Most of the time the damage was done by spilled food and drink. Other causes of damage included other people in the house – such as a partner or housemates – and of course, pets.
We’ve all watched in horror as a cat brushes itself against a full glass of water next to a laptop…
While more than half of people try to fix the damage, and 81% of people continue to use their faulty device with limited features, a third of workers switch to their personal devices instead.
As well as this causing a loss of productivity, it could also be a huge data security risk for your business. Because it’s possible their personal laptop doesn’t have as much security protection as their work laptop does, such as:
- Security software
- Data encryption
- Enhanced password protection such as multi-factor authentication
Their personal devices also aren’t being monitored by your IT support partner. When an attacker gains access to an unmanaged device, if it’s connected to your network, it’s possible they can get access to the wider network, and all of your business’s data.
This can result in your data being stolen and sold. Or worse, your data being encrypted so it’s useless to you – and you must pay for its return. This is called a ransomware attack and it’s the greatest cyber security threat to your business right now.
It’s not just access to your data that’s the problem. After a ransomware attack, there is a huge time and financial cost involved in making sure your network is clean, protected and secured.
Our advice is to make sure that everyone in your business understands the risks involved with using personal devices for work purposes, whether they work remotely or not.
You might want to make a golden rule that all work must only be done on business devices.
You could also create a culture where it’s OK if a device gets damaged, so long as it’s reported quickly.
If you need any help choosing the right technology or cyber security approach for your team, or creating new policies to help your staff choose to do the right thing, give us a call!
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

