Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Whole Work Week Wasted Each Year Due to Mobile Apps

b2ap3_thumbnail_smartphone_distraction_400.jpgHow much time do you waste on your mobile phone’s applications on a regular basis? With so much entertainment and social media at your fingertips, it can be tempting to just forget about work for a bit and zone out to Candy Crush. Unfortunately, it seems that a lot of employees have this mindset. The Nielsen Company made some shocking discoveries about how much time is wasted on mobile applications each month, and the results are disturbing.

In fact, the average person spends almost two whole days every month using their mobile device, be it a tablet or a smartphone. These statistics were taken using Nielsen’s mobile app tracking application, and takes advantage of data collected from the fourth quarter of 2014 from around 5,000 iOS and Android devices owned by users aged 18 or older.

mobile app 1

As you can see, the average amount of time spent on smartphones has increased drastically in the past three years alone, and it can be expected to increase further in 2015. While the number of apps used to waste time haven’t necessarily increased or decreased, smartphone user lethargy can be expected to exceed 40 hours (a full work week for the average employee) in the next year.

So, what’s taking up all of this time? In first place is gaming applications, followed by music second and video applications in third.

mobile app 2

Is there anything in particular you notice about these statistics? If anything, it should be the shocking lack of productivity applications. This means that smartphones are typically used as an entertainment device rather than a productivity device to the common user (which - hint hint - your employees are). As a business owner, you might feel that you waste more time in your email application than anything else; but for your employees, this might not be the case.

If your employees are wasting away this time in the office, you will see a drastic decrease in workplace productivity. That’s basically like paying someone’s salary for a week while they play games and waste time in the office; and that’s not okay. If your organization provides your employees with mobile devices for work around the clock, this is extra frustrating. After all, it’s like you are doing them a service to provide them with handheld entertainment.

If this is the case, you have the ability to block certain applications from these devices from connecting to your network. This is called whitelisting and blacklisting apps, and can be helpful not only for productivity, but also for enhancing corporate data security and minimizing data theft. Give us a call at (518) 203-2110 to learn more, and ask about our mobile device management and content filtering solutions.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 02 February 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Microsoft Office Office Content Filtering Wireless Technology Android Cybercrime Website Apple Best Practice Alert Employer-Employee Relationship Networking Two-factor Authentication Data storage History Data Windows Small Business Phishing Experience App Mobile Computing Big Data communications Safety Unified Threat Management Money Mobile Device Management Smartphones Network Quick Tips Managed Service Provider Outlook Firewall Tech Support Word Compliance Heating/Cooling Drones Bluetooth Social Printer Business Management Browser Automation Virtual Desktop Memory Wireless Securty Competition Unified Communications Presentation Document Management Entrepreneur Encryption Deep Learning Domains Law Enforcement SaaS BDR VoIP Hacker Proactive IT Vendor Management Cortana Network Congestion Application Save Money Customer Service Music Monitors Laptop Cryptocurrency Router Displays IBM Office 365 Google Docs Education Holiday Cleaning Analytics Black Market YouTube End of Support Saving Money Processors Lithium-ion battery Office Tips LiFi intranet Staffing Downtime BYOD Passwords Streaming Media Writing Help Desk Micrsooft Visible Light Communication Social Networking Disaster Public Speaking IP Address Business Growth Virtualization Data Management Robot Advertising Recovery Society Government Sports Augmented Reality Google Wallet Keyboard Spam Retail Running Cable Search User Information Technology Windows 8 Internet of Things Hard Drives Remote Computing Hosted Solution Shortcut Windows XP Managed IT services IT Services Documents DDoS Artificial Intelligence
QR-Code