Get Started Today!  321-259-5500

croom new

Tip of the Week: Keep Employees Off of Distracting Websites

Tip of the Week: Keep Employees Off of Distracting Websites

As incredible a tool as the Internet truly is, for every website that is beneficial to the workplace, there is another that is certainly the opposite. Naturally, it is these sites that your employees would most likely want to visit if left to their own devices. Sometimes, the best course of action is to remove the temptation and block these websites. For this week’s tip, we’ll talk about a few ways to do so.

Block Websites from the Network
The most basic way to block your employees from accessing websites is to block these websites from the entire office network. To do so, you’ll need to have IT access your router and make the requisite changes.

Not all routers make this easy to control, especially if you want to give some users access to certain sites while blocking others. You may need to invest in infrastructure better designed to manage content filtering for multiple users.

Extensions
Of course, there are other options if you don’t want to fool around directly in your router’s settings. There are a few free extensions available that allow your employees to self-monitor, but this, of course, requires quite a bit of trust in your employees. Besides, if your employees are trustworthy enough to monitor their own Internet use, you probably don’t need to worry about blocking certain websites, do you?

Ramifications
You should also consider why your employees are becoming distracted at work, anyways. One study showed that, while blocking websites did help previously distracted employees focus better and be more productive (especially those whose work suffered due to social media use), these employees were also considerably more stressed. Furthermore, this same study also indicated that some employees would substitute their online distractions with other activities that sometimes brought them out of the office on breaks.

There is also the fact that a blanket ban may not be completely beneficial to your business, either, especially where some of your client outreach is concerned. Social media outlets have proven their worth as a business tool, so you may not want to completely block everyone from its use. Give us a call at 321-259-5500 so we can discuss some of your options to resolve this.

What kind of websites have you found to be the biggest distractions in your business? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Malware Hackers Business Computing Business Email Internet Hosted Solutions Productivity Backup Computer IT Services Mobile Devices Microsoft Software Network Security Managed Service Provider Windows 10 Ransomware Smartphone Google Hardware User Tips Android Data Business Continuity Workplace Tips Tech Term IT Support Data Management Disaster Recovery Innovation Efficiency Managed IT Services Server App Small Business Social Media Communication Encryption BYOD Browser Smartphones Data Recovery Network Cloud Computing Productivity Business Management Facebook Gmail Windows Artificial Intelligence Internet of Things Office 365 Big Data Paperless Office Phishing Hosted Solution Employer-Employee Relationship Office Apps WiFi Government Passwords Vendor Management Firewall Robot Save Money Remote Monitoring Miscellaneous Mobile Device Management Recovery Spam Alert Risk Management Data Backup Upgrade Office Tips Wireless Technology Outsourced IT Word Virtualization IT solutions Work/Life Balance Hacker Cybersecurity Saving Money How To Vulnerability Holiday Infrastructure Wireless Tip of the week Avoiding Downtime Content Filtering Wi-Fi Two-factor Authentication Chrome IT Support Microsoft Office Budget Money Password VoIP Antivirus Website Bandwidth Remote Computing Education Hard Drives Apple IT service Settings The Internet of Things Document Management Going Green Twitter Windows 10 Cybercrime Applications Computing Customer Service Analytics Automation Legal Virtual Reality Data storage Unified Threat Management Tech Support VPN SaaS Social IT Management Managed IT Services Training Mouse Automobile Physical Security Chromebook Maintenance Storage Virtual Desktop Telephone Systems Solid State Drive User Error Compliance Business Owner Search Scam Competition User Network Management Regulations Router Blockchain Best Practice Administration Patch Management eWaste Data loss End of Support Politics Safety Collaboration Heating/Cooling Health Data Security IBM HIPAA Bring Your Own Device Downtime Websites Upgrades Identity Theft Printing Cost Management File Sharing communications Cortana Virtual Private Network Customer Relationship Management G Suite YouTube Botnet Google Drive Mobile Security Unified Communications Monitors Taxes Lithium-ion battery Machine Learning LiFi Hacking Sports Samsung Business Intelligence Server Management Computers Running Cable Tablet Presentation Outlook Computer Care Augmented Reality Mobile Device BDR Business Technology Comparison Trending Quick Tips Social Engineering Windows 8 Star Wars Title II Analyitcs Fun Application Google Maps Development Point of Sale Licensing Identities Lenovo Specifications CIO VoIP Staffing Social Networking Hacks Assessment Save Time Online Marketing Superfish Emoji Corporate Profile Cables Dark Data Web Server Cooperation Mobile Computing Black Friday Law Enforcement IP Address Time Management GPS Motherboard Internet Exlporer Backups Microsoft Excel Shortcut Personal Information Public Speaking WannaCry Wires Cameras Staff Entrepreneur Cyber Monday Gadget Mobile Office Tracking Current Events Refrigeration Hard Drive Administrator Computer Repair Networking Black Market CCTV Wearable Technology Smart Technology Touchscreen Modem Cabling Cache Permissions Hiring/Firing Laptop Environment Digital Network Congestion Distributed Denial of Service Cookies Recycling Operating System Fraud Electronic Medical Records Halloween Techology Processors Spyware Display Business Growth Managed IT Service iPhone 3D Printing Supercomputer Nanotechnology Managed IT Disaster Management Travel Mail Merge Scary Stories Unified Threat Management Troubleshooting IT Technicians Alt Codes Downloads Information Technology Break Fix Servers Gadgets Unsupported Software Law IT Budget Screen Reader Undo Uninterrupted Power Supply Company Culture Google Docs Motion Sickness Hotspot Knowledge Address Printer How To IT Consultant Mirgation Typing Multi-Factor Security Google Wallet Dark Web Relocation 5G Users Mobile Data Digital Payment Smart Tech Hard Disk Drive Managing Stress Language Experience Access Control Notifications Firefox Writing Cleaning Chatbots Cryptocurrency Google Calendar Drones Net Neutrality Private Cloud Statistics Connectivity Enterprise Content Management Meetings Computing Infrastructure Deep Learning Buisness SharePoint Crowdsourcing Retail Identity Bitcoin Legislation IoT FCC Co-managed IT Error Bluetooth Update Vulnerabilities Humor Webcam Alerts Domains USB CrashOverride Help Desk Flexibility Emergency

      Latest Blog Entry

      Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuf...

      Account Login