SHARE
Facebook X Pinterest WhatsApp

Steps To Control Worker Misuse of ‘Net

(Editor’s Note: This is a sidebar to Employee Abuse of Internet Rampant.) Most companies take very few, if any, steps to control or guide their employees’ Internet access, according to industry analysts. Here are a few recommendations from corporate users, analysts and security consultants on how to take charge of the situation: The first thing […]

Apr 24, 2002
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

(Editor’s Note: This is a sidebar to Employee Abuse of Internet Rampant.)

Most companies take very few, if any, steps to control or guide their employees’ Internet access, according to industry analysts. Here are a few recommendations from corporate users, analysts and security consultants on how to take charge of the situation:

  • The first thing to do is set policy. That may not be as easy as you think. What isn’t allowed? Porn? Gambling? Gaming? Sure, but what about emails to Mom or checking a news site at lunchtime?
  • Don’t forget to consider Instant Messaging. Is it a great communications tool or a time waster that leaves online conversations insecure as they pass through a third-party server?
  • When setting policy, it may be easier to specify what is allowed than what isn’t. Most IT executives could spend all day listing what should be banned. It might be easier to focus on what is allowed.
  • Once you set policy, make sure every employee knows what the rules are and understands them. Workers can’t be expected to follow rules they aren’t aware of. And don’t forget to educate new employees as they come onboard.
  • Enforce your policies.
  • Set up monitoring software so you know where employees are going when they’re Web surfing. And once it’s set up, make sure you actually put the time in to analyzing the information. It won’t do you any good if you’re not paying any attention. And that could mean creating a position just for that job.
  • If you are going to monitor network traffic or employees’ desktops, give them the courtesy of letting them know you’ll be doing it.
  • If there are specific Web site you don’t want employees visiting, block access to them.
  • Be granular. If some employee positions don’t need Internet access, simply don’t give it to them. And remember to give users specific rights about where they can and can’t go on the network.   SEE ALL
    ARTICLES
     
  • SG

    Sharon Gaudin is a veteran technology journalist who has worked for the likes of Computerworld, InformationWeek, and Datamation. She has covered everything from the cloud, security, and social networking to software development, robotics, artificial intelligence, and hardware.

    Recommended for you...

    AI in Cybersecurity: The Comprehensive Guide to Modern Security
    Liz Ticong
    Apr 29, 2024
    What Is Cybersecurity? Definitions, Practices, Threats
    Liz Ticong
    Apr 8, 2024
    How to Secure a Network: 9 Key Actions to Secure Your Data
    Liz Ticong
    Mar 21, 2024
    7 Best Data Security Software: Solutions For 2024
    Datamation Logo

    Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

    Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

    Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.