Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

Do You Know What Your Employees Are Doing Online? If You Don’t, You’re At Risk!

by | May 1, 2012

The Internet and e-mail have become indispensable tools for business, but many companies are finding employees are using these tools as much or more for personal activities than job-related tasks.  In fact, many business owners have recognized that unrestricted use of the Internet by employees has the potential to drain, rather than enhance productivity and, at worst, can even have dire legal consequences.

A Two Pronged Approach

To reduce the risk and minimize non-productive activities, business owners are utilizing a two pronged approach: (1) Implementing an Internet Acceptable Use Policy (IAUP) and (2) installing a monitoring system to restrict and police employees’ online activities.

An AUP is nothing more than a written agreement that sets out the permissible workplace uses of the Internet and e-mail.  In addition to describing permissible uses, an AUP should specifically set out prohibited uses, rules of online behavior, and access privileges with penalties for violations of the policy spelled out, including security violations and vandalism of the system.

Not only does an IAUP reduce wasted hours on the net, it can reduce bandwidth and equipment needs, as well as shield you, the business owner, from possible sexual harassment and other lawsuits arising from your employee’s inappropriate use of the web.

An AUP Is A Good First Step,
But It’s Only Half The Battle Won

Unfortunately, not everyone follows policies, and some accidentally will violate your AUP. To ensure company policies are being followed, businesses are choosing to monitor all Internet activity initiated by their employees using a web content filtering software.

Tools available today, like Edgewave’s iPrism, make monitoring of employee Internet usage simple and easy. Most companies choose to regularly monitor summary level activity like hours connected to the web, number of sites visited, and illegal or banned sites visited by the company while leaving detailed transaction reviews as necessary on a case-by-case basis.

And if someone complains that this is a violation of their privacy, rest assured that nothing could be further from the truth.  It’s not only legal but good business.  After all, they are using your company assets and if employees are focused on productive work and minimize personal use of the Internet, you’re likely to never need to address their Internet

Is Your Social Security Number Leaked? Here’s How To Find Out And What To Do Next

By now, most Social Security numbers (SSNs) — one of the most critical pieces of personal information in the U.S. — have found their way onto the dark web. Massive breaches at major companies, government sites, and even healthcare providers have exposed millions of...

Maximizing Workplace Productivity with a Year-End Tech Refresh

As the year draws to a close, it’s a great time to reflect on how your business has grown and evaluate how your technology is supporting—or hindering—your team’s productivity. In today’s fast-paced, tech-driven environment, keeping your technology updated and...

2025 Cybersecurity Predictions: What Every Small and Medium-Sized Business Needs to Know

Cybersecurity threats are evolving faster than ever. What once seemed like science fiction—AI-driven cyberattacks and quantum computing—are now tangible risks. For small and medium-sized businesses, this isn’t just an IT issue; it’s a business-critical challenge....

Cyber Insurance for Small Businesses: Why You Need It and How to Get Covered in 2025

In today’s world, cyberthreats are no longer just a big-business problem. Cybercriminals are increasingly targeting small and medium-sized businesses (SMBs), which often lack the robust defenses of large corporations. With the average cost of a data breach exceeding...

6 Ways Your Phone Is Tracking You

Your Phone Is Listening… And Tracking You Too! Have you ever casually mentioned a product or service near your phone, only to see ads for it on social media moments later? It’s no coincidence—your phone is listening. But there’s something even more concerning: your...