Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

So What’s The Harm In A Little Personal Web Surfing And E-mailing Now And Again At Work?

by | Aug 11, 2012

Staggering When You Look At These Alarming Statistics:

 Another Monday morning and you look over your office of busy employees hard at work on their computers.

What you may not realize is…

  • Angela from sales is searching for another job. She surfs all of your competitor’s sites and uploads her resume to their HR department…
  • John in production is reviewing this weekend’s game highlights play-byplay on his favorite sports site…
  • Jeff in customer support is making the entire network run slow by downloading huge MP3 files of Mega Death live in concert…
  • Mary, your secretary is accessing her personal Gmail account via your network and accidentally downloading a virus…
  • Dave from shipping is on hotdate.com looking at questionable photos…

If you have employees with unmonitored access to e-mail and the Internet, there are a number of activities they can participate in that can harm your business:

 

  1. Bandwidth Costs: Heavy graphics, video clips, and audio files are particularly notorious for clogging digital pipelines. If your staff is emailing photos of their family vacation to their friends, paying bills online, or downloading music, they are using up a huge amount of expensive bandwidth and slowing down your organization as a result.
  2. Legal Liability: 70% of all Internet porn traffic occurs during the 9-to-5 workday (SexTracker) and 27% of Fortune 500 companies have been accused of sexual harassment stemming from inappropriate e-mail and Internet usage. The U.S. Supreme Court has ruled that companies can be held accountable for their employees forwarding offensive messages and viewing pornography.
  3. A Damaged Reputation: A lawyer at a London firm forwarded an explicit email he received from a female acquaintance to several co-workers as a joke. Unfortunately, they sent it on to a few of their friends and within a short period of time, thousands of people from around the world, including the press, received it. Because of this e-mail, they ended up in a huge controversy that hurt their image and credibility.
  4. Loss of Productivity: E-mail and the Internet offer a temptation that is hard to resist; that’s why 73% of employees who use the Internet are fully aware that they are consuming valuable bandwidth and hampering critical business activities with inappropriate Internet usage – but do it anyway.
  5. Viruses and Spyware: Employees can accidentally (or intentionally!) download harmful viruses and spyware through music files, screen savers, and other online files.

So what can you do to protect your organization?

Suspect Your Computer Has Been Hacked? Do These 5 Things Now!

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that...

3 Cyber Security Myths That Will Hurt Your Business This Year

Working amid the ever-changing currents of technology and cyber security, businesses often find themselves entangled in a web of misinformation and outdated ideas. But failing to distinguish between myth and fact can put your business’s security at serious risk. Based...

3 Technology End-of-Service Myths

It's crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can easily infiltrate your network and the chances for downtime increase significantly. However, many businesses don't realize that expired...

Did you know hardware and software expire too?

We are all aware of the term “use by date.” It is regularly used when talking about food and medications and refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too? This is because...

Top 9 Benefits of Outsourcing Your Cybersecurity

When it comes to protecting your business from cyber threats, having the right tools and technology is only half the battle. You also need the expertise, controls, and processes to manage and mitigate these threats effectively. That’s where a managed security service...