crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Keep Employees Off of Distracting Websites

As incredible a tool as the Internet truly is, for every website that is beneficial to the workplace, there is another that is certainly the opposite. Naturally, it is these sites that your employees would most likely want to visit if left to their own devices. Sometimes, the best course of action is to remove the temptation and block these websites. For this week’s tip, we’ll talk about a few ways to do so.

Block Websites from the Network
The most basic way to block your employees from accessing websites is to block these websites from the entire office network. To do so, you’ll need to have IT access your router and make the requisite changes.

Not all routers make this easy to control, especially if you want to give some users access to certain sites while blocking others. You may need to invest in infrastructure better designed to manage content filtering for multiple users.

Extensions
Of course, there are other options if you don’t want to fool around directly in your router’s settings. There are a few free extensions available that allow your employees to self-monitor, but this, of course, requires quite a bit of trust in your employees. Besides, if your employees are trustworthy enough to monitor their own Internet use, you probably don’t need to worry about blocking certain websites, do you?

Ramifications
You should also consider why your employees are becoming distracted at work, anyways. One study showed that, while blocking websites did help previously distracted employees focus better and be more productive (especially those whose work suffered due to social media use), these employees were also considerably more stressed. Furthermore, this same study also indicated that some employees would substitute their online distractions with other activities that sometimes brought them out of the office on breaks.

There is also the fact that a blanket ban may not be completely beneficial to your business, either, especially where some of your client outreach is concerned. Social media outlets have proven their worth as a business tool, so you may not want to completely block everyone from its use. Give us a call at (918) 770-8738 so we can discuss some of your options to resolve this.

What kind of websites have you found to be the biggest distractions in your business? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Internet Cloud Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Data Mobile Devices IT Support Network Hardware Small Business Server Communication Smartphones VoIP Computer Business Continuity Upgrade Innovation Google Windows Efficiency Disaster Recovery Mobile Device Management Data Backup Microsoft Office Virtualization Outsourced IT Miscellaneous Mobile Office Vendor Management Tech Term Holiday Network Security Gadgets Social Media User Tips Quick Tips Passwords BYOD Productivity Mobile Computing Browser Android Smartphone Managed IT services WiFi Bring Your Own Device Windows 10 Internet of Things Data Recovery The Internet of Things Remote Monitoring Ransomware Spam Best Practice Users Data Management Collaboration Save Money Trending Wireless Technology Operating System Apple Remote Computing Artificial Intelligence Alert Office Customer Relationship Management Unified Threat Management Encryption Content Filtering Going Green History Gmail Firewall Analytics IT Support IT Solutions Lithium-ion Battery Facebook IT Consultant Router Printer Tech Support Information Technology Current Events Cloud Computing Managed IT Maintenance Big Data App Applications Two-factor Authentication Managed IT Services Windows 8 Antivirus Phishing Bandwidth Document Management Humor Mobile Device Saving Time Paperless Office Wi-Fi Avoiding Downtime Employer-Employee Relationship Website Customer Service Hard Drives Phone System Outlook Health Government Compliance Marketing Automation Excel Office Tips Retail Project Management Cybersecurity IT service Digital Payment Chrome Business Growth VPN Apps Risk Management Application Virus Hacking Computers Fax Server Administration Presentation Augmented Reality Vulnerability Budget Managed Service Computer Repair BDR Proactive IT Point of Sale Regulations Files Recovery Inbound Marketing Mouse Money Running Cable Social Net Neutrality Licensing Wireless File Sharing PowerPoint Social Networking Unified Communications Training Tablet Data Security Help Desk Office 365 iPhone User Error Password Healthcare Infrastructure Co-Managed IT Recycling Downtime eWaste Remote Workers Search Virtual Desktop USB Piracy Business Owner Information Data loss Blockchain Sports HIPAA Hacker User Programming Scam Redundancy Twitter Company Culture Analyitcs Education Machine Learning Safety Specifications Hosted Solution IBM Internet Exlporer Settings Flexibility Cost Management Remote Monitoring and Management Storage Mobility Smart Technology Data storage Cybercrime communications Save Time Mobile Security Wearable Technology Conferencing IoT Robot Hiring/Firing Windows 10 Printing Display Alerts End of Support LiFi Tip of the week Computing Statistics Intranet Business Intelligence Competition Network Congestion Motherboard Read Only G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Hard Drive Permission Data Warehousing Cortana Social Engineering Best Available Buisness IT Consulting Identities Cables Patch Management Staff Modem Bookmarks Travel Software as a Service Backups CIO Cache Test Adminstration Microsoft Excel Knowledge Environment Politics Data Breach Solid State Drive Bluetooth Wires 3D Operations Cookies Favorites Meetings Technology Tips Legal Online Currency Samsung Troubleshooting Debate Management Experience Telephony Technology Laws Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Crowdfunding Nanotechnology Instant Messaging Comparison Consumers Monitoring YouTube Enterprise Resource Planning How To Permissions Unified Threat Management Typing MSP IT Technicians Screen Reader Finance Scheduling Identity Theft Black Friday IP Address Google Drive Mobile Assessment Fraud How To Access Control Refrigeration Cryptocurrency Disaster Proactive Touchscreen Mirgation Consulting Smart Tech Authentication Cyber Monday Google Docs Managing Stress IT Management Private Cloud SharePoint Bitcoin Digital Signature Business Technology Managed Services Provider Memory Connectivity Authorization Enterprise Content Management Network Management Laptop Public Cloud Downloads Hacks WPA3 Migration E-Commerce Employees Distributed Denial of Service Documents Entrepreneur Vulnerabilities Hotspot Halloween Networking PC Care Sync Multi-Factor Security Undo Fleet Tracking Chatbots Features Macro Value People Star Wars Zero-Day Threat Software Tips Managed IT Service 5G PDF Geography eBay Language Scary Stories Virtual Reality Leadership Mobile Device Managment Google Calendar Asset Tracking Remote Support Identity Electronic Health Records Streaming Media Utility Computing Backup and Disaster Recovery New Additions Break Fix Monitors Skype Deep Learning Print Server High-Speed Internet Gaming Console Text Messaging Server Management Computing Infrastructure SaaS Techology Cyberattacks Legislation Domains Google Wallet OneNote Work Station Human Error Congratulations Dark Web Fun Writing LinkedIn Word Law Firm IT Development Video Surveillance Cooperation Chromebook Disaster Resistance

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code