Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Network Security Microsoft Software Internet Computer Hosted Solutions Google Tech Term Business IT Services Ransomware Mobile Devices Managed IT Services Backup User Tips Smartphone Small Business Android IT Support Efficiency Saving Money Business Continuity Innovation Hardware Cloud Computing Windows Data Management Internet of Things Data Recovery Data App Browser Windows 10 Data Backup Productivity Cybersecurity Communication Artificial Intelligence Gmail Managed IT Services Business Management Encryption Passwords Remote Monitoring Server Facebook communications Office 365 Infrastructure Windows 10 Network Microsoft Office Tip of the week Money IT Support Word Outsourced IT Disaster Recovery Vulnerability Productivity Employer-Employee Relationship Smartphones Chrome Applications Managed Service Provider Analytics Phishing Government YouTube BYOD Social Media Data storage Risk Management Website Office Tips Maintenance Antivirus Save Money Big Data Robot Google Drive Content Filtering Bandwidth Settings Upgrade IT Management Workplace Tips Touchscreen Business Intelligence Virtual Private Network Storage SaaS Unified Threat Management Data loss Company Culture Holiday Telephone Systems desktop Alert Firewall Two-factor Authentication Managing Stress Avoiding Downtime Spam Computing Outlook Laptop Information WiFi Scam The Internet of Things LiFi Vendor Management Monitors Hosted Solution Wireless HIPAA VoIP Administration Mouse Automation VPN Miscellaneous Mobile Security End of Support Mobile Device Paperless Office Virtual Reality Data Security Server Management Apple Business Technology Troubleshooting SharePoint Google Wallet Compliance Bitcoin Microsoft Excel Hotspot Network Congestion Internet Exlporer Google Maps Techology Printing IT Technicians Optimization Users Halloween Managed IT Business Growth Smart Technology Connectivity Spying Quick Tips Staff Writing Leominster Statistics Tablet Legal Modem Wi-Fi FinTech Analysis How To Lenovo Password Unified Communications Downloads Drones Regulations Mail Merge Windows 8 Blockchain Language Computers Value VoIP Unified Threat Management Mirgation Recycling Scary Stories Shortcut Hacker Distributed Denial of Service Dark Data IoT Digital Payment Employee-Employer Relationship Augmented Reality Retail K-12 Schools Disaster Running Cable Bluetooth Deep Learning Comparison Cookies MSP Digital Managed Service Firefox Superfish Social Networking Politics Buisness Address Permissions Computing Infrastructure Display Professional Services Collaboration Virtual Desktop User Error Chatbots eWaste Sports Patch Management Alt Codes Managed IT Service Customer Service Star Wars PowerPoint Wearable Technology Office Network upgrade Samsung Uninterrupted Power Supply Bring Your Own Device Specifications Operating System Nanotechnology Development Document Management Spyware Customer Relationship Management File Sharing Heating/Cooling Multi-Factor Security Budget Motherboard Cables Tech Support Computer Care IBM Social Alerts USB Onboarding Time Management Printer Information Technology Identity Continuity Solid State Drive Typing Break Fix Humor Fraud Cost Management Chromebook Social Engineering Smart Office Search Best Practice Black Friday Screen Reader Charging Identity Theft Slack Networking Current Events Dongle Cybercrime Servers Google Calendar Wires Websites Training Corporate Profile Downtime Emergency Licensing Digital Signage Network Management Apps Access Control Solar Hard Disk Drive Marketing Cryptocurrency Dark Web Assessment Automobile Going Green Safety Work Dell Gadgets Cyber Monday Google Docs Smart Tech Monitoring IT solutions Cooperation Service Level Agreement Remote Computing Cabling Legislation Router Voice over Internet Protocol WannaCry Education Hacks 3D Printing Taxes Cortana Administrator Web Server what was your? IT Budget Processors Machine Learning GPS Printers Unsupported Software IT Consultant Virtualization Cameras Update Meetings Computer Repair Relocation Tracking Mobile Device Management Mobile Data Cleaning How To Work/Life Balance CCTV Recovery Webcam Health Private Cloud Mobile Computing Black Market Law Enforcement Error Notifications Point of Sale Ben McDonald shares Electronic Medical Records Twitter Travel BDR Physical Security Upgrades Gadget G Suite Emoji Crowdsourcing Regulation Supercomputer CrashOverride Motion Sickness Personal Information Botnet Staffing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3