Bredy Network Management Corporation Blogs

2 minutes reading time (406 words)

Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Internet Software Microsoft Google Computer Hosted Solutions Ransomware Business Mobile Devices Network Security Android IT Services Smartphone Managed IT Services Tech Term Backup Data Management Hardware IT Support Windows Small Business Innovation Cloud Computing Cybersecurity App Business Continuity Windows 10 Data Internet of Things User Tips Browser Saving Money Encryption Remote Monitoring Business Management Gmail Artificial Intelligence Data Recovery Server Facebook IT Support Phishing Money Productivity Windows 10 Efficiency Tip of the week Communication Data Backup Disaster Recovery Office 365 Infrastructure Vulnerability Managed IT Services Smartphones Productivity Chrome Word Managed Service Provider Outsourced IT Applications YouTube Employer-Employee Relationship Robot Social Media Risk Management Google Drive Bandwidth Website Content Filtering Upgrade Office Tips Antivirus Analytics Government communications Passwords Big Data Microsoft Office Network IT Management Settings Data storage Virtual Private Network Spam Computing Workplace Tips Outlook Monitors WiFi Vendor Management Wireless Save Money LiFi Hosted Solution Automation Administration Mobile Device Company Culture Paperless Office Mouse Two-factor Authentication End of Support Miscellaneous Avoiding Downtime Virtual Reality Scam Managing Stress Apple Unified Threat Management Storage Data loss The Internet of Things SaaS Telephone Systems VoIP Holiday VPN BYOD HIPAA Alert Maintenance Data Security Firewall Mobile Security Business Technology Server Management Uninterrupted Power Supply Smart Tech Microsoft Excel Document Management Spyware Work Touchscreen SharePoint Customer Service Router Voice over Internet Protocol Managed IT Smart Technology Office Samsung Computer Care Cooperation IBM Service Level Agreement Quick Tips Techology File Sharing Alt Codes Users Halloween Hotspot Solid State Drive Internet Exlporer How To Lenovo Tech Support Bring Your Own Device Operating System Compliance Business Intelligence Statistics Tablet Social Connectivity Mail Merge Blockchain Identity Theft Budget IT Technicians Optimization Downloads Chromebook Typing Humor Modem FinTech Shortcut Distributed Denial of Service Social Engineering Training Information Technology Staff Corporate Profile Leominster VoIP Unified Threat Management Comparison Scary Stories Current Events Language Hard Disk Drive Value Firefox Superfish Websites Automobile Best Practice Regulations Bluetooth Dell IoT Address Permissions Mirgation Recycling Running Cable Cryptocurrency Cabling Cookies MSP Patch Management Managed IT Service Safety Buisness Apps Augmented Reality WannaCry K-12 Schools User Error Specifications Sports Remote Computing IT solutions Going Green Computing Infrastructure Professional Services Customer Relationship Management Virtual Desktop Google Maps Google Docs Social Networking Education Hacks Star Wars Chatbots eWaste Heating/Cooling Multi-Factor Security Network Congestion Laptop Bitcoin Nanotechnology Development Break Fix Google Wallet Wearable Technology Network upgrade Time Management Printer Search Black Friday Writing Printing Alerts USB Networking Wi-Fi Business Growth Motherboard Cables Password Fraud desktop Cost Management Emergency Digital Payment Legal Identity Continuity Servers Google Calendar Computers Windows 8 Disaster Screen Reader Charging Dark Web Downtime Unified Communications Drones Digital Smart Office Network Management Access Control Dark Data Cybercrime Cyber Monday Marketing Retail Licensing Dongle Collaboration Hacker Wires Display Assessment Politics Deep Learning Solar Legislation Gadgets Webcam How To Work/Life Balance Recovery Health Private Cloud Black Market Mobile Computing Error Point of Sale Ben McDonald shares Law Enforcement Notifications Electronic Medical Records Travel Twitter G Suite Physical Security Upgrades Gadget Supercomputer CrashOverride Emoji Motion Sickness Crowdsourcing Staffing Taxes Personal Information Botnet Administrator Web Server what was your? 3D Printing IT Budget Cortana GPS Processors IT Consultant Machine Learning Cameras Unsupported Software Virtualization Meetings Tracking Update Cleaning Computer Repair Relocation BDR CCTV Mobile Device Management Mobile Data

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3