Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Productivity Hackers Google Software Hosted Solutions Business Data Communication Hardware Tech Term Ransomware Mobile Devices Internet Small Business IT Services Efficiency Cloud Computing IT Support Smartphone Data Recovery Workplace Tips Backup Android Saving Money Innovation Managed IT Services Windows Upgrade Users Data Backup Social Media Business Continuity Office 365 Managed IT Services Microsoft Office Information Mobile Device Browser Windows 10 Business Management Smartphones Outsourced IT Data Management Internet of Things Windows 10 Miscellaneous Server Phishing Cybersecurity communications Gmail Vulnerability App Passwords Productivity Word Facebook Artificial Intelligence Remote Monitoring Network Infrastructure Disaster Recovery Encryption VoIP Chrome Save Money Employer-Employee Relationship Tip of the week Analytics Virtual Reality Website Managed Service IT Support Money BYOD Applications Gadgets Apps Managed Service Provider Robot Apple Education Company Culture Storage Automation YouTube Antivirus Paperless Office Risk Management Development Hacker Data storage Employee-Employer Relationship Office Tips Government Unified Threat Management VPN Access Control IT Management Big Data Display Maintenance Quick Tips Google Drive Router Settings Bandwidth Content Filtering Chromebook Solid State Drive Wireless Two-factor Authentication Avoiding Downtime MSP End of Support Hard Disk Drive Scam Augmented Reality Printing Managing Stress Networking Search SaaS Data loss Outlook Computers Laptop Virtualization Data Security HIPAA Spam Computing Holiday Telephone Systems OneNote Bring Your Own Device Operating System The Internet of Things desktop Business Technology WiFi Server Management Virtual Private Network Mobile Security Retail Alert Touchscreen LiFi Hosted Solution Collaboration Firewall Administration Downtime Tablet Document Management Business Intelligence Mouse Monitors Vendor Management Modem FinTech Google Docs Shortcuts Firefox Superfish Staff Leominster IT solutions Going Green Monitoring Solid State Drives Bluetooth Comparison Streaming Processor Address Permissions Language Value Hacks Social Engineering Identity Theft Employee-Employer Relationships Regulations Troubleshooting Business Analysis Patch Management Managed IT Service IoT Bitcoin Halloween Training Corporate Profile iOS User Error Mirgation Recycling Google Wallet Websites Cookies Business Growth G Suite Security Cameras Customer Relationship Management K-12 Schools Automobile Spying National Security Specifications Legal Dell Human Error Memory Computing Infrastructure Professional Services Password Safety Analysis Students Heating/Cooling Multi-Factor Security Social Networking Cabling Virus Break Fix Star Wars Windows 8 Scary Stories Remote Computing WannaCry Scalability Time Management Printer Chatbots eWaste Unified Communications Drones Nanotechnology Network Congestion Running Cable Managed Services Wearable Technology Network upgrade Google Maps Updates Black Friday Deep Learning Device Reducing Cost Emergency Alerts USB Mobile Device Management Buisness Mixed Reality Servers Google Calendar Motherboard Cables Wi-Fi Virtual Desktop LED Threats Dark Web Fraud Cost Management Writing Sports Migration Network Management Identity Continuity Screen Reader Charging Alt Codes Laptops Smart Office PowerPoint Cyber Monday Dark Data Update Mobility Batteries Licensing Dongle Digital Payment Data Breach Legislation BDR Wires Disaster Co-Managed IT Microsoft Excel Assessment Social Digital Windows 7 SharePoint Solar Budget Smart Technology Smart Tech Typing Humor Software as a Service Techology Work Information Technology Politics Onboarding GDPR Managed IT Best Practice Customer Service Cybercrime Print Toner How To Lenovo Cooperation Service Level Agreement Current Events Slack Hard Disk Drives Statistics Voice over Internet Protocol Private Cloud Uninterrupted Power Supply Content Huawei Mail Merge Blockchain Hotspot Internet Exlporer Marketing Office Samsung Spyware Messaging Downloads Compliance Data Warehouse Shortcut Distributed Denial of Service Connectivity Cryptocurrency Computer Care IBM Entertainment VoIP Unified Threat Management IT Technicians Optimization Tech Support File Sharing Digital Signage Law Enforcement Error Electronic Medical Records Point of Sale Ben McDonald shares Notifications Travel Twitter Physical Security Emoji Upgrades Gadget Crowdsourcing Supercomputer CrashOverride Botnet Motion Sickness Printers Staffing Personal Information Cortana Taxes 3D Printing Administrator Web Server what was your? IT Budget Machine Learning Processors GPS IT Consultant Unsupported Software Cameras Mobile Computing Computer Repair Relocation Meetings Financial Tracking Regulation Cleaning Mobile Data Recovery CCTV Myths How To Work/Life Balance Health Webcam Black Market

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3