RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

Extensions
There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? RCS Professional Services can help. To learn more, reach out to us at 212.532.9111.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 18 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Software Tip of the Week Business Management Tip of the Week workplace tips Small Business Backup Email gadgets Hackers Mobile Office Cloud Managed Service Provider Saving Money hardware Productivity Quick Tips Google Malware Data Business COmputing Social Media Business Microsoft Office Smartphones User Tips Mobile Devices Computer Users Android Efficiency Hosted Solutions IT Services Innovation Passwords Virtualization Network Security Business Continuity Upgrade Windows WiFi IT Support Communication Miscellaneous Smartphone Operating System VoIP Holiday Disaster Recovery Apple Network Tech Term Mobile Computing Server Unified Threat Management Facebook Marketing The Internet of Things Analytics Alert Ransomware Mobile Device Management Remote Computing Windows 8 Apps Gmail Antivirus Windows 10 IT Support Data Recovery Cybersecurity Productivity IT Consultant Outlook Content Filtering communications History Data Backup Office Data Management Hacking Collaboration Phishing Remote Monitoring Health Browser Money Excel Artificial Intelligence Employer-Employee Relationship Vendor Management Big data Virus Going Green Search Maintenance Managed IT Services Lithium-ion Battery App Printer PowerPoint Applications Tutorials Business Intelligence Firewall Bandwidth Cybercrime Current Events Internet of Things Mobile Device Laptop Windows 10 BYOD Humor Website eWaste Comparison Bluetooth Chrome Wireless Technology Update Social Networking Office 365 VPN Cost Management Tech Support Augmented Reality Spam Proactive IT Automation Hard Drives Word iPhone Touchscreen Managed IT Services BDR Downtime Avoiding Downtime Best Practice Company Culture Data Security Networking Save Money Pain Points Retail Patch Management Experience Inbound Marketing Education YouTube Unified Communications Law Enforcement Computer Accessories Bitcoin Tablet Information Cryptocurrency Two-factor Authentication Gaming Console Hiring/Firing Mouse Blockchain Desktop Project Management Disaster Customer Relationship Management User Cleaning Data storage IT Management Data Breach Help Desk Social Save Time Sports Safety Google Docs Specifications Vulnerability Lifestyle SaaS Document Management DDoS Business Technology Government Robot Websites IBM Scam Computers Vulnerabilities Cortana Net Neutrality USB Tech Terms Compliance Social Engineering Presentation Wireless Bring Your Own Device Running Cable Administration Access Control Encryption Computer Repair Data loss Saving Time Digital Payment Phone System User Error Information Technology Drones Microsoft Excel Continuity Data Protection Software License Domains Devices Writing Managed Service Leadership Audit Backup and Disaster Recovery Distributed Denial of Service Shortcut Smart Phones Upselling Troubleshooting Solar Mobile Technology Redundancy Regulations Staffing Environment Twitter Programming Co-Managed IT Printing Value Streaming Media Competition Network Congestion Managing Stress Digital Accountants Memory Skype Read Slack Wearable Technology Phone Systems Downloads Professional Services Windows XP Computer Care Application Online Currency Business Owner Virtual Assistant Cables Emergency Equifax Recovery Travel Monitoring Hackeres Mobility Zero-Day Threat Virtual Desktop Training Society Wires Time Management Startup Documents Legal Product Reviews intranet Hiring/Firing Spying Display Text Messaging Google Calendar Dongle Google Maps Hard Drive Disposal Public Speaking Office Tips Entertainment Printer Server Trending Voice over Internet Protocol Unified Threat Management Mobile Security Legislation Securty Identity Theft Employee-Employer Relationship Ebay Television Service Level Agreement Cloud Computing email scam Heating/Cooling Music GPS Statistics FinTech Multi-factor Authentication Onboarding Emails Virtual Reality Analytic Point of Sale Harddrive Get More Done Pirating Information SharePoint Smart Office Hacker Black Market Software as a Service Device security Deep Learning 3D Password Webinar MSP Digital Signage Knowledge Wireless Headphones Chromebook Entrepreneur LiFi Media Streaming Business Growth HIPAA Freedom of Information Work Computing Infrastructure Customer Service Processors Monitors Electronic Payment Manages Service Provider Development Nanotechnology Router Visible Light Communication Google Wallet Debate News Optimization Business Cards IP Address Managed IT HTML Displays LinkedIn Charging Screen Reader Budget Advertising Fax Server Teamwork Hosted Solution Storage Trojan Fake News Recycling Start Menu Piracy End of Support Analysis Conferencing Hard Drive Keyboard External Harddrive File Sharing