RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

Extensions
There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? RCS Professional Services can help. To learn more, reach out to us at 212.532.9111.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Software Tip of the Week Business Management Tip of the Week workplace tips Small Business Email Backup gadgets Hackers Mobile Office Cloud Managed Service Provider Productivity Saving Money hardware Google Data Business Quick Tips Malware Business COmputing User Tips Social Media Microsoft Office Computer Smartphones Efficiency Users IT Services Mobile Devices Android Hosted Solutions Network Security Innovation Upgrade Communication Passwords Virtualization Miscellaneous Business Continuity Smartphone Windows WiFi Operating System IT Support VoIP Disaster Recovery Tech Term Holiday Mobile Computing Mobile Device Management Apple Ransomware Network Server Analytics Unified Threat Management IT Support Alert Facebook Marketing The Internet of Things Windows 10 Windows 8 Apps Remote Computing Data Recovery Productivity Antivirus Gmail Content Filtering History communications Data Backup Cybersecurity IT Consultant Outlook Browser Maintenance Employer-Employee Relationship Big data Going Green BYOD Managed IT Services Office Website Health Collaboration Data Management Excel Hacking Vendor Management Phishing Remote Monitoring Mobile Device Money Virus Artificial Intelligence Search Cybercrime Word Internet of Things Laptop App Windows 10 Company Culture Printer Tutorials Lithium-ion Battery Firewall Update Current Events Managed IT Services PowerPoint Business Intelligence Office 365 Humor Applications Bandwidth Touchscreen BDR Downtime Tech Support Comparison Best Practice Bluetooth Networking Save Money Chrome Access Control eWaste Education Wireless Technology Social Networking Data Security VPN Managed Service Augmented Reality Spam Proactive IT Avoiding Downtime Hard Drives Cost Management Automation iPhone Pain Points Document Management Inbound Marketing Business Technology Cortana Websites USB Robot Administration Scam Vulnerabilities Gaming Console Computer Repair Compliance Saving Time Digital Payment Phone System Presentation Running Cable Wireless Encryption Development Social Engineering Tech Terms Computer Accessories Tablet Lifestyle Retail Experience Mouse YouTube Data loss Information Technology Customer Relationship Management Troubleshooting Patch Management Co-Managed IT Hiring/Firing Unified Communications Help Desk Two-factor Authentication Disaster Bitcoin Sports Law Enforcement Information User Cryptocurrency Blockchain Social Save Time Desktop Display Project Management Specifications Cleaning Safety IT Management Data Breach Bring Your Own Device Data storage SaaS IBM DDoS Government Computers Google Docs Net Neutrality User Error Vulnerability Google Calendar Dongle Google Maps Hard Drive Disposal Media Streaming Voice over Internet Protocol Unified Threat Management Mobile Security Office Tips Identity Theft Smart Phones Hacker Employee-Employer Relationship Legislation Television Password Service Level Agreement Cloud Computing email scam Upselling Music Debate Entrepreneur FinTech Multi-factor Authentication LinkedIn Virtual Reality Customer Service Onboarding HIPAA Emails SharePoint Electronic Payment Smart Office Black Market Processors Router MSP Software as a Service Device security Deep Learning Chromebook LiFi Phone Systems IP Address Digital Signage Knowledge Wireless Headphones Freedom of Information Work Computing Infrastructure File Sharing Business Growth Teamwork Monitors Visible Light Communication Leadership LED Storage Nanotechnology News Optimization Business Cards Google Wallet Keyboard Charging Managed IT HTML Displays Budget Twitter Advertising Domains Content Screen Reader Fake News Recycling Start Menu Piracy Hosted Solution Printer Server Shortcut Analysis End of Support Skype Hard Drive Streaming Conferencing Staffing Microsoft Excel Environment Continuity Data Protection Programming Software License GPS Wearable Technology Drones Streaming Media Competition Devices Online Currency Writing Audit Backup and Disaster Recovery Travel Distributed Denial of Service Harddrive Get More Done Human Error Solar Read Mobile Technology 3D Webinar Windows XP Application Redundancy Regulations Printing Business Owner Value Product Reviews Device Text Messaging Recovery Managing Stress Digital Network Congestion Manages Service Provider Memory Trending Virtual Desktop Slack Hackeres Accountants Downloads Professional Services Computer Care Ebay Documents Virtual Assistant intranet Cables Hiring/Firing Fax Server Statistics Public Speaking Monitoring Emergency Equifax Mobility Entertainment Zero-Day Threat Analytic Training Point of Sale Society Trojan Pirating Information Securty Wires Time Management Legal External Harddrive Heating/Cooling Spying Startup