4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Get Your Staff to Stop Shopping and Start Working

Get Your Staff to Stop Shopping and Start Working

With the growing popularity of Cyber Monday sales and explosion of all types of eCommerce, employees are more than likely tempted to shop during work hours. There are a lot of promotions exclusively available to online shoppers that take place during a business’ hour of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

Online Shopping at Work - By the numbers.

  • 53 percent of employees are using time at work to shop online, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here’s a few ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about the employer's stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors about how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, 4IT can help. We can design an Internet usage policy that works for your company, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Business Continuity Hardware Workplace Tips VoIP Computer User Tips Saving Money Miscellaneous Windows 10 Virtualization Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Network Save Money Microsoft Office Communication Small Business communications Smartphone Quick Tips Social Media Information Technology Smartphones BYOD Going Green Mobile Office Android Health Office Apps Gadgets Application Ransomware Operating System Chrome Managed IT Services Outsourced IT Browser WiFi Mobility Holiday Firewall Avoiding Downtime Disaster Productivity Managed IT Tablet BDR Cybersecurity Cybercrime Search Telephone Systems Passwords The Internet of Things Remote Computing Unified Threat Management IT Solutions Risk Management Spam Best Practice Data Management History Remote Monitoring Apple Employer-Employee Relationship Budget VPN Automation Vendor Management Facebook Hacking Hard Drives Saving Time Customer Relationship Management Phishing Law Enforcement Password User Error Hosted Solution Computers Collaboration Data Recovery Recovery Phone System Wireless Technology Money Marketing Big Data Office Tips Data Backup Content Filtering Proactive IT iPhone Maintenance Government Work/Life Balance PowerPoint Virus Office 365 Lithium-ion battery Telephony Vulnerability Current Events Bring Your Own Device Printer USB Humor Administration Antivirus Encryption Analytics Shortcut Wearable Technology Gmail Router Social App Cost Management Social Engineering Intranet Users Bandwidth Printer Server Windows 8 Laptop Politics Private Cloud Personal Information OneNote Trending Education Net Neutrality Wireless Unsupported Software Google Drive SaaS Point of Sale Cloud Computing Tech Support IT COnsultant Audit Save Time HaaS Computer Repair Data Security Outlook Business Intelligence Data Protection Biometrics Uninterrupted Power Supply Retail online currency Social Networking Virtual Reality Meetings Samsung Wi-Fi Emergency IT Support Artificial Intelligence Instant Messaging Emails Applications Windows 10 HIPAA Entertainment Efficency hacker Benefits Transportation DDoS Computer Accessories Compliance Battery Robot Mouse Computer Care Network Congestion Data Storage Automobile Display Two-factor Authentication End of Support Help Desk Managing Stress Augmented Reality Excel Internet Exlporer Paperless Office Internet of Things Fax Server Travel Identity Theft Workplace Solid State Drive Sports Flexibility Update Customer Service Streaming Media Cortana CrashOverride PDF Files Teamwork IT Management Scalability Word Busines Continuity data breach Twitter Hard Drive Networking Legislation Near Field Communication Safety Settings Text Messaging Chromecast Surge Protector WIndows Server 2008 How To Upgrades Windows Ink risk management Television Images Human Resources IT consulting 3D Printing Uograde Administrator Running Cable Training Patch Management Consultant Google Maps Colocation Reliable Computing The Blindside Of Commerce Black Market Access Company Culture Regulation ISP Bloatware Touchscreen Software as a Service IT Security Blogging Cleaning Sync Programming Data Loss Experience iOS Wiring Information Branding Keyboard Managed IT Service Avoid Downtime Managed IT Services Website Distributed Denial of Service Adobe Google Docs Music Computer Fan Debate WIndows 7 Hiring/Firing Inbound Marketing Data storage eWaste Storage Licensing OneDrive Microsoft Excel Regulations Books Dark Web Amazon Smart Technology Screen Mirroring Video Games Co-managed IT Value Document Management File Sharing Cameras Data Breach Advertising Nokia Lifestyle User Cast Legal Windows 10s Ebay Touchpad Science Mobile Device Virtual Desktop systems Presentation Managed Security Nanotechnology Computing Bluetooth Best Available Scam Hard Disk Drive IT Technicians Tablets hack Root Cause Analysis SharePoint Employer Employee Relationship HBO Worker Commute best practices Operating Sysytem NFL Buisness Electronic Medical Records IT Budget Reputation Microblogging Youtube Comparison Sales Specifications Gift Giving Managed Service Provder Webinar Conferencing Shadow IT Relocation Gifts Redundancy Webinar IT service Credit Cards IT solutions Mobile Domains FAQ Professional Services Taxes Tutorial Supercomputer