Productivity and Internet abuse: How to improve one by eliminating the other
by Eamonn Doyle - Managing Director at Bloxx - Wednesday, 15 April 2009.
It is not long ago that IT managers talked about web threats as mainly the downloading and viewing of inappropriate content in the workplace. However, times have changed and now the term "web threat" is used to describe a broad and evolving range of risks and challenges for business of all shapes and sizes in any market sector.

Of course, the viewing and downloading of inappropriate content is still a big issue for companies. The sheer availability and volume of this type of content is staggering, and whilst web filtering technology has evolved to make it easier to block, staff often revert to using anonymous proxies to bypass filtering. Since this type of content is often used to deliver viruses, spyware or other malware, it can be a major security threat. In addition, companies need to ensure that their duty of care to protect their staff from inadvertently viewing content is enforced – failure to do this may result in expensive legal costs.

Productivity is also a huge issue for many companies and the implications can be staggering, including wasted wages, lost business, and expensive efforts by IT departments to manually block unacceptable websites and clean up productivity-destroying malware acquired from downloads. In addition, an organization legal vulnerability increases when employees illegally download copyrighted or proprietary material or offensive text and images that can be disseminated throughout the enterprise.

Productivity is further compromised by the continuing growth of online shopping with staff being tempted to spend inordinate amounts of time browsing online stores or auction sites during working hours. A medium sized company with 100 PC users, who each spend an extra two hours per week on average surfing non-work related sites, can experience around £120,000 a year in lost productivity.

Whilst online shopping is a big attraction, the recent phenomenon of social networking would appear to be an even bigger draw for users. From Facebook to YouTube to Bebo, avid social networkers can’t seem to get by without their ongoing fixes of social interaction, regardless of whether it is during working hours. In addition to the potential impact on productivity, many social networking sites are bandwidth-hungry, which can have a negative effect on the performance of business applications. Further compromises can also occur as safe sites can be hijacked by hackers to deliver viruses to unsuspecting users.

This type of content, whilst not deemed to be as inappropriate as for example, adult content, nevertheless presents a huge challenge for companies who need to effectively manage their Internet resource. Recent research has, however, suggested that social networking can improve staff morale and increase intra- and inter-company collaboration. In fact, organizations such as the TUC have called for staff to be allowed unlimited access to non work-related content during working hours.

So what are companies to do?

Clearly adopting a head-in-the sand approach to managing access and praying that staff will not abuse resources is best avoided. Companies firstly need to understand what types of content are being accessed, when and how often.


More than 900 embedded devices share hard-coded certs, SSH host keys

SEC Consult analyzed firmware images of more than 4000 embedded devices of over 70 vendors and found that, in some cases, there are nearly half a million devices on the web using the same certificate.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Nov 30th