Emerge Blog

Emerge has been serving the Midwest region since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Block Websites from the Network
The most obvious way to block employees from accessing problematic websites is by blocking them entirely from your network. To do this, you’ll have to work with your IT department to make the changes to your router. Not all routers have this capability though, especially if you want to implement user-based access for specific websites. Of course, the degree of control you need can vary, so it’s best to work with an IT provider before making any changes. You might even need to invest in other infrastructure solutions to achieve this.

There are also other options if you don’t want to change your router’s settings. Some include free extensions that let your employees self-monitor just how much time they spend on certain websites. Of course, this requires some self-policing on their end, so it’s best to do this only if you trust your employees.

The Ramifications
While you can take measures to keep your employees from visiting distracting websites, one of the biggest ways you can keep them in check is by ensuring they understand the consequences of failing to get their work done due to being distracted. That being said, there are benefits to blocking websites. One study found that blocking websites for your distracted employees allowed them to be more productive, as eliminating social media from the equation can be quite an effective method. However, the study also found that the employees would use the time they would typically spend wasting time online on other distractions.

You also need to think about whether or not a blanket ban on these websites will be productive for your organization, especially where client outreach and social media is concerned. Since so many organizations can leverage social media to great effect, it’s no wonder that you would want to keep these options available for employees that can handle the privilege of using social media.

Does your organization want to take full advantage of content blocking and filtering? Emerge can help. To learn more, reach out to us at 859-746-1030.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 20 September 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Computing Business Productivity Email Internet Microsoft Backup Computer Hosted Solutions Network Security IT Services Mobile Devices Google Windows 10 User Tips Software Smartphone Efficiency Managed Service Provider Ransomware Android Hardware Workplace Tips Business Continuity Tech Term Managed IT Services Communication Data Management Social Media Data Small Business Smartphones Browser Disaster Recovery Innovation Facebook App Server Business Management IT Support Data Recovery Windows Cloud Computing Big Data Productivity Internet of Things Office Network IT Support Saving Money Gmail Cybersecurity Upgrade Passwords Miscellaneous Spam Data Backup Employer-Employee Relationship Holiday Office 365 Phishing Encryption Microsoft Office Apps Artificial Intelligence Remote Monitoring WiFi Chrome Content Filtering Password Hosted Solution Office Tips IT Management Save Money Money Robot BYOD Word Recovery Analytics Alert Firewall Risk Management Hacker Windows 10 Applications Outsourced IT Website Tip of the week Infrastructure Bandwidth Customer Service Data storage Apple Business Technology communications Managed IT Services VoIP Government Avoiding Downtime How To Paperless Office Mobile Device Management Work/Life Balance Business Intelligence Vulnerability Social VPN Automation IT service Education Computing Virtualization Wireless Unified Threat Management The Internet of Things Hacking Wi-Fi Document Management Antivirus Vendor Management Cybercrime Two-factor Authentication Maintenance Virtual Reality SaaS Settings YouTube Budget HIPAA Business Growth Data Security Collaboration Data loss Chromebook Identity Theft Wireless Technology Business Owner IT solutions Monitors Cortana Going Green File Sharing Digital Google Drive Mobile Security Virtual Private Network Politics Printing Sports IT Consultant Websites Safety Bring Your Own Device Physical Security Twitter Server Management Botnet Administration Taxes Marketing Mobile Device Outlook Lithium-ion battery Virtual Desktop User Samsung Tablet Storage Running Cable IBM Best Practice Health Computer Care Cost Management BDR Customer Relationship Management Competition Heating/Cooling Mobile Computing Training Humor Computers Augmented Reality eWaste Mouse Analyitcs Telephone Systems Downtime End of Support Tech Support LiFi Scam Automobile Legal Search Remote Computing Information Troubleshooting Upgrades Laptop Presentation Specifications Touchscreen Patch Management Law Enforcement Display Deep Learning Managing Stress Current Events Slack Cookies 3D Printing Cameras Users Halloween Operating System Black Friday USB Fraud Gadget Cabling IP Address Cables Monitoring Techology Nanotechnology Unsupported Software CCTV Emoji Supercomputer Scary Stories Cyber Monday Dongle Co-managed IT IT Technicians Mobile Office Solid State Drive Wires Spying Application Unified Threat Management Screen Reader Travel Spyware Mobile Data Black Market IT Budget Google Docs Domains Service Level Agreement Servers Hotspot Mail Merge Mirgation Disaster Writing Voice over Internet Protocol Knowledge Employee-Employer Relationship Hard Drives Printer Smart Tech Motion Sickness CrashOverride Smart Technology G Suite Digital Payment iPhone Public Speaking Smart Office Entrepreneur Language FinTech Address Chatbots Uninterrupted Power Supply Retail Alt Codes Experience Information Technology PowerPoint Refrigeration Access Control Connectivity How To Distributed Denial of Service Personal Information Statistics Computing Infrastructure Processors Buisness Work MSP Identity Consumers Machine Learning Hard Disk Drive Social Engineering Typing Cleaning Google Wallet Onboarding SharePoint IoT Firefox Managed IT Service Computer Repair Bluetooth Alerts User Error Optimization Development Relocation Meetings 5G Cryptocurrency Drones Digital Signage Downloads Star Wars Break Fix Licensing Notifications Dark Data Recycling Documents Bitcoin Charging Lenovo Social Networking Private Cloud Unified Communications Compliance Webcam Electronic Medical Records Desktop Multi-Factor Security Assessment Quick Tips Dark Web Cooperation Crowdsourcing Google Maps Continuity PDF Windows 8 Analysis Superfish Motherboard Error Regulations Point of Sale Staffing Undo Google Calendar Internet Exlporer Time Management Microsoft Excel Managed IT Staff Solar Fun Hacks Managed Service Environment Router Phone System Corporate Profile GPS Legislation Value Network Management Blockchain Shortcut Wearable Technology Network Congestion Company Culture Networking Modem Administrator WannaCry Web Server Gadgets Update Tracking Comparison Professional Services Permissions

Upcoming Events

No events