SlideShare a Scribd company logo
Employee Web Use and Misuse:
Companies, their employees and the Internet
A MessageLabs Whitepaper; October 08
MessageLabs      Internet Use and Misuse                                                               Web misuse can have serious implications for
                                                                                                       your business:
Web Security     Where do you draw the line? Is it okay to send the
                 occasional personal email at work? What about                                         • Reduced productivity. If employees spend their
service gives    a little internet shopping or spending sometime                                         time on a social networking sites such as Facebook,
                 on social networking sites, playing online games,                                       they’re not spending it doing their job.
companies        downloading pirated movies and music, gambling
                 or downloading porn? The internet has created                                         • Security problems. Malware hides on websites
the ability to   new opportunities for mischief and new challenges                                       and can install itself as users browse infected pages.
                 for managers.                                                                           MessageLabs Intelligence reports that the number
monitor and                                                                                              of new, malicious websites blocked each day by
                                                                                                         MessageLabs nearly doubled (91 percent) in just
enforce their    Worldwide worries                                                                       one month with 3,968 new sites intercepted daily.2

internet usage   In today’s office enviornment, employers have a
                                                                                                       • Legal risks. When users download inappropriate
                 relatively new issue to deal with; employees
                                                                                                         material to their computers other employees may
policies.        wasting time online and putting your business at                                        take serious offense which in turn can create legal
                 risk. A large proportion of corporate web traffic                                       liabilities for managers.
                 is non-work related: gambling, music downloads,
                 personal webmail, social networking and even                                          • Wasted bandwidth. Internet connections cost
                 pornography sites.                                                                      money. If half your bandwidth is taken up with
                                                                                                         non-work relatd web traffic, you could potentially
                 According The ePolicy Institute, of the 30% of                                          be paying twice as much as you need to and your
                 bosses who terminated employees for web violations                                      business-critical communications could be running
                 in 2007, 84% cited the viewing, downloading or                                          at half their speed capacity.
                 uploading of pornography and otherwise offensive
                 or inappropriate material as the reason.1                                             • Unlicensed software. When users download and
                                                                                                         install software from the internet, they create a legal
                                                                                                         risk. Software piracy is illegal. If an organization
                                                                                                         uses illegal copies of software, it may face a civil
                                                                                                         suit and company directors risk criminal penalties.
                    Unwanted websites
                                                                                                       • Reputation risk. Social networking can create
                    MessageLabs protects thousands of businesses                                         opportunities for employees to leak confidential
                    from inappropriate web use. Blocked sites fall                                       information or spread damaging rumors online.
                    into the following categories:                                                       Bad behavior by a single employee can reflect on
                                                                                                         the reputation of the whole organization.
                    Categories                              Most Blocked Sites
                    Advertisements & popups                                    44.5%                  Blocking non-business internet
                    Chat                                                       28.3%                  access
                                                                                                      In the face of all these problems, many managers’
                    Streaming media                                              4.7%
                                                                                                      first reaction might be to block all employee access
                    Unclassified                                                 4.0%                 to the internet.

                    Games                                                        3.2%                 It makes sense to block certain sites outright.
                    Downloads                                                    2.0%                 Pornography sites are an obvious example, but most
                                                                                                      companies may also consider gambling and game sites
                    Personals and dating                                         1.9%                 as utterly unrelated to work, potentially time-wasting and
                                                                                                      block them as well. Ninety-six percent of employers
                    Adult/sexually explicit                                      1.8%
                                                                                                      who block web access are concerned about employees
                    Web-based email                                              1.7%                 visting adult sites with sexual content. Companies also
                                                                                                      use URL blocks to stop users from visiting game sites
                    Blogs and forums                                             1.2%                 (61%), social networking sites (50%), entertainment
                    Source: MessageLabs Intelligence, July 2008
                                                                                                      sites (27%) ; sports sites (21%) and external blogs
                                                                                                      (18%) according to the 2007 Electronic Monitoring
                                                                                                      & Surveillance Survey from American Management
                                                                                                      Association and The ePolicy Institute.3

                 1 NotJust Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute
                 2 MessageLabs   Intelligence Report July 2008: www. Messagelabs.com/resources/mlireports
                 3 2007 Electronic Monitoring and Surveillance Survey from American Management Association and The ePolicy Institute. Survey results available at www.epolicyinstitute.com




      2          WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet
However, completely blocking internet access may not
be the right approach for your business.
                                                                                         When thinking about employee internet access and
                                                                                         your company’s well-being, consider the following:
                                                                                                                                                        MessageLabs
                                                                                                                                                         service brings
                                                                                         • Do I have a solution in place that can effectively
Monitoring employee behavior online                                                        block web-born malware, viruses and spyware?                 site monitoring
Monitoring inappropriate use may seem to be the
lesser of two evils compared with blocking access to
                                                                                         • Does my solution allow me to create web                   and URL filtering
                                                                                         	 filtering	and	monitoring	rules	for	different	groups	
large parts of the internet. Having blocked the worst
websites, you may wish to trust your employees’
                                                                                         	 or	employees?	How	flexible	is	my	solution?		                   together with
judgement. You may want to allow employees                                               •	 Have	I	clearly	defined	a	written	Web	Acceptable	          industry leading
access to social networking sites if it means that                                          Usage Policy?
they can organize their social life without spending                                                                                                     anti-virus and
hours on the phone. You might also allow people                                          In the end, it comes down to choice. Where do you
to shop online if it saves them time and lets them                                       draw the line? How do you balance individual access              anti-spyware
achieve a better work-life balance.                                                      with the overall protection and good of the business?
                                                                                         What is the correct balance between monitoring and
                                                                                                                                                             protection.
Keep in mind, when you decide to allow employees                                         blocking? There is no right answer. It varies from
access to the internet, it is in your best interest                                      company to company. But there is, perhaps, a right
to ensure that they are aware of the laws around                                         way to go about it.
electronic communications in the workplace. The
federal Electronic Communications Privacy Act
(ECPA) makes it clear that a company-provided                                            Our Solution: MessageLabs Web
computer system is the property of the employer.
U.S. employers have the legal right to monitor all
                                                                                         Security Service
employee computer activity, transmissions and                                            Because the MessageLabs service operates in
content- including incoming, outgoing and internal                                       the company’s network of data centers, there is no
email messages, as well as web surfing, downloads                                        hardware to buy, no hefty up-front capital costs, no
and uploads. Making sure your employees are                                              ongoing upgrades or maintenance and no software
aware of the laws surrounding internet usage may                                         licences; just a predictable per-user fee.
encourage them to use better judgement when
surfing the net.                                                                         From a single portal, managers can set up policies
                                                                                         – blocking sites individually or by category. They can
                                                                                         also set different policies for different types of users.
Policy matters                                                                           The same ClientNet portal gives managers detailed
It’s clear that blocking or monitoring web use requires                                  reports on internet use in their company. In addition
careful thought. Any decision needs to be backed up                                      to policy management, Skeptic™ technology gives
by a clear, acceptable usage policy for the internet.                                    MessageLabs a unique – and powerful – way to
The MessageLabs sponsored whitepaper, Not Just                                           protect its clients against web-born malware. When
Words: Enforce Your Email and Web Acceptable                                             your employees ask for a web page, the request goes
Usage Policies (AUP), written by The ePolicy                                             through our system first so we can scan the page for
Institute, is a good resource to help determine what                                     malware and check it against your company policies.
should be covered in your AUP.
                                                                                         The MessageLabs Web Security service gives
Each company has its own ethos. Some managers                                            companies the ability to monitor and enforce
may take a more laissez-faire approach while others                                      their internet usage policies; whether they are
want to lock everything down. Some people need full                                      very restrictive or very liberal, whether they favor
access to the web and companies may wish to give                                         monitoring or blocking. MessageLabs service brings
some departments or individuals more latitude than                                       site monitoring and URL filtering together with industry
others. A good example is your Human Resources                                           leading anti-virus and anti-spyware protection. As
department who might use Facebook or Linkedin for                                        the world wide web becomes an increasingly more
recruiting purposes. The use of social networking                                        important business tool, companies need the best
sites may be suitable in that capacity, but your                                         possible solution to help protect their computer
Finance department may not have a work-related                                           systems, their reputation and their employees.
use for such sites.                                                                      MessageLabs delivers those tools.

                                                                                         For more informaiton or to sign up for a FREE Trial,
                                                                                         please visit www.messagelabs.com/trials/free_web.




4 Not   Just Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute

WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet                                                                     3
www.messagelabs.com
                         usinfo@messagelabs.com
                         TOLL FREE 866-460-0000


                         Americas                                             Europe
                         AMERICAS	HEADQUARTERS                                HEADQUARTERS
                         512 Seventh Avenue                                   1270 Lansdowne Court
                         6th Floor                                            Gloucester Business Park
                         New York, NY 10018                                   Gloucester, GL3 4AB
                         USA                                                  United Kingdom
                         T +1 646 519 8100                                    T +44 (0) 1452 627 627
                         F +1 646 452 6570                                    F +44 (0) 1452 627 628

                         CENTRAL	REGION                                       LONDON
                         7760 France Avenue South                             40 Whitfield St
                         Suite 1100                                           London WIT 2RH
                         Bloomington, MN 55435                                United Kingdom
                         USA                                                  T +44 (0) 207 291 1960
                         T +1 952 830 1000                                    F +44 (0) 207 291 1937
                         F +1 952 831 8118
                                                                              NETHERLANDS
                         Asia	Pacific                                         Teleport Towers
                         HONG	KONG                                            Kingsfordweg 151
                         1601                                                 1043 GR
                         Tower II                                             Amsterdam
                         89 Queensway                                         Netherlands
                         Admiralty                                            T +31 (0) 20 491 9600
                         Hong Kong                                            F +31 (0) 20 491 7354
                         T +852 2111 3650
                         F +852 2111 9061                                     BELGIUM	/	LUXEMBOURG
                                                                              Culliganlaan 1B
                         AUSTRALIA                                            B-1831 Diegem
                         Level 14                                             Belgium
                         90 Arthur Street                                     T +32 (0) 2 403 12 61
                         North Sydney                                         F +32 (0) 2 403 12 12
                         NSW 2060
                         Australia                                            DACH
                         T +61 2 9409 4360                                    Feringastraße 9
                         F +61 2 9955 5458                                    85774 Unterföhring
                                                                              Munich
                         SINGAPORE                                            Germany
                         Level 14                                             T +49 (0) 89 189 43 990
                         Prudential Tower                                     F +49 (0) 89 189 43 999
                         30 Cecil Street
                         Singapore 049712
                         T +65 6232 2855
                         F +65 6232 2300



www.messagelabs.com
                         ©2008 MessageLabs Inc. All Rights Reserved. MessageLabs and the MessageLabs logo are registered trademarks and Be certain is a trademark of
usinfo@messagelabs.com   MessageLabs Ltd. and its affi liates in the United States and/or other countries. Other products, brands, registered trademarks and trademarks are
© MessageLabs 2008       property of their respective owners/companies. WP_WEBUSE_1108



                         WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet

More Related Content

What's hot

Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approachlinkedinlion11
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Cyber loofing
Cyber loofingCyber loofing
Cyber loofing
Sunny kumar gupta
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
ITbyTheSea
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008coniecto
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
Matthew Charles
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
Brian Sharland
 
Online Safety
Online Safety Online Safety
Online Safety
Janetta Garton
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Facebook, Youtube At Work
Facebook, Youtube At WorkFacebook, Youtube At Work
Facebook, Youtube At WorkRaju Nair
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Tifanija
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Osterman Research, Inc.
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
 
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media RecruitingBullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
Steven Duque
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWS
Amazon Web Services
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
Wissam Abdel Baki
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward F. T. Charfauros
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]
DeepNines Technologies
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 

What's hot (20)

Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approach
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Cyber loofing
Cyber loofingCyber loofing
Cyber loofing
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Online Safety
Online Safety Online Safety
Online Safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Facebook, Youtube At Work
Facebook, Youtube At WorkFacebook, Youtube At Work
Facebook, Youtube At Work
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media RecruitingBullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWS
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 

Viewers also liked

Athens ga halfvolunteerorientation
Athens ga halfvolunteerorientationAthens ga halfvolunteerorientation
Athens ga halfvolunteerorientation
Sean Cook
 
Briscoe B. (1981)
Briscoe B. (1981)Briscoe B. (1981)
Briscoe B. (1981)
Jose Luis
 
The Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaThe Strategic American Issue One: Business in America
The Strategic American Issue One: Business in America
Joel Drotts
 
Domain tools com-2013-07-10
Domain tools com-2013-07-10Domain tools com-2013-07-10
Domain tools com-2013-07-10avicp
 
NKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual ReportNKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual Report
JamericanCreations
 
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniorsMobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis Conférence
 
Bardziej produktywny gmail
Bardziej produktywny gmailBardziej produktywny gmail
Bardziej produktywny gmail
Tomasz Bak
 
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural GasMobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis Conférence
 
Mobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applicationsMobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis Conférence
 
Creating engaging environments in EC
Creating engaging environments in ECCreating engaging environments in EC
Creating engaging environments in EC
rpolan
 
Instructions for hatching eggs
Instructions for hatching eggsInstructions for hatching eggs
Instructions for hatching eggs
rpolan
 
Rails tobak2005
Rails tobak2005Rails tobak2005
Rails tobak2005Tomasz Bak
 
How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?
Tomasz Bak
 
JavaScript Promises
JavaScript PromisesJavaScript Promises
JavaScript Promises
Tomasz Bak
 
Working with npm packages
Working with npm packagesWorking with npm packages
Working with npm packages
Tomasz Bak
 
Building scientific inquiry
Building scientific inquiryBuilding scientific inquiry
Building scientific inquiry
rpolan
 

Viewers also liked (20)

Athens ga halfvolunteerorientation
Athens ga halfvolunteerorientationAthens ga halfvolunteerorientation
Athens ga halfvolunteerorientation
 
Briscoe B. (1981)
Briscoe B. (1981)Briscoe B. (1981)
Briscoe B. (1981)
 
The Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaThe Strategic American Issue One: Business in America
The Strategic American Issue One: Business in America
 
Domain tools com-2013-07-10
Domain tools com-2013-07-10Domain tools com-2013-07-10
Domain tools com-2013-07-10
 
NKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual ReportNKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual Report
 
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniorsMobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
 
Bardziej produktywny gmail
Bardziej produktywny gmailBardziej produktywny gmail
Bardziej produktywny gmail
 
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural GasMobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
 
Mobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applicationsMobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applications
 
製茶過程
製茶過程製茶過程
製茶過程
 
Ticket terapia
Ticket terapiaTicket terapia
Ticket terapia
 
Creating engaging environments in EC
Creating engaging environments in ECCreating engaging environments in EC
Creating engaging environments in EC
 
Instructions for hatching eggs
Instructions for hatching eggsInstructions for hatching eggs
Instructions for hatching eggs
 
Rails tobak2005
Rails tobak2005Rails tobak2005
Rails tobak2005
 
How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?
 
JavaScript Promises
JavaScript PromisesJavaScript Promises
JavaScript Promises
 
Kerberos
KerberosKerberos
Kerberos
 
Working with npm packages
Working with npm packagesWorking with npm packages
Working with npm packages
 
Building scientific inquiry
Building scientific inquiryBuilding scientific inquiry
Building scientific inquiry
 
sla
slasla
sla
 

Similar to Web use and misuse

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filter
entensys
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
Rochester Security Summit
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Data security
 Data security  Data security
Data security
Laura Breese
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
Windstream Enterprise
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
Vinoth Sivasubramanan
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
East West University
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
ecarrow
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
Chris Gates
 

Similar to Web use and misuse (20)

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Sophos social-media-wpna
Sophos social-media-wpnaSophos social-media-wpna
Sophos social-media-wpna
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filter
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Data security
 Data security  Data security
Data security
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Web use and misuse

  • 1. Employee Web Use and Misuse: Companies, their employees and the Internet A MessageLabs Whitepaper; October 08
  • 2. MessageLabs Internet Use and Misuse Web misuse can have serious implications for your business: Web Security Where do you draw the line? Is it okay to send the occasional personal email at work? What about • Reduced productivity. If employees spend their service gives a little internet shopping or spending sometime time on a social networking sites such as Facebook, on social networking sites, playing online games, they’re not spending it doing their job. companies downloading pirated movies and music, gambling or downloading porn? The internet has created • Security problems. Malware hides on websites the ability to new opportunities for mischief and new challenges and can install itself as users browse infected pages. for managers. MessageLabs Intelligence reports that the number monitor and of new, malicious websites blocked each day by MessageLabs nearly doubled (91 percent) in just enforce their Worldwide worries one month with 3,968 new sites intercepted daily.2 internet usage In today’s office enviornment, employers have a • Legal risks. When users download inappropriate relatively new issue to deal with; employees material to their computers other employees may policies. wasting time online and putting your business at take serious offense which in turn can create legal risk. A large proportion of corporate web traffic liabilities for managers. is non-work related: gambling, music downloads, personal webmail, social networking and even • Wasted bandwidth. Internet connections cost pornography sites. money. If half your bandwidth is taken up with non-work relatd web traffic, you could potentially According The ePolicy Institute, of the 30% of be paying twice as much as you need to and your bosses who terminated employees for web violations business-critical communications could be running in 2007, 84% cited the viewing, downloading or at half their speed capacity. uploading of pornography and otherwise offensive or inappropriate material as the reason.1 • Unlicensed software. When users download and install software from the internet, they create a legal risk. Software piracy is illegal. If an organization uses illegal copies of software, it may face a civil suit and company directors risk criminal penalties. Unwanted websites • Reputation risk. Social networking can create MessageLabs protects thousands of businesses opportunities for employees to leak confidential from inappropriate web use. Blocked sites fall information or spread damaging rumors online. into the following categories: Bad behavior by a single employee can reflect on the reputation of the whole organization. Categories Most Blocked Sites Advertisements & popups 44.5% Blocking non-business internet Chat 28.3% access In the face of all these problems, many managers’ Streaming media 4.7% first reaction might be to block all employee access Unclassified 4.0% to the internet. Games 3.2% It makes sense to block certain sites outright. Downloads 2.0% Pornography sites are an obvious example, but most companies may also consider gambling and game sites Personals and dating 1.9% as utterly unrelated to work, potentially time-wasting and block them as well. Ninety-six percent of employers Adult/sexually explicit 1.8% who block web access are concerned about employees Web-based email 1.7% visting adult sites with sexual content. Companies also use URL blocks to stop users from visiting game sites Blogs and forums 1.2% (61%), social networking sites (50%), entertainment Source: MessageLabs Intelligence, July 2008 sites (27%) ; sports sites (21%) and external blogs (18%) according to the 2007 Electronic Monitoring & Surveillance Survey from American Management Association and The ePolicy Institute.3 1 NotJust Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute 2 MessageLabs Intelligence Report July 2008: www. Messagelabs.com/resources/mlireports 3 2007 Electronic Monitoring and Surveillance Survey from American Management Association and The ePolicy Institute. Survey results available at www.epolicyinstitute.com 2 WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet
  • 3. However, completely blocking internet access may not be the right approach for your business. When thinking about employee internet access and your company’s well-being, consider the following: MessageLabs service brings • Do I have a solution in place that can effectively Monitoring employee behavior online block web-born malware, viruses and spyware? site monitoring Monitoring inappropriate use may seem to be the lesser of two evils compared with blocking access to • Does my solution allow me to create web and URL filtering filtering and monitoring rules for different groups large parts of the internet. Having blocked the worst websites, you may wish to trust your employees’ or employees? How flexible is my solution? together with judgement. You may want to allow employees • Have I clearly defined a written Web Acceptable industry leading access to social networking sites if it means that Usage Policy? they can organize their social life without spending anti-virus and hours on the phone. You might also allow people In the end, it comes down to choice. Where do you to shop online if it saves them time and lets them draw the line? How do you balance individual access anti-spyware achieve a better work-life balance. with the overall protection and good of the business? What is the correct balance between monitoring and protection. Keep in mind, when you decide to allow employees blocking? There is no right answer. It varies from access to the internet, it is in your best interest company to company. But there is, perhaps, a right to ensure that they are aware of the laws around way to go about it. electronic communications in the workplace. The federal Electronic Communications Privacy Act (ECPA) makes it clear that a company-provided Our Solution: MessageLabs Web computer system is the property of the employer. U.S. employers have the legal right to monitor all Security Service employee computer activity, transmissions and Because the MessageLabs service operates in content- including incoming, outgoing and internal the company’s network of data centers, there is no email messages, as well as web surfing, downloads hardware to buy, no hefty up-front capital costs, no and uploads. Making sure your employees are ongoing upgrades or maintenance and no software aware of the laws surrounding internet usage may licences; just a predictable per-user fee. encourage them to use better judgement when surfing the net. From a single portal, managers can set up policies – blocking sites individually or by category. They can also set different policies for different types of users. Policy matters The same ClientNet portal gives managers detailed It’s clear that blocking or monitoring web use requires reports on internet use in their company. In addition careful thought. Any decision needs to be backed up to policy management, Skeptic™ technology gives by a clear, acceptable usage policy for the internet. MessageLabs a unique – and powerful – way to The MessageLabs sponsored whitepaper, Not Just protect its clients against web-born malware. When Words: Enforce Your Email and Web Acceptable your employees ask for a web page, the request goes Usage Policies (AUP), written by The ePolicy through our system first so we can scan the page for Institute, is a good resource to help determine what malware and check it against your company policies. should be covered in your AUP. The MessageLabs Web Security service gives Each company has its own ethos. Some managers companies the ability to monitor and enforce may take a more laissez-faire approach while others their internet usage policies; whether they are want to lock everything down. Some people need full very restrictive or very liberal, whether they favor access to the web and companies may wish to give monitoring or blocking. MessageLabs service brings some departments or individuals more latitude than site monitoring and URL filtering together with industry others. A good example is your Human Resources leading anti-virus and anti-spyware protection. As department who might use Facebook or Linkedin for the world wide web becomes an increasingly more recruiting purposes. The use of social networking important business tool, companies need the best sites may be suitable in that capacity, but your possible solution to help protect their computer Finance department may not have a work-related systems, their reputation and their employees. use for such sites. MessageLabs delivers those tools. For more informaiton or to sign up for a FREE Trial, please visit www.messagelabs.com/trials/free_web. 4 Not Just Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet 3
  • 4. www.messagelabs.com usinfo@messagelabs.com TOLL FREE 866-460-0000 Americas Europe AMERICAS HEADQUARTERS HEADQUARTERS 512 Seventh Avenue 1270 Lansdowne Court 6th Floor Gloucester Business Park New York, NY 10018 Gloucester, GL3 4AB USA United Kingdom T +1 646 519 8100 T +44 (0) 1452 627 627 F +1 646 452 6570 F +44 (0) 1452 627 628 CENTRAL REGION LONDON 7760 France Avenue South 40 Whitfield St Suite 1100 London WIT 2RH Bloomington, MN 55435 United Kingdom USA T +44 (0) 207 291 1960 T +1 952 830 1000 F +44 (0) 207 291 1937 F +1 952 831 8118 NETHERLANDS Asia Pacific Teleport Towers HONG KONG Kingsfordweg 151 1601 1043 GR Tower II Amsterdam 89 Queensway Netherlands Admiralty T +31 (0) 20 491 9600 Hong Kong F +31 (0) 20 491 7354 T +852 2111 3650 F +852 2111 9061 BELGIUM / LUXEMBOURG Culliganlaan 1B AUSTRALIA B-1831 Diegem Level 14 Belgium 90 Arthur Street T +32 (0) 2 403 12 61 North Sydney F +32 (0) 2 403 12 12 NSW 2060 Australia DACH T +61 2 9409 4360 Feringastraße 9 F +61 2 9955 5458 85774 Unterföhring Munich SINGAPORE Germany Level 14 T +49 (0) 89 189 43 990 Prudential Tower F +49 (0) 89 189 43 999 30 Cecil Street Singapore 049712 T +65 6232 2855 F +65 6232 2300 www.messagelabs.com ©2008 MessageLabs Inc. All Rights Reserved. MessageLabs and the MessageLabs logo are registered trademarks and Be certain is a trademark of usinfo@messagelabs.com MessageLabs Ltd. and its affi liates in the United States and/or other countries. Other products, brands, registered trademarks and trademarks are © MessageLabs 2008 property of their respective owners/companies. WP_WEBUSE_1108 WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet