{"id":1319,"date":"2011-09-27T16:22:03","date_gmt":"2011-09-27T16:22:03","guid":{"rendered":"https:\/\/tsisupport.com\/?p=359"},"modified":"2020-05-27T07:51:10","modified_gmt":"2020-05-27T07:51:10","slug":"monitoring-internet-traffic-at-work","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1319","title":{"rendered":"Monitoring Internet Traffic at work"},"content":{"rendered":"<p>If you are small or mid-sized business owner, you need to read this:<\/p>\n<p>At TSI, 100% of all our clients have some\u00a0type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet\u00a0usage \u00a0within their own organizations (which means 92% don\u2019t!)\u00a0 It always amazes me that\u00a0when I ask a business owner about how they monitor Internet usage, I often hear back \u201c<em>My people work very hard here, they don\u2019t have time to\u00a0spend time\u00a0on the Internet<\/em>\u201d\u00a0 <strong>Really?<\/strong><\/p>\n<p>As part of the services we provide to our client, we update firmware,\u00a0licenses, subscriptions and also review security logs on the firewalls that we manage. Sometimes, these tasks require \u00a0that we look at\u00a0users\u2019 activity logs, \u00a0in particular when\u00a0the clients\u00a0report that the Internet\u00a0is slow.\u00a0 Often, upon the reviewing of some these logs, we find that the cause of the problem is\u00a0due to abuse of\u00a0Internet usage (social media, Internet radio, live video, YouTube, etc.). I personally have been working with the Internet for over 20 years now and I think I have seen it all but I\u00a0am still shocked when\u00a0I see the Internet activities of\u00a0 some people that are supposedly \u201cworking very hard\u201d.\u00a0 Many business owners still do not make the link to :\u00a0<strong><strong>Lack of Internet monitoring = loss of productivity<\/strong><\/strong><\/p>\n<p>According to <a title=\"SnapShot Spy\" href=\"http:\/\/snapshotspy.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Snapshot Spy<\/a>, an Internet Monitoring company.<\/p>\n<p><strong>&#8211; 30 to 40% of Internet use in the workplace is not related to business<\/strong><\/p>\n<p>\u2013 64% of employees say they use the Internet for personal interest during working hours<\/p>\n<p>\u2013 70% of all Internet porn traffic occurs during the nine-to-five work day<\/p>\n<p>\u2013 37% of workers say they surf the Web constantly at work<\/p>\n<p>\u2013 77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls,\u00a0computer files, or by videotaping them at work<\/p>\n<p>\u2013 63% of companies monitor workers\u2019 Internet connections and 47% store and review employee e-mail<\/p>\n<p>\u2013 27% of companies say that they\u2019ve fired employees for misuse of office e-mail or Internet connections,\u00a0and 65% report some disciplinary measure for those offenses.<\/p>\n<p>According to another survey by International Data Corp (<strong>IDC<\/strong>),<\/p>\n<p>\u2013 30 to 40% of internet access is spent on non work related browsing, and a staggering 60% of all online\u00a0purchases are made during working hours<\/p>\n<p>\u2013 90 percent of employees feel the Internet can be addictive, and 41 percent admit to personal surfing at<br \/>\nwork for more than three hours per week. Some estimates reveal that computer crime may cost as much as $50 billion per year<\/p>\n<p>\u2013 Around 80% of computer crime is committed by \u201cinsiders\u201d. They manage to steal $100 million by some estimates; $1 billion by others. The average fraud inflicts a loss of about $110,000 per corporate\/organization victim, and $15,000 to each individual victim<\/p>\n<p><strong>&#8211; \u00a060% of Security Breaches occur within the Company \u2013 behind the Firewall<\/strong><\/p>\n<p>\u2013 \u00a025% of corporate Internet traffic is considered to be \u201cunrelated to work\u201d. 30-40% of lost productivity is accounted for by cyber-slacking<\/p>\n<p>Most studies show 70% of companies have had sex sites accessed using their network. 32.6% of workers surf the net with no specific objective; men are twice as likely as women. When asked \u201cshould employers monitor, limit, block or control your Internet access while at work?\u201d over 60 % of employees said \u201cyes\u201d.\u00a0On average, workers spend 21 hours per week online at the office, as oppose to only 9.5 hours at home. \u00a027% of Fortune 500 organisations have defended themselves against claims of sexual harassment stemming from inappropriate email.<\/p>\n<p><strong>Traditionally, employers have been responsible and liable for the actions of their employees in the workplace. However, if an organisation can demonstrate a \u201cduty of care\u201d to reduce unacceptable employee activity, then it could minimize it\u2019s potential for liability<\/strong>.<\/p>\n<p>Chevron faces a $2 million lawsuit as a result of an employee\u2019s email that allegedly included sexist content. A company with 1,000 Internet users could lose upwards of $35 million in productivity annually from just an hour of daily Web surfing by employees 90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and\/or able to quantify their losses, at more than $455 million.<br \/>\nThe most serious financial losses occurred through theft of proprietary information respondents reported more than $170 million) and financial fraud (respondents reported approximately $116 million).<br \/>\nEstimated that the greatest threat to intellectual property is trusted insiders; 70% of security breaches come from inside.<\/p>\n<p>There are many tools on the market that allow you to monitor Internet usage within \u00a0your organization. \u00a0Companies like Spector, Snapshot Spy, Surfcontrol and Interguard specialize in this market alone. \u00a0At TSI, we mostly utilize some of the tools provided by one of our vendors, Sonicwall and use GMS to perform this monitoring. \u00a0If you want to see how GMS operates, download the following document<\/p>\n<p>I believe that Internet monitoring can be interpreted by some peope as too intrusive but I you are running a business and need your employees to focus their attention to the company needs while they are at work, you need to implement monitoring.<\/p>\n<p>Gerard<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are small or mid-sized business owner, you need to read this: At TSI, 100% of all our clients have some\u00a0type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet\u00a0usage \u00a0within their own organizations (which means 92% don\u2019t!)\u00a0 It always amazes me that\u00a0when I ask a business owner about&hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[41,42,43,44,45,46,29,19,47,48,33,21,49,50,51,52,53,54,38,39,55,56,57],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Monitoring Internet Traffic at work - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring Internet Traffic at work - TSI Support\" \/>\n<meta property=\"og:description\" content=\"If you are small or mid-sized business owner, you need to read this: At TSI, 100% of all our clients have some\u00a0type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet\u00a0usage \u00a0within their own organizations (which means 92% don\u2019t!)\u00a0 It always amazes me that\u00a0when I ask a business owner about&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1319\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-27T16:22:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T07:51:10+00:00\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1319\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1319\",\"name\":\"Monitoring Internet Traffic at work - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"datePublished\":\"2011-09-27T16:22:03+00:00\",\"dateModified\":\"2020-05-27T07:51:10+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1319#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1319\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1319#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Monitoring Internet Traffic at work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoring Internet Traffic at work - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Monitoring Internet Traffic at work - TSI Support","og_description":"If you are small or mid-sized business owner, you need to read this: At TSI, 100% of all our clients have some\u00a0type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet\u00a0usage \u00a0within their own organizations (which means 92% don\u2019t!)\u00a0 It always amazes me that\u00a0when I ask a business owner about&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1319","og_site_name":"TSI Support","article_published_time":"2011-09-27T16:22:03+00:00","article_modified_time":"2020-05-27T07:51:10+00:00","author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1319","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1319","name":"Monitoring Internet Traffic at work - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"datePublished":"2011-09-27T16:22:03+00:00","dateModified":"2020-05-27T07:51:10+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1319#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1319"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1319#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Monitoring Internet Traffic at work"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1319"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1319"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1319\/revisions"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}