Skip to main content

How to Plan, Create and Implement Internet Access Policy on a Network

This is a guest post by Jeremy Pullicino about how to plan, create and implement Internet Access Policy in a company.
Finding the right method to limit Internet access isn’t simple. When done properly, limiting internet access will protect the company from users hogging bandwidth, productivity loss due to cyber-slacking, and security risks such as malware and virus infections. However, if you limit internet access incorrectly it will hinder productivity, reduce employee morale and introduce new security risks to your network.

In this article I will outline the major steps a system administrator needs to take when limiting Internet access in his company.

Step 1: Implement Internet access monitoring.

The first thing you need to do when you want to limit Internet access is to understand how the Internet is being used by your employees. When you monitor Internet access you should be looking out for the following metrics:

- The sites users are browsing.

- How much time they are spending online.

- The bandwidth they are consuming.

- The files they are downloading.

Different employees have different Internet usage patterns which are based on their personal habits and the jobs they perform. You need to weed out the abuse whilst at the same time recognize the legitimate behavior.

Step 2: Draft an Internet usage policy for your company.

Now that you have insight into how Internet is being used, you can begin drafting an Internet usage policy.

When writing a policy, you want to keep the following in mind:

- The policy should be straightforward and unambiguous.

- Policies must not restrict legitimate Internet usage.

- Responsibilities of your staff must be clearly highlighted.

Also keep in mind that policies need to change over time, so ensure that a good feedback mechanism is in place so that your users can communicate to you where the policy is working and where it might be hindering their work.

Step 3: Educate staff on the new policies.

If you work with Step 2 as I recommended, your Internet Usage Policy should not go into unnecessary detail and must be easy to read and understand. Your users are more likely to follow the policy correctly if they understand it. To help them understand it better and to highlight the important parts, you should organize training for your staff.

Here are my recommendations for training:

- Users are always nervous about change so put effort into listening to their concerns.

- Let your users know that this policy will protect both themselves and their company.

- Ensure that they understand the consequences of policy violation.

- It is important to use feedback from training to further refine your policies.

Once staff is aware of their responsibilities and understand why it’s so important for the company to limit Internet access, you are ready to tighten the belt and lock down their Internet activities.

Step 4: Implement Web Filters to enforce your policies.

This stage is seen as the hardest, however if the policy and training was done properly, this stage should be a breeze, especially if you chose the correct software solution.

Below I list a few essential features for limiting Internet access:

- Category based policies for easier policy management.

- Time-based policies that can be enforced differently depending on the time of day.

- Bandwidth throttling capabilities to prevent users from saturating Internet bandwidth.

- Antivirus and anti-malware support, especially for downloaded files.

Furthermore, ensure you can evaluate the software for some days with your own policies and on your own network before you buy it.

To limit Internet access should not be a daunting task. If done properly, it can be an interesting and fruitful exercise. Choosing the right software is essential and having a solid Internet usage policy will greatly facilitate your task.

This guest post was provided by Jeremy Pullicino on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. Read more on how to limit internet access.

All product and company names herein may be trademarks of their respective owners.

Technology Blog


Popular posts from this blog

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

5 Common Examples Of Website Design Mistakes by Business Owners

This is a guest post by Sachin about five Common Examples Of Website Design Mistakes by Business Owners . When most business owners think about website design, they think about a brochure online. Online shopping sites are making a lot of money with the use of web-based applications to sell products, collect payments an arrange delivery. The only work left to do is pack and send the boxes. Smart applications can even print out the labels, so the only thing left to do it stick them on the box. Unfortunately, in many cases, websites are replacing people. For those of us left with a job, we can be thankful that many business owners make the following mistakes when it comes to websites and web design.

Don’t have one. This is the first and biggest problem of most business owners when it comes to website design. They think they don’t need one. Who can ever really do with less business? The reason why they have not been getting business from online sources in the past is because they have not …

About Web Offset Printing and Its Advantages

The sheer lion's share of business printing for inventories, magazines or books is on an offset printing press. There are numerous motivations to use web offset printing versus sheet encouraged and here are some for your thought as the advantages are numerous:

AMOLED display coming to Samsung Galaxy Tab range

This is a guest post by Erica about the arrival of AMOLED display to Samsung Galaxy Tab range.Samsung could be transplanting a seven inch AMOLED screen into an upcoming addition to its Galaxy Tab range of tablet computers.

You may have experienced an AMOLED display in a small portable device before as Samsung, Nokia and HTC have all used them in smartphones to date. However, the expense of producing AMOLED screens has prohibited them from appearing on larger devices like tablets, until now.

The seven inch Galaxy Tab was launched last year but an update with an AMOLED screen would be most welcome, cutting energy consumption and improving colours and contrast ratios across the board.

The rumours about this device state that it will run Android 3.0, feature a three megapixel camera on the rear, a two megapixel snapper on the front and have a display resolution of 1024x600 which is not bad for a device of this size.

The hardware powering the new Galaxy Tab will consist of a 1.2GHz processor w…

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…

Is Windows To Go the Real Innovation of Windows 8?

Due to the buzz around the Windows 8 Consumer Preview, we've been treated to many variations on the pros and cons for tablets and desktops. However, the coverage tends to leave out what may be the single most useful feature of Microsoft's next-generation operating system: Windows To Go.

Essentially, Windows To Go puts a fully bootable Windows 8 installation on a USB drive. You'll carry around your OS and plug it into whatever device you need to use. If it's the first time you do so, the PC will configure all of the relevant device drivers, and store the necessary settings on the USB drive for next time. Unsurprisingly, Microsoft is marketing this feature toward enterprise customers who might otherwise question the need to upgrade.

Creating a Windows To Go drive wasn't one of the features available for hands-on testing via the Windows 8 Consumer Preview. Sean Gallagher of Ars Technica provided a way to 'build your own,' but admits that it's "a task …