ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpgWith all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

Now, you might think that your content filtering solution is adequate to keep all of the bad stuff out, but the fact of the matter is that even the best content filter will only keep most of the bad stuff out, not all of it. There’s a reality that you need to take into consideration; a user who’s determined to find a way around your content filtering solution, will be able to do so.

One of the clearest examples of this comes from the home where studies show that technologically-savvy kids these days are figuring out how to bypass parental controls to view inappropriate content on the Internet. Net Nanny cites a survey where, “30 percent of teenagers admitted that they know how to delete their browsing history.” And, “12 percent of teenagers have deleted their browsing history in the past year.”

Granted, knowing how to delete browsing history and bypassing a content filter are two different skill sets. Regardless, the connection here is that a user would most likely only delete their browsing history if they felt like they’ve got something to hide, like the viewing of inappropriate content. Parents are suspicious of this. The survey cites, “Of parents that had content filters on their computer, 24 percent believe that their children could access blocked content.”

Clearly there’s a need for content filtering solutions in homes with kids, but what about the office? Surely you don’t have to worry about adult workers accessing adult content while on the clock. Unfortunately, this happens more often than you would think. Consider these statistics from CNBC:

  • 70 percent of all online porn access happens during business hours. - Message Labs
  • Of 61 million unique U.S. visitors logged into pornographic web sites in March of 2006, every fifth visitor was from an office workstation. – Comscore Media Matrix
  • Two-thirds of 474 human resources professionals said in a survey they’ve discovered pornography on employee computers. Nearly half of those, 43 percent, said they had found such material more than once. -- Associated Press
  • Half of the Fortune 500 companies have dealt with at least one incident related to computer porn over a 12 month period, offenders were fired in 44 percent of the incidents and disciplined in a further 41 percent of cases. – Computerworld

Of these companies that experience problems with workers accessing porn at work, how many of them have a content filtering solution in place? It’s likely that many of them do, yet, either it’s not adequate enough to block problematic sites, or workers are crafty enough to find ways around the filter.

For example, if a user knows exactly what causes a website to be flagged by a content filter (like a keyword in the URL), they can then access the content if they locate it on a site that they know won’t get flagged. Also, an employee with a mobile device will be able to access content via their mobile provider, which wouldn’t be subject to your network’s content filtering solution.

The lesson here is that, if you want to effectively keep users from viewing inappropriate content (in both your home and office), you need something more involved than just a content filter. You will also need a way to monitor Internet traffic so you can keep users accountable for the sites they visit. Of course, the ramifications for this extend beyond pornography. It also includes the whole gamut of time-wasting websites that your employees are easily drawn to, like Facebook, YouTube, Buzzfeed, gaming sites, etc.

To equip your company with a comprehensive security solution that both blocks problematic websites and monitors online activity, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Data Recovery Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Disaster Recovery Passwords Holiday Covid-19 Apps Windows 10 Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Bandwidth Blockchain Remote Encryption Business Technology Mobile Device Management Information App Virtualization Spam Server WiFi Employee/Employer Relationship Budget Gmail History Office Two-factor Authentication Apple Office 365 Information Technology Cybercrime BDR Wi-Fi Conferencing Big Data Health Analytics Access Control Data Security Save Money Compliance Remote Monitoring Employer-Employee Relationship Help Desk IT Management Hacking Voice over Internet Protocol Training Vendor Cost Management Remote Computing Hacker Document Management Patch Management Project Management Augmented Reality Data loss Word IBM Website Search... BYOD Best Practice Computing Retail Vendor Management Mobile Office Hard Drive Applications Alert Managed Services Hiring/Firing Vulnerabilities Outlook Password Legal Money Customer Service Data storage Unified Threat Management Firewall Maintenance Travel Virtual Reality iPhone Social Engineering Mobile Computing Cryptocurrency Education Cortana Black Market Content Filtering Marketing Cleaning Websites Running Cable Robot Meetings Mobility Router Storage Google Maps Data Breach The Internet of Things YouTube Scam Remote Workers Windows 7 Free Resource Laptop VPN Twitter User Monitoring Update How To Windows 11 Law Enforcement End of Support Printer Healthcare Chrome Sports Social SaaS DDoS Paperless Office Antivirus Avoiding Downtime Bluetooth Physical Security Administration Distributed Denial of Service Disaster Holidays Presentation Office Tips Excel Specifications Memory Private Cloud IT Consultant Start Menu Lithium-ion battery Cooperation Downloads Video Conferencing Computer Care Customer Relationship Management Co-Managed IT Vulnerability Virtual Machines Politics Virtual Assistant Entertainment Settings Processors Computer Repair Machine Learning Software as a Service Data Protection Professional Services Solid State Drive Processor Managed Services Provider Chromebook Drones Virtual Private Network Automobile Wireless Technology eWaste HIPAA Tech Terms How To Current Events Downtime Managed IT Multi-factor Authentication Microchip Solutions Safety Digital Flexibility Integration Virtual Desktop Saving Time Images 101 Taxes Hack Display Identity Theft Experience Notifications Unified Communications Computers Bitcoin Telephone Employees PowerPoint Google Docs Browsers Videos Cache Nanotechnology Surveillance Upload Workers Software License Electronic Payment Managing Costs Music Google Play Unified Threat Management Social Network Cables SSID Employer/Employee Relationships Printing Data Analysis Media Screen Reader Development CCTV Trends Competition Botnet Mobile Technology Virtual Machine Phone System Security Cameras Recovery Touchscreen Emergency Customer Resource management Reviews Devices Optimization Rental Service Computer Malfunction Point of Sale Micrsooft Tip of the week Teamwork Flash LiFi Fileless Malware 2FA Vendor Mangement Entrepreneur Gamification Application Data Storage Samsung Company Culture Hypervisor Telephone Systems Shortcuts Business Growth Documents Telephone System Shopping Uninterrupted Power Supply Regulations Business Intelligence Webcam Medical IT SQL Server Computer Accessories Directions Paperless Business Mangement Backup and Disaster Recovery Content PCI DSS Tablets Desktop Licensing Banking Be Proactive Google Wallet Securty Electronic Medical Records Domains Gig Economy Accountants Humor Messenger Deep Learning Supercomputer Azure Google Calendar Business Communications Database Internet Service Provider Virus Regulations Compliance Managed IT Service Business Metrics Workplace Strategies Hosted Solution Health IT Equifax Memes Books Motion Sickness Hard Drive Disposal Language Society Comparison Human Resources Google Drive Tactics Net Neutrality Username Public Speaking Financial Data Visible Light Communication Streaming Media Knowledge Risk Management Corporate Profile Startup IT Reading Freedom of Information Troubleshooting Monitors Keyboard Employer Employee Relationship email scam Windows 8 Television Navigation Google Apps Telephony Addiction Hard Drives Telework Cabling Mobile Security Smart Technology Microsoft 365 Displays Advertising User Tip Smartwatch Tablet Legislation intranet Communitications Relocation G Suite News Shortcut Procurement Tracking Work/Life Balance Tech Support Mouse Evernote Wireless VoIP Network Management Heating/Cooling FinTech Environment Windows XP Proxy Server CES Emails Social Networking IT Assessment Web Server Fake News Business Owner Supply Chain Management In Internet of Things Digital Payment Computing Infrastructure Value SharePoint Service Level Agreement Management Organization Worker Device security Cyber security Hacks Supply Chain Network Congestion Writing Access Wireless Headphones Smart Devices Reliable Computing Microsoft Excel Remote Working Public Cloud Business Cards Tech Time Management Going Green Error AI Trend Micro Workplace Transportation Audit Bookmark Digital Security Cameras Spyware Electronic Health Records Scalability Inbound Marketing Administrator File Sharing Piracy Wasting Time Text Messaging Proactive IT Term Staffing Download Redundancy IP Address HTML eCommerce Bring Your Own Device Scams Modem

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?