Skip to main content

How to Plan, Create and Implement Internet Access Policy on a Network

This is a guest post by Jeremy Pullicino about how to plan, create and implement Internet Access Policy in a company.
Finding the right method to limit Internet access isn’t simple. When done properly, limiting internet access will protect the company from users hogging bandwidth, productivity loss due to cyber-slacking, and security risks such as malware and virus infections. However, if you limit internet access incorrectly it will hinder productivity, reduce employee morale and introduce new security risks to your network.

In this article I will outline the major steps a system administrator needs to take when limiting Internet access in his company.

Step 1: Implement Internet access monitoring.

The first thing you need to do when you want to limit Internet access is to understand how the Internet is being used by your employees. When you monitor Internet access you should be looking out for the following metrics:

- The sites users are browsing.

- How much time they are spending online.

- The bandwidth they are consuming.

- The files they are downloading.

Different employees have different Internet usage patterns which are based on their personal habits and the jobs they perform. You need to weed out the abuse whilst at the same time recognize the legitimate behavior.

Step 2: Draft an Internet usage policy for your company.

Now that you have insight into how Internet is being used, you can begin drafting an Internet usage policy.

When writing a policy, you want to keep the following in mind:

- The policy should be straightforward and unambiguous.

- Policies must not restrict legitimate Internet usage.

- Responsibilities of your staff must be clearly highlighted.

Also keep in mind that policies need to change over time, so ensure that a good feedback mechanism is in place so that your users can communicate to you where the policy is working and where it might be hindering their work.

Step 3: Educate staff on the new policies.

If you work with Step 2 as I recommended, your Internet Usage Policy should not go into unnecessary detail and must be easy to read and understand. Your users are more likely to follow the policy correctly if they understand it. To help them understand it better and to highlight the important parts, you should organize training for your staff.

Here are my recommendations for training:

- Users are always nervous about change so put effort into listening to their concerns.

- Let your users know that this policy will protect both themselves and their company.

- Ensure that they understand the consequences of policy violation.

- It is important to use feedback from training to further refine your policies.

Once staff is aware of their responsibilities and understand why it’s so important for the company to limit Internet access, you are ready to tighten the belt and lock down their Internet activities.

Step 4: Implement Web Filters to enforce your policies.

This stage is seen as the hardest, however if the policy and training was done properly, this stage should be a breeze, especially if you chose the correct software solution.

Below I list a few essential features for limiting Internet access:

- Category based policies for easier policy management.

- Time-based policies that can be enforced differently depending on the time of day.

- Bandwidth throttling capabilities to prevent users from saturating Internet bandwidth.

- Antivirus and anti-malware support, especially for downloaded files.

Furthermore, ensure you can evaluate the software for some days with your own policies and on your own network before you buy it.

To limit Internet access should not be a daunting task. If done properly, it can be an interesting and fruitful exercise. Choosing the right software is essential and having a solid Internet usage policy will greatly facilitate your task.

This guest post was provided by Jeremy Pullicino on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. Read more on how to limit internet access.

All product and company names herein may be trademarks of their respective owners.


Technology Blog

Comments

Popular posts from this blog

iPhone sales help fuel worldwide smartphone numbers

There are nearly 150 million smartphones out there in the world, according to new figures. Thanks to record breaking sales figures by Apple for the iPhone 4S by the end of 2011 there was almost a 50% increase in the number of devices up on the previous year. The research by Gartner Inc. claims the figures rose during the final quarter of 2011 thanks to the 30 million plus iPhone 4S' sold by Apple. The results led to Apple becoming the third largest vendor of mobile phones in the world. They also became the top smartphone vendor, with nearly a quarter of global sales in the fourth quarter. Over the rest of 2011, Apple took a fifth of the share of the smartphone market. The UK and wider Western Europe along with North America were the driving forces for the figures, says Gartner. Up until the launch of the iPhone 4S sales were a little slow. Suddenly the spiked as we all ran out to buy the new device. Worldwide, mobile device sales figures reached 476.5 million in the fourth q...

3 Things to Avoid as a Motivational Speaker

Motivational speakers deliver at least hour-long speeches about positive thinking and how to better yourself and the people around you. These messages often apply to a wide variety of settings, whether at home, at work, or even at a personal level. If you're ever planning on becoming a motivational speaker, there are a lot of things that you should avoid. Here are the three of the most common ones.

Yahoo invisible detector – insights on a new online service

This is a guest article by Iulian about leading Yahoo Invisible detector service http://www.detectinvisible.com/ . There are several online businesses which are basically ruling the online industry, and one of them is Yahoo. Founded in 1994 by Jerry Yang and David Filo in Santa Clara, California, Yahoo! started to grow significantly over the years, now having millions of users all over the world. One of the most widespread products of Yahoo is Yahoo Mail and Messenger. Over time yahoo messenger had become a habit for millions and soon they’ve introduced the possibility to become invisible for other users. It was obvious that a whole new kind of service appeared online, that of yahoo invisible detector. The yahoo invisible detector as an online service first appeared when yahoo was at protocol 13, now being at protocol 17, and at first there were several websites offering their services in order for you to find out which buddy of yours is hiding. Unfortunately, as soon as yahoo star...

The Concepts of Social Networking in Today's World

In today’s high tech world, networking occurs as much on computers as in “real life” social situations. Social media has opened up a vast new frontier for people to connect with others. Before the advent of social media, people generally networked at social gatherings like mixers, fundraising galas and similar events. Of course, such “face-to-face” networking is still important and common, but social media allows possibilities that did not exist before. One of the problems with older networking models is that often the same people showed up at all the events. The percentage of the population that is active in community events tends to be rather low. On the other hand, almost everyone these days uses social media. Vast reach of social networking According to the latest stats, Facebook alone has more than 900 million active users worldwide with the number continuing to grow. Twitter and Google+ also have large numbers of active users that cross all demographic categories. ...