Categories: Articles

The 7 Do’s and Don’ts of Network Gatekeeping

The 7 Do’s and Don’ts of Network Gatekeeping
reprinted with permission from the HP Small Business Center

There’s little doubt that the Internet has been a real benefit to organizations – providing instant communication capabilities and an almost bottomless source of valuable, up-to-date information on just about any topic.

However, many employees won’t think twice about accessing the network for personal use, perhaps to download music or to shop online. Not only does this put a strain on the network by reducing the bandwidth available for legitimate use, but it also makes it easier for criminals to access sensitive company information and for viruses to enter the network.

From an IT standpoint, it’s a hassle to deal with employees downloading unsafe material on the one hand, and complaints about how slow the network is on the other.

So what’s the best way to effectively limit employees’ network use and keep the network safe, without hampering productivity or creating distrust? Here’s a list of do’s and don’ts to help you put together a network usage policy.

1. Don’t block access to things like IM applications or YouTube without consulting employees. Not only will it cause resentment on the part of users, but such things could be necessary to their work – e.g. to communicate with clients, for research or to watch instructional videos.

2. Do develop and implement a written ‘acceptable use’ policy with a statement of purpose and clearly laid-out rules that define exactly what is allowed or not allowed. It should also highlight the consequences of violating the policy.

3. Do understand how employees use the Internet for research and communication purposes, and do involve those affected in drawing up the policy. When proposing websites and applications to block, make sure users have a say in the matter. If you have to revise the policy because of an oversight after it’s already been signed, then both you and the document lose credibility.

4. Do regulate and control employee use of the Internet with firewalls. Once a list of restricted URLs and other conditions of use have been set, use firewalls and filtering, and monitoring software to prevent employees from accessing inappropriate sites.

5. Don’t neglect to use antivirus software – deploy VPN and use other security solutions to keep the network safe from hackers and viruses.

6. Do consider using thin clients instead of desktops or workstations. Thin clients put the normal local functions of a PC onto a server for centralized management, increasing security and enhancing control over user PCs.

7. Do conduct regular employee training sessions to inform them of why an acceptable use policy is necessary. Many employees assume that because they have Internet access at work, they are free to use it however they wish. They may not know how their actions can negatively affect the company (lawsuits, risk to sensitive data, etc.) and be cause for dismissal.

Once a set of rules for acceptable use of the network is in place and employees are aware of their responsibilities, you’ll have more time to deal with real IT and business issues. You’ll also spend far less of your day slaying viruses and fielding complaints.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Executive’s Guide to Security Operations Center Models

Cyber threats never take a day off, never clock out and go home at the…

2 days ago

Introduction to Azure Services

Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…

2 days ago

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

3 days ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

1 week ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

1 week ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

1 week ago