print   email   Share

Are Your Staff Members Viewing Porn In Your Home?

A recent global survey of 1580 workers revealed that they are likely to visit inappropriate sites at work, even though they are fully aware of the risks to their employer.

Six percent visit pornographic websites on work devices. Pornography is one of the most common sources of malware and malicious content.

Overall, 65 percent of respondents said they know that using a new application that has not been approved by IT poses a risk, yet 26 percent do it anyway. The fact that staff tend to ignore cyber risks while at work leaves both organizational and personal data vulnerable to cybercrime. "Surfing porn, downloading apps: Employees ignore obvious cyber risks at work," (Jun. 02, 2015).

Commentary and Checklist

A family household setting may cause staff members to be unconcerned about their Internet usage, thinking they can get away with more because they are outside of an “office” setting. Unfortunately, staff members taking more risks in their cyber activity results in even bigger risks for family employers.

Establishing boundaries is important. First, limit household Wi-Fi for work only.

Second, if you do allow use of social media, clearly state that staff may not post personal information about you or your family on their pages, and that doing so will be grounds for discipline. Remind staff that this includes posting information about their own whereabouts if they are accompanying you or your children. 

Train all staff on these Internet usage best practices:

  • Never use a work device to visit unauthorized Internet sites, even outside of the workplace and off the clock.
  • Never post sensitive information that could be exploited by hackers online.
  • There is no expectation of privacy regarding communications on employer-owned devices or networks, or information posted on blogs, social networking sites, and any other public platforms.
  • Do not click on any links or open any attachments sent in emails unless you are certain what it is-even if the email is sent from someone you know, a hacker could have accessed the email account.
  • Only download and install software from trusted websites, and avoid downloading free online software.
  • Set the browser security settings on work devices to detect unauthorized downloads.
  • Never click on any links in a pop-up window, and always close it by clicking the "X" in the title bar. Install a pop-up blocker on work computers.
  • Never download software in response to an unexpected pop-up, especially if it claims to have detected malware on your computer.
  • Do not let others use your work computer or devices.
  • Back-up your data regularly to prevent lost data if the computer is infected with malware and crashes.
Finally, your opinion is important to us. Please complete the opinion survey: