How Hiring An Internet Addict Can Jeopardize Your Company

0
220

A newly coined term, cyberloafing, aptly describes people who engage in this practice. Cyberloafers is using a work computer to surf the Internet, effectively stealing time from their employer. Most employers don’t mind if an employee checks their nanny cam or checks this home security camera after receiving an alert; this keeps employees focused on their work after being reassured that their home and family is safe.

Serious cyberloafing, which is frequently observes in individuals with an Internet addition, wastes an average of one-quarter of the employees day. The 25 percent loss in productivity is not the worst problem that cyberloafers create; they are a security risk as well.

A recent poll showed that individuals who had Internet addictions and engaged at cyberloafing at work, tended to ignore company cybersecurity protocols. For example, a person with an Internet gambling addiction, especially one who cannot access the Internet in private at home, is more likely to visit questionable gambling websites while at work. Not all Internet addicts are fueling another addiction; using the Internet is their addiction.

People who are addicted to getting online will bypass security protocols, feeling invincible since they go online so often without anything bad happening. Unfortunately, most Internet security campaigns that employers offer fail. Reducing the inappropriate use of company computers is not easy; a seminar or email will not change Internet addict’s behavior. CIOs that create effective cybersecurity programs take their clues from marketers. They create a persuasive message, inspire trust in the message and then explain how an employee who changes his or her behavior will benefit from the change.

Employees are often the greatest cybersecurity threat to a company. Even non-Internet addicts surf the web due to boredom or they need to relieve stress. One way companies have found to deter employees from accessing the Internet for non work related activities is to orient the office so that managers can see employees computer screens easily. This provides more of a deterrent than a flurry of emails about cybersecurity.

SHARE
Previous articleReviews of the Google Home Max are In!
Next articleExecutive Shakeup at Google Sparks Rumors
With over 15 years of experience as a Project Manager for an American company, my ability to translate all types of documents has passed the test of time. With the addition of an extensive background in management and legal, I am able to accommodate covering of news from a broad spectrum of subjects.

LEAVE A REPLY

Please enter your comment!
Please enter your name here