SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Employee Web Use and Misuse:
Companies, their employees and the Internet
A MessageLabs Whitepaper; October 08
MessageLabs      Internet Use and Misuse                                                               Web misuse can have serious implications for
                                                                                                       your business:
Web Security     Where do you draw the line? Is it okay to send the
                 occasional personal email at work? What about                                         • Reduced productivity. If employees spend their
service gives    a little internet shopping or spending sometime                                         time on a social networking sites such as Facebook,
                 on social networking sites, playing online games,                                       they’re not spending it doing their job.
companies        downloading pirated movies and music, gambling
                 or downloading porn? The internet has created                                         • Security problems. Malware hides on websites
the ability to   new opportunities for mischief and new challenges                                       and can install itself as users browse infected pages.
                 for managers.                                                                           MessageLabs Intelligence reports that the number
monitor and                                                                                              of new, malicious websites blocked each day by
                                                                                                         MessageLabs nearly doubled (91 percent) in just
enforce their    Worldwide worries                                                                       one month with 3,968 new sites intercepted daily.2

internet usage   In today’s office enviornment, employers have a
                                                                                                       • Legal risks. When users download inappropriate
                 relatively new issue to deal with; employees
                                                                                                         material to their computers other employees may
policies.        wasting time online and putting your business at                                        take serious offense which in turn can create legal
                 risk. A large proportion of corporate web traffic                                       liabilities for managers.
                 is non-work related: gambling, music downloads,
                 personal webmail, social networking and even                                          • Wasted bandwidth. Internet connections cost
                 pornography sites.                                                                      money. If half your bandwidth is taken up with
                                                                                                         non-work relatd web traffic, you could potentially
                 According The ePolicy Institute, of the 30% of                                          be paying twice as much as you need to and your
                 bosses who terminated employees for web violations                                      business-critical communications could be running
                 in 2007, 84% cited the viewing, downloading or                                          at half their speed capacity.
                 uploading of pornography and otherwise offensive
                 or inappropriate material as the reason.1                                             • Unlicensed software. When users download and
                                                                                                         install software from the internet, they create a legal
                                                                                                         risk. Software piracy is illegal. If an organization
                                                                                                         uses illegal copies of software, it may face a civil
                                                                                                         suit and company directors risk criminal penalties.
                    Unwanted websites
                                                                                                       • Reputation risk. Social networking can create
                    MessageLabs protects thousands of businesses                                         opportunities for employees to leak confidential
                    from inappropriate web use. Blocked sites fall                                       information or spread damaging rumors online.
                    into the following categories:                                                       Bad behavior by a single employee can reflect on
                                                                                                         the reputation of the whole organization.
                    Categories                              Most Blocked Sites
                    Advertisements & popups                                    44.5%                  Blocking non-business internet
                    Chat                                                       28.3%                  access
                                                                                                      In the face of all these problems, many managers’
                    Streaming media                                              4.7%
                                                                                                      first reaction might be to block all employee access
                    Unclassified                                                 4.0%                 to the internet.

                    Games                                                        3.2%                 It makes sense to block certain sites outright.
                    Downloads                                                    2.0%                 Pornography sites are an obvious example, but most
                                                                                                      companies may also consider gambling and game sites
                    Personals and dating                                         1.9%                 as utterly unrelated to work, potentially time-wasting and
                                                                                                      block them as well. Ninety-six percent of employers
                    Adult/sexually explicit                                      1.8%
                                                                                                      who block web access are concerned about employees
                    Web-based email                                              1.7%                 visting adult sites with sexual content. Companies also
                                                                                                      use URL blocks to stop users from visiting game sites
                    Blogs and forums                                             1.2%                 (61%), social networking sites (50%), entertainment
                    Source: MessageLabs Intelligence, July 2008
                                                                                                      sites (27%) ; sports sites (21%) and external blogs
                                                                                                      (18%) according to the 2007 Electronic Monitoring
                                                                                                      & Surveillance Survey from American Management
                                                                                                      Association and The ePolicy Institute.3

                 1 NotJust Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute
                 2 MessageLabs   Intelligence Report July 2008: www. Messagelabs.com/resources/mlireports
                 3 2007 Electronic Monitoring and Surveillance Survey from American Management Association and The ePolicy Institute. Survey results available at www.epolicyinstitute.com




      2          WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet
However, completely blocking internet access may not
be the right approach for your business.
                                                                                         When thinking about employee internet access and
                                                                                         your company’s well-being, consider the following:
                                                                                                                                                        MessageLabs
                                                                                                                                                         service brings
                                                                                         • Do I have a solution in place that can effectively
Monitoring employee behavior online                                                        block web-born malware, viruses and spyware?                 site monitoring
Monitoring inappropriate use may seem to be the
lesser of two evils compared with blocking access to
                                                                                         • Does my solution allow me to create web                   and URL filtering
                                                                                         	 filtering	and	monitoring	rules	for	different	groups	
large parts of the internet. Having blocked the worst
websites, you may wish to trust your employees’
                                                                                         	 or	employees?	How	flexible	is	my	solution?		                   together with
judgement. You may want to allow employees                                               •	 Have	I	clearly	defined	a	written	Web	Acceptable	          industry leading
access to social networking sites if it means that                                          Usage Policy?
they can organize their social life without spending                                                                                                     anti-virus and
hours on the phone. You might also allow people                                          In the end, it comes down to choice. Where do you
to shop online if it saves them time and lets them                                       draw the line? How do you balance individual access              anti-spyware
achieve a better work-life balance.                                                      with the overall protection and good of the business?
                                                                                         What is the correct balance between monitoring and
                                                                                                                                                             protection.
Keep in mind, when you decide to allow employees                                         blocking? There is no right answer. It varies from
access to the internet, it is in your best interest                                      company to company. But there is, perhaps, a right
to ensure that they are aware of the laws around                                         way to go about it.
electronic communications in the workplace. The
federal Electronic Communications Privacy Act
(ECPA) makes it clear that a company-provided                                            Our Solution: MessageLabs Web
computer system is the property of the employer.
U.S. employers have the legal right to monitor all
                                                                                         Security Service
employee computer activity, transmissions and                                            Because the MessageLabs service operates in
content- including incoming, outgoing and internal                                       the company’s network of data centers, there is no
email messages, as well as web surfing, downloads                                        hardware to buy, no hefty up-front capital costs, no
and uploads. Making sure your employees are                                              ongoing upgrades or maintenance and no software
aware of the laws surrounding internet usage may                                         licences; just a predictable per-user fee.
encourage them to use better judgement when
surfing the net.                                                                         From a single portal, managers can set up policies
                                                                                         – blocking sites individually or by category. They can
                                                                                         also set different policies for different types of users.
Policy matters                                                                           The same ClientNet portal gives managers detailed
It’s clear that blocking or monitoring web use requires                                  reports on internet use in their company. In addition
careful thought. Any decision needs to be backed up                                      to policy management, Skeptic™ technology gives
by a clear, acceptable usage policy for the internet.                                    MessageLabs a unique – and powerful – way to
The MessageLabs sponsored whitepaper, Not Just                                           protect its clients against web-born malware. When
Words: Enforce Your Email and Web Acceptable                                             your employees ask for a web page, the request goes
Usage Policies (AUP), written by The ePolicy                                             through our system first so we can scan the page for
Institute, is a good resource to help determine what                                     malware and check it against your company policies.
should be covered in your AUP.
                                                                                         The MessageLabs Web Security service gives
Each company has its own ethos. Some managers                                            companies the ability to monitor and enforce
may take a more laissez-faire approach while others                                      their internet usage policies; whether they are
want to lock everything down. Some people need full                                      very restrictive or very liberal, whether they favor
access to the web and companies may wish to give                                         monitoring or blocking. MessageLabs service brings
some departments or individuals more latitude than                                       site monitoring and URL filtering together with industry
others. A good example is your Human Resources                                           leading anti-virus and anti-spyware protection. As
department who might use Facebook or Linkedin for                                        the world wide web becomes an increasingly more
recruiting purposes. The use of social networking                                        important business tool, companies need the best
sites may be suitable in that capacity, but your                                         possible solution to help protect their computer
Finance department may not have a work-related                                           systems, their reputation and their employees.
use for such sites.                                                                      MessageLabs delivers those tools.

                                                                                         For more informaiton or to sign up for a FREE Trial,
                                                                                         please visit www.messagelabs.com/trials/free_web.




4 Not   Just Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute

WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet                                                                     3
www.messagelabs.com
                         usinfo@messagelabs.com
                         TOLL FREE 866-460-0000


                         Americas                                             Europe
                         AMERICAS	HEADQUARTERS                                HEADQUARTERS
                         512 Seventh Avenue                                   1270 Lansdowne Court
                         6th Floor                                            Gloucester Business Park
                         New York, NY 10018                                   Gloucester, GL3 4AB
                         USA                                                  United Kingdom
                         T +1 646 519 8100                                    T +44 (0) 1452 627 627
                         F +1 646 452 6570                                    F +44 (0) 1452 627 628

                         CENTRAL	REGION                                       LONDON
                         7760 France Avenue South                             40 Whitfield St
                         Suite 1100                                           London WIT 2RH
                         Bloomington, MN 55435                                United Kingdom
                         USA                                                  T +44 (0) 207 291 1960
                         T +1 952 830 1000                                    F +44 (0) 207 291 1937
                         F +1 952 831 8118
                                                                              NETHERLANDS
                         Asia	Pacific                                         Teleport Towers
                         HONG	KONG                                            Kingsfordweg 151
                         1601                                                 1043 GR
                         Tower II                                             Amsterdam
                         89 Queensway                                         Netherlands
                         Admiralty                                            T +31 (0) 20 491 9600
                         Hong Kong                                            F +31 (0) 20 491 7354
                         T +852 2111 3650
                         F +852 2111 9061                                     BELGIUM	/	LUXEMBOURG
                                                                              Culliganlaan 1B
                         AUSTRALIA                                            B-1831 Diegem
                         Level 14                                             Belgium
                         90 Arthur Street                                     T +32 (0) 2 403 12 61
                         North Sydney                                         F +32 (0) 2 403 12 12
                         NSW 2060
                         Australia                                            DACH
                         T +61 2 9409 4360                                    Feringastraße 9
                         F +61 2 9955 5458                                    85774 Unterföhring
                                                                              Munich
                         SINGAPORE                                            Germany
                         Level 14                                             T +49 (0) 89 189 43 990
                         Prudential Tower                                     F +49 (0) 89 189 43 999
                         30 Cecil Street
                         Singapore 049712
                         T +65 6232 2855
                         F +65 6232 2300



www.messagelabs.com
                         ©2008 MessageLabs Inc. All Rights Reserved. MessageLabs and the MessageLabs logo are registered trademarks and Be certain is a trademark of
usinfo@messagelabs.com   MessageLabs Ltd. and its affi liates in the United States and/or other countries. Other products, brands, registered trademarks and trademarks are
© MessageLabs 2008       property of their respective owners/companies. WP_WEBUSE_1108



                         WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet

Contenu connexe

Tendances

Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approachlinkedinlion11
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009ITbyTheSea
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008coniecto
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Facebook, Youtube At Work
Facebook, Youtube At WorkFacebook, Youtube At Work
Facebook, Youtube At WorkRaju Nair
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyTifanija
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Osterman Research, Inc.
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media RecruitingBullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media RecruitingSteven Duque
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSAmazon Web Services
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]DeepNines Technologies
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 

Tendances (20)

Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approach
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Cyber loofing
Cyber loofingCyber loofing
Cyber loofing
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Online Safety
Online Safety Online Safety
Online Safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Facebook, Youtube At Work
Facebook, Youtube At WorkFacebook, Youtube At Work
Facebook, Youtube At Work
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media RecruitingBullhorn Reach: 2012 Activity Report | Social Media Recruiting
Bullhorn Reach: 2012 Activity Report | Social Media Recruiting
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWS
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 

En vedette

Athens ga halfvolunteerorientation
Athens ga halfvolunteerorientationAthens ga halfvolunteerorientation
Athens ga halfvolunteerorientationSean Cook
 
Briscoe B. (1981)
Briscoe B. (1981)Briscoe B. (1981)
Briscoe B. (1981)Jose Luis
 
The Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaThe Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaJoel Drotts
 
Domain tools com-2013-07-10
Domain tools com-2013-07-10Domain tools com-2013-07-10
Domain tools com-2013-07-10avicp
 
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniorsMobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniorsMobilis Conférence
 
Bardziej produktywny gmail
Bardziej produktywny gmailBardziej produktywny gmail
Bardziej produktywny gmailTomasz Bak
 
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural GasMobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural GasMobilis Conférence
 
Mobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applicationsMobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applicationsMobilis Conférence
 
Creating engaging environments in EC
Creating engaging environments in ECCreating engaging environments in EC
Creating engaging environments in ECrpolan
 
Instructions for hatching eggs
Instructions for hatching eggsInstructions for hatching eggs
Instructions for hatching eggsrpolan
 
Rails tobak2005
Rails tobak2005Rails tobak2005
Rails tobak2005Tomasz Bak
 
How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?Tomasz Bak
 
JavaScript Promises
JavaScript PromisesJavaScript Promises
JavaScript PromisesTomasz Bak
 
Working with npm packages
Working with npm packagesWorking with npm packages
Working with npm packagesTomasz Bak
 
Building scientific inquiry
Building scientific inquiryBuilding scientific inquiry
Building scientific inquiryrpolan
 

En vedette (20)

Athens ga halfvolunteerorientation
Athens ga halfvolunteerorientationAthens ga halfvolunteerorientation
Athens ga halfvolunteerorientation
 
Briscoe B. (1981)
Briscoe B. (1981)Briscoe B. (1981)
Briscoe B. (1981)
 
The Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaThe Strategic American Issue One: Business in America
The Strategic American Issue One: Business in America
 
Domain tools com-2013-07-10
Domain tools com-2013-07-10Domain tools com-2013-07-10
Domain tools com-2013-07-10
 
NKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual ReportNKFM 2006-2007 Annual Report
NKFM 2006-2007 Annual Report
 
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniorsMobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
Mobilis 2008 - B5 : Interfaces hommes/machines pour nos séniors
 
Bardziej produktywny gmail
Bardziej produktywny gmailBardziej produktywny gmail
Bardziej produktywny gmail
 
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural GasMobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
Mobilis 2008 - A4 : High Pressure Direct Injection of Natural Gas
 
Mobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applicationsMobilis 2008 - TR3 : Fuel cells for automotive applications
Mobilis 2008 - TR3 : Fuel cells for automotive applications
 
製茶過程
製茶過程製茶過程
製茶過程
 
Ticket terapia
Ticket terapiaTicket terapia
Ticket terapia
 
Creating engaging environments in EC
Creating engaging environments in ECCreating engaging environments in EC
Creating engaging environments in EC
 
Instructions for hatching eggs
Instructions for hatching eggsInstructions for hatching eggs
Instructions for hatching eggs
 
Rails tobak2005
Rails tobak2005Rails tobak2005
Rails tobak2005
 
How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?How to replace rails asset pipeline with webpack?
How to replace rails asset pipeline with webpack?
 
JavaScript Promises
JavaScript PromisesJavaScript Promises
JavaScript Promises
 
Kerberos
KerberosKerberos
Kerberos
 
Working with npm packages
Working with npm packagesWorking with npm packages
Working with npm packages
 
Building scientific inquiry
Building scientific inquiryBuilding scientific inquiry
Building scientific inquiry
 
sla
slasla
sla
 

Similaire à Web use and misuse

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filterentensys
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 

Similaire à Web use and misuse (20)

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Sophos social-media-wpna
Sophos social-media-wpnaSophos social-media-wpna
Sophos social-media-wpna
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filter
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Data security
 Data security  Data security
Data security
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Web use and misuse

  • 1. Employee Web Use and Misuse: Companies, their employees and the Internet A MessageLabs Whitepaper; October 08
  • 2. MessageLabs Internet Use and Misuse Web misuse can have serious implications for your business: Web Security Where do you draw the line? Is it okay to send the occasional personal email at work? What about • Reduced productivity. If employees spend their service gives a little internet shopping or spending sometime time on a social networking sites such as Facebook, on social networking sites, playing online games, they’re not spending it doing their job. companies downloading pirated movies and music, gambling or downloading porn? The internet has created • Security problems. Malware hides on websites the ability to new opportunities for mischief and new challenges and can install itself as users browse infected pages. for managers. MessageLabs Intelligence reports that the number monitor and of new, malicious websites blocked each day by MessageLabs nearly doubled (91 percent) in just enforce their Worldwide worries one month with 3,968 new sites intercepted daily.2 internet usage In today’s office enviornment, employers have a • Legal risks. When users download inappropriate relatively new issue to deal with; employees material to their computers other employees may policies. wasting time online and putting your business at take serious offense which in turn can create legal risk. A large proportion of corporate web traffic liabilities for managers. is non-work related: gambling, music downloads, personal webmail, social networking and even • Wasted bandwidth. Internet connections cost pornography sites. money. If half your bandwidth is taken up with non-work relatd web traffic, you could potentially According The ePolicy Institute, of the 30% of be paying twice as much as you need to and your bosses who terminated employees for web violations business-critical communications could be running in 2007, 84% cited the viewing, downloading or at half their speed capacity. uploading of pornography and otherwise offensive or inappropriate material as the reason.1 • Unlicensed software. When users download and install software from the internet, they create a legal risk. Software piracy is illegal. If an organization uses illegal copies of software, it may face a civil suit and company directors risk criminal penalties. Unwanted websites • Reputation risk. Social networking can create MessageLabs protects thousands of businesses opportunities for employees to leak confidential from inappropriate web use. Blocked sites fall information or spread damaging rumors online. into the following categories: Bad behavior by a single employee can reflect on the reputation of the whole organization. Categories Most Blocked Sites Advertisements & popups 44.5% Blocking non-business internet Chat 28.3% access In the face of all these problems, many managers’ Streaming media 4.7% first reaction might be to block all employee access Unclassified 4.0% to the internet. Games 3.2% It makes sense to block certain sites outright. Downloads 2.0% Pornography sites are an obvious example, but most companies may also consider gambling and game sites Personals and dating 1.9% as utterly unrelated to work, potentially time-wasting and block them as well. Ninety-six percent of employers Adult/sexually explicit 1.8% who block web access are concerned about employees Web-based email 1.7% visting adult sites with sexual content. Companies also use URL blocks to stop users from visiting game sites Blogs and forums 1.2% (61%), social networking sites (50%), entertainment Source: MessageLabs Intelligence, July 2008 sites (27%) ; sports sites (21%) and external blogs (18%) according to the 2007 Electronic Monitoring & Surveillance Survey from American Management Association and The ePolicy Institute.3 1 NotJust Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute 2 MessageLabs Intelligence Report July 2008: www. Messagelabs.com/resources/mlireports 3 2007 Electronic Monitoring and Surveillance Survey from American Management Association and The ePolicy Institute. Survey results available at www.epolicyinstitute.com 2 WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet
  • 3. However, completely blocking internet access may not be the right approach for your business. When thinking about employee internet access and your company’s well-being, consider the following: MessageLabs service brings • Do I have a solution in place that can effectively Monitoring employee behavior online block web-born malware, viruses and spyware? site monitoring Monitoring inappropriate use may seem to be the lesser of two evils compared with blocking access to • Does my solution allow me to create web and URL filtering filtering and monitoring rules for different groups large parts of the internet. Having blocked the worst websites, you may wish to trust your employees’ or employees? How flexible is my solution? together with judgement. You may want to allow employees • Have I clearly defined a written Web Acceptable industry leading access to social networking sites if it means that Usage Policy? they can organize their social life without spending anti-virus and hours on the phone. You might also allow people In the end, it comes down to choice. Where do you to shop online if it saves them time and lets them draw the line? How do you balance individual access anti-spyware achieve a better work-life balance. with the overall protection and good of the business? What is the correct balance between monitoring and protection. Keep in mind, when you decide to allow employees blocking? There is no right answer. It varies from access to the internet, it is in your best interest company to company. But there is, perhaps, a right to ensure that they are aware of the laws around way to go about it. electronic communications in the workplace. The federal Electronic Communications Privacy Act (ECPA) makes it clear that a company-provided Our Solution: MessageLabs Web computer system is the property of the employer. U.S. employers have the legal right to monitor all Security Service employee computer activity, transmissions and Because the MessageLabs service operates in content- including incoming, outgoing and internal the company’s network of data centers, there is no email messages, as well as web surfing, downloads hardware to buy, no hefty up-front capital costs, no and uploads. Making sure your employees are ongoing upgrades or maintenance and no software aware of the laws surrounding internet usage may licences; just a predictable per-user fee. encourage them to use better judgement when surfing the net. From a single portal, managers can set up policies – blocking sites individually or by category. They can also set different policies for different types of users. Policy matters The same ClientNet portal gives managers detailed It’s clear that blocking or monitoring web use requires reports on internet use in their company. In addition careful thought. Any decision needs to be backed up to policy management, Skeptic™ technology gives by a clear, acceptable usage policy for the internet. MessageLabs a unique – and powerful – way to The MessageLabs sponsored whitepaper, Not Just protect its clients against web-born malware. When Words: Enforce Your Email and Web Acceptable your employees ask for a web page, the request goes Usage Policies (AUP), written by The ePolicy through our system first so we can scan the page for Institute, is a good resource to help determine what malware and check it against your company policies. should be covered in your AUP. The MessageLabs Web Security service gives Each company has its own ethos. Some managers companies the ability to monitor and enforce may take a more laissez-faire approach while others their internet usage policies; whether they are want to lock everything down. Some people need full very restrictive or very liberal, whether they favor access to the web and companies may wish to give monitoring or blocking. MessageLabs service brings some departments or individuals more latitude than site monitoring and URL filtering together with industry others. A good example is your Human Resources leading anti-virus and anti-spyware protection. As department who might use Facebook or Linkedin for the world wide web becomes an increasingly more recruiting purposes. The use of social networking important business tool, companies need the best sites may be suitable in that capacity, but your possible solution to help protect their computer Finance department may not have a work-related systems, their reputation and their employees. use for such sites. MessageLabs delivers those tools. For more informaiton or to sign up for a FREE Trial, please visit www.messagelabs.com/trials/free_web. 4 Not Just Words: Enforce Your Email and Web Acceptable Usage Policies ; Author Nancy Flynn, Director, The ePolicy Institute WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet 3
  • 4. www.messagelabs.com usinfo@messagelabs.com TOLL FREE 866-460-0000 Americas Europe AMERICAS HEADQUARTERS HEADQUARTERS 512 Seventh Avenue 1270 Lansdowne Court 6th Floor Gloucester Business Park New York, NY 10018 Gloucester, GL3 4AB USA United Kingdom T +1 646 519 8100 T +44 (0) 1452 627 627 F +1 646 452 6570 F +44 (0) 1452 627 628 CENTRAL REGION LONDON 7760 France Avenue South 40 Whitfield St Suite 1100 London WIT 2RH Bloomington, MN 55435 United Kingdom USA T +44 (0) 207 291 1960 T +1 952 830 1000 F +44 (0) 207 291 1937 F +1 952 831 8118 NETHERLANDS Asia Pacific Teleport Towers HONG KONG Kingsfordweg 151 1601 1043 GR Tower II Amsterdam 89 Queensway Netherlands Admiralty T +31 (0) 20 491 9600 Hong Kong F +31 (0) 20 491 7354 T +852 2111 3650 F +852 2111 9061 BELGIUM / LUXEMBOURG Culliganlaan 1B AUSTRALIA B-1831 Diegem Level 14 Belgium 90 Arthur Street T +32 (0) 2 403 12 61 North Sydney F +32 (0) 2 403 12 12 NSW 2060 Australia DACH T +61 2 9409 4360 Feringastraße 9 F +61 2 9955 5458 85774 Unterföhring Munich SINGAPORE Germany Level 14 T +49 (0) 89 189 43 990 Prudential Tower F +49 (0) 89 189 43 999 30 Cecil Street Singapore 049712 T +65 6232 2855 F +65 6232 2300 www.messagelabs.com ©2008 MessageLabs Inc. All Rights Reserved. MessageLabs and the MessageLabs logo are registered trademarks and Be certain is a trademark of usinfo@messagelabs.com MessageLabs Ltd. and its affi liates in the United States and/or other countries. Other products, brands, registered trademarks and trademarks are © MessageLabs 2008 property of their respective owners/companies. WP_WEBUSE_1108 WHITEPAPER: Employee Internet Use and Misuse: Companies, their employees and the Internet