Most infected files these days are downloaded from the Internet. Whether the user is trying to get an application for their job or a new screensaver, downloads which have not been scanned become bad news.
Many Internet downloads contain remote access Trojans or spam mailers, designed to give bad guys access to your data and resources.
3. Cross-site scripting
Even with up-to-date antivirus software, visits to infected websites can steal information by tricking users into filling out forms they think are safe, or presenting them with malicious content.
Complete privacy on the Internet is not practical, but providing your complete web history to advertisers is not a good idea either.
Infected computers often become zombies, reaching out to contact the command and control servers for orders.
6. Spyware and adware
Keyloggers, browsing history, and pop-up ads, are all part of the fun of surfing to the wrong places on the web today.
7. Identity Theft
Many phishing sites ask for personal information in order to assume the identity of the victim.
8. Financial loss
Other phishing sites may be after credit card or bank account details for immediate financial gain.
9. Social engineering
There are sites out there trying to gain usernames and passwords to webmail, online banking, and remote access systems, with which they can access for further nefarious deeds.
What users do at home is their own business; what they do at work could get the company sued.
11. Racial hatred
It’s a shame that in 2011 racism is still rife and this can lead to a hostile work environment suit.
12. Religious intolerance
Much like racial hatred, religious intolerance of any faith has no place at work, and could also lead to a hostile work environment.
13. Alcohol, tobacco and drug related sites
Unless you work in the industry, there is little chance these topics are work related, but if the arise within the workplace, they could cause tension among employees.
Data loss prevention
14. WikiLeaks type sites
The company’s confidential information won’t stay confidential for long if it is posted to a public site and makes the evening news.
Disgruntled employees may think they are harmlessly venting when the rant on a forum, but the company’s reputation may suffer as a result.
Company approved blogs are good; technical blogs are too. But a user blogging at work (unless that’s their job) is wasting time, and might be posting confidential information not yet ready for public release.
17. Instant messaging
An approved corporate IM solution is a valuable communications tool; unrestricted access to public services can present many risks, including IM spam, malicious links and data leakage.
Peer to peer software can be useful, but too often a user shares their entire hard drive, making all the company documents on it available to others.
19. Online storage
If a user needs to store data with an online storage company, that data is now outside the company’s control. You’re not backing it up, searching and indexing it, and you cannot retrieve it if the employee leaves. Unless approved by the company, users should never be allowed to use cloud storage services.
Companies that use DLP solutions on their email system do so to make sure nothing is being emailed that presents a risk, like IP, NPI, or other sensitive data. Letting users access webmail provides them a way around this, and also risks them using personal email for corporate business.
21. Social Networking
Checking their Facebook wall post may sound like a one-minute thing, but this might turn into hours per week as users tend to do other things once there such as commenting on/following their friend’s status updates, images, videos, andso on.
Submitting a bid might take only seconds at the start of an auction, but users can burn hours checking on a long term auction, or staying onto the close to make sure they aren’t outbid.
No need for explanations here, an innocent five minute break to play an online game, might turn into long wasted hours.
Just as in online gaming, but with the added concerns that this could lead to legal issues.
Dating sites can become attention traps, leading a user to spend the entire day checking out their possibilities rather than focusing on their job.
26. Software downloads
Any software a user needs should come from IT, to ensure it is licensed, appropriate for the task, supportable, and doesn’t crash their PC or LOB application.
27. Daytrading and investment sites
Another site that seems harmless at first, until the user spends all morning waiting for the exact moment to buy or sell.
28. Employment sites
If they want to hunt for another job, they really need to do that on their own time.
29. Online shopping
Here’s one you may want to allow a limited amount of access to, especially during the holidays, but you don’t want users to spend all day shopping when they should be working.
30. Torrent sites
Bittorrent is a very useful protocol for distributing ISOs of open source operating systems, but too often it is used to distribute movies and music. This could go under bandwidth crushers, but the bigger risk is that your company gets sued by the MPAA or RIAA.
Unlicensed software can cost a company millions of dollars in fines. If a user needs an application to do their job, make sure that IT is buying it legitimately and licensing it appropriately. The BSA does take legal action.
32. Internet radio
A single user streaming music may not use much bandwidth, but when the entire office is doing it, the total can quickly saturate a pipe.
33. Sporting events
I once worked for a company that only blocked one thing – the NCAA Final Four Basketball Tournament. Every year we had to scramble to block every possible way it could be viewed online because it not only killed productivity, it took out the campus DS3.
34. TV and movie sites
Some folks might be able to work with the TV on in the background; most can’t really work well though, and the amount of aggregate bandwidth several simultaneous streaming movies can consume can quickly use up the entire circuit.
You can argue that anonymizers are only there to protect users’ privacy, but you cannot argue that there is a real reason why they need that while surfing at work. Whatever they are doing online, if they need to use an anonymizer service, it probably isn’t work related.
36. Open proxies
Here’s another case where the likelihood that whatever they are doing is work-related approaches zero. Open proxies really just help you hide your actions or access content that is not licensed for your actual country of origin. In either case, it’s not work related activity.
37. IM portals
If you are blocking instant messaging, the easiest way to get around that is for a user to hit the service’s web portal or one of the many IM aggregation portals that exist. Blocking these helps ensure you are restricting IM access.
Daffodil International University (DIU)