Apparently, the well known adage “All work and no play make Johnny a dull boy” isn’t just some excuse to be laid back and take a break from the drudgery of work (hah, drudgery), but is really a fact based on science. At least as far as the fellows from the University of Melbourne in Australia are concerned. A recent study conducted by the University’s Department of Management and Marketing has shown that moderate internet browsing for personal uses during working hours (and MODERATE is the operative term here) actually increases productivity among workers. This a big “Ha! I knew it.” moment for many, with most employers preferring that their employees not be posting new status messages on Facebook or checking out the latest sensation from Britain’s Got Talent from YouTube. Their reasoning being that it wastes company resources and makes employees lazy. 300 employees from different companies were made part of the study, where it was found out that workers who use the internet for personal reasons, called “Workplace Internet Leisure Browsing” or (WILB) in the study, for less than 20 percent of their working hours were 9 percent more effective, focused, and therefore productive in their respective jobs. WILB activities usually encompassed searching for and researching about products to buy online, reading blogs and news websites, social networking (like Facebook, MySpace or Friendster) activities, playing online games, and watching streaming videos from sites like YouTube and Veoh. Professor Brent Coker, the man behind the research, explains that people need short breaks to reset their concentration. According to him, focusing on a certain task for too long degrades the level concentration, making “zoning out” from time to time essential in maintaining an optimal frame of mind to be able to accomplish a work task efficiently. But before you lug your gaming CDs to the office or prepare for marathon runs of your favourite Facebook application, Dr. Coker is quick to remind everyone of the term MODERATE usage. Anything beyond that, he says, will then result in loss of productivity. So don’t feel too guilty when you watch Susan Boyle belt her heart out on YouTube for a couple of minutes or post a comment or two on Facebook. As long as you get right back to work afterward, no harm, no foul.
Continue readingGet Ready for a New Threat: Vishing
Tech-savvy criminals have thought of with a new way of scamming us out of our money. In a twist to “ phishing ” (when spoofed websites are used to trick users into surrendering passwords or credit card numbers), “vishing” is when phone calls using spoofed caller ID numbers hide the identity of the caller and trick people into surrendering sensitive information. Usually, vishing attacks play a recorded message that tells users to call a toll-free number, where they are asked via an automated attendant to punch in a credit card number or other personal information. Attacks are on the rise since with Voice over IP phone technology, caller ID spoofing is very easy to do.Protect yourself by registering your number with the National Do Not Call registry at donotcall.gov . Some criminals and unscrupulous telemarketers may ignore the list, and if you continue to get calls, it’s a tip that the offer is bogus. Contact the authorities immediately if you do get scammed, and always play it safe and don’t surrender your information to unknown sources. Related articles: Can You Trust Your Caller ID? 123Spoof Makes Caller ID Spoofing Easy 9 Simple Ways to Protect Yourself against Internet fraud
Continue readingSocial Media Poses Security Risks
Security company Websense released a survey of of 1,300 IT professionals worldwide revealing that although social media or the use of “Web 2.0″ technologies such as blogs , wikis and social networks are already pervasive in business, a majority of IT managers seem ill equipped to manage its use, much less protect against security concerns associated with it. According to the survey, 70 of the top 100 most popular websites, many of which are social media sites, had hosted malicious content at some point. The study points to 150,000 spoofs of Facebook alone. In addition, 57 percent of data-stealing attacks are conducted over the Web. Because the nature of Web 2.0 sites allow for users to create and post their own content, it’s easy for cyber criminals to gather information and use it for threats, attack or fraud. Though 80 percent of the IT managers surveyed were confident in their company’s Web security, only nine percent said they have the necessary tools to protect against social media threats. If you feel your organization may be at risk, give us a call today – we can help.Related articles: Social Media a Stumbling Block for IT Pros Survey: IT Managers Unprepared for Social Security Risks
Continue reading