{"id":73,"date":"2010-10-15T08:53:34","date_gmt":"2010-10-15T12:53:34","guid":{"rendered":"http:\/\/blog.wavecrestcomputing.com\/?p=73"},"modified":"2011-06-21T10:38:58","modified_gmt":"2011-06-21T14:38:58","slug":"web-use-in-the-workplace-risks-and-solutions","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/","title":{"rendered":"Web Use in the Workplace: Risks and Solutions"},"content":{"rendered":"<p>Approximately <strong>20%<\/strong> of personal Internet use at work  poses potential threats to the employer. Web access in the workplace can  be a valuable business tool, but it also carries significant risks.  Check out our presentation that discusses the risks associated with Web use and why monitoring and filtering helps mitigate those risks.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Approximately 20% of personal Internet use at work poses potential threats to the employer. Web access in the workplace can be a valuable business tool, but it also carries significant risks. Check out our presentation that discusses the risks associated with Web use and why monitoring and filtering helps mitigate those risks. &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[77,11,12,72,37,9,18],"tags":[212,5,261,113,499,497,262,260,259],"class_list":["post-73","post","type-post","status-publish","format-standard","hentry","category-bandwidth-issues","category-cyblock","category-cyfin","category-legal-liability","category-productivity-concerns","category-security-threats","category-wavecrest-computing","tag-bandwidth-consumption","tag-internet-filtering","tag-internet-monitoing","tag-internet-use","tag-legal-liability","tag-security-threats","tag-top-keyword-searches","tag-web-access","tag-web-use-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Web Use in the Workplace: Risks and Solutions - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Use in the Workplace: Risks and Solutions - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Approximately 20% of personal Internet use at work poses potential threats to the employer. Web access in the workplace can be a valuable business tool, but it also carries significant risks. Check out our presentation that discusses the risks associated with Web use and why monitoring and filtering helps mitigate those risks. &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-15T12:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-06-21T14:38:58+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Web Use in the Workplace: Risks and Solutions\",\"datePublished\":\"2010-10-15T12:53:34+00:00\",\"dateModified\":\"2011-06-21T14:38:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\"},\"wordCount\":60,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"keywords\":[\"bandwidth consumption\",\"internet filtering\",\"internet monitoing\",\"internet use\",\"Legal Liability\",\"Security Threats\",\"top keyword searches\",\"web access\",\"web use risks\"],\"articleSection\":[\"Bandwidth Issues\",\"CyBlock\",\"Cyfin\",\"Legal Liability\",\"Productivity Concerns\",\"Security Threats\",\"Wavecrest Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\",\"name\":\"Web Use in the Workplace: Risks and Solutions - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"datePublished\":\"2010-10-15T12:53:34+00:00\",\"dateModified\":\"2011-06-21T14:38:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Use in the Workplace: Risks and Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Use in the Workplace: Risks and Solutions - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Web Use in the Workplace: Risks and Solutions - Wavecrest Blog","og_description":"Approximately 20% of personal Internet use at work poses potential threats to the employer. Web access in the workplace can be a valuable business tool, but it also carries significant risks. Check out our presentation that discusses the risks associated with Web use and why monitoring and filtering helps mitigate those risks. &nbsp;","og_url":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2010-10-15T12:53:34+00:00","article_modified_time":"2011-06-21T14:38:58+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Web Use in the Workplace: Risks and Solutions","datePublished":"2010-10-15T12:53:34+00:00","dateModified":"2011-06-21T14:38:58+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/"},"wordCount":60,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"keywords":["bandwidth consumption","internet filtering","internet monitoing","internet use","Legal Liability","Security Threats","top keyword searches","web access","web use risks"],"articleSection":["Bandwidth Issues","CyBlock","Cyfin","Legal Liability","Productivity Concerns","Security Threats","Wavecrest Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/","url":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/","name":"Web Use in the Workplace: Risks and Solutions - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"datePublished":"2010-10-15T12:53:34+00:00","dateModified":"2011-06-21T14:38:58+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/web-use-in-the-workplace-risks-and-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Web Use in the Workplace: Risks and Solutions"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":1,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"predecessor-version":[{"id":133,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/73\/revisions\/133"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}