1 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Introduction.

Slides:



Advertisements
Similar presentations
IT benchmarking in the UK
Advertisements

TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
LABBEVERATORIO DI SALINARDO Prospetto in scala 1:10.
1 Nia Sutton Becta Total Cost of Ownership of ICT in schools.
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Fill in missing numbers or operations
Slide 1 Insert your own content. Slide 2 Insert your own content.
Orbitz Worldwide at a Glance
0 - 0.
Teacher Name Class / Subject Date A:B: Write an answer here #1 Write your question Here C:D: Write an answer here.
Measuring Online Copyright Infringement Justin Le Patourel Copyright evidence seminar, Friday 13 th September 2013.
1 PLAY 60 Challenge Online Tracker. 2 Introduction The PLAY 60 Challenge Online Tracker is a web based physical activity tracker teachers across the country.
Convergence Technician Survey- 22 responses Does entry-level Convergence Technician add value to your company – 73% yes 27% no Do you employ people with.
Year 6/7 mental test 5 second questions
Problem1; Admission Flow
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Alternative Work Schedules: Training for Supervisors.
Proprietary and Company ConfidentialNovember 5, 2009A.M. Bests IMAS THE MARKETING OF ESURANCE AM BEST COMPANYS 2009 INSURANCE MARKETING & ADVERTISING SUMMIT.
The New ACGME Resident Survey
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
Jobs for Montana's Graduates D25L1PP1. Sara works at a local restaurant. On Saturday she clocked in at 8:15am and clocked out at 11:45pm. Sara earns $7.50.
© Richard A. Medeiros 2004 x y Function Machine Function Machine next.
Enrolling in your group program with Standard Life Express TM Plan for life TM.
Why should I consider Implementing a Document Imaging / Management System? Created by Harold Hegerhorst North American Technology. LLC © North American.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Introduction for University Staff
Gameology Games and Digital Goods Spending Behavior Report July 2011.
Agenda Introduction Situational Analysis Survey Results Keynotes Panel Discussion.
Effects on UK of Eustatic sea Level rise GIS is used to evaluate flood risk. Insurance companies use GIS models to assess likely impact and consequently.
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Side by Side Task Task 1Task 2Task 3Task 4 Task 5Task 6Task 7Task 8 Task 9Task 10 NC Level 4 to 7.
UNIT 2: SOLVING EQUATIONS AND INEQUALITIES SOLVE EACH OF THE FOLLOWING EQUATIONS FOR y. # x + 5 y = x 5 y = 2 x y = 2 x y.
Strategy Review Meeting Strategy Review Meeting
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Welcome Telework Training for Managers. 2 Objectives Review Teleworker selection criteria. Review FLSA applicability to Telework. Review Telework reporting.
1 What is Your Security IQ?. 2 Introduction: Exercise.
Week 1.
Number bonds to 10,
Beat the Computer Drill Divide 10s Becky Afghani, LBUSD Math Curriculum Office, 2004 Vertical Format.
We will resume in: 25 Minutes.
A Fraction of Time next © 2007 Richard A. Medeiros.
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
SOCIAL MEDIA. TODAY Business Today Social Media Importance What is Social Media Social Media Platforms Facebook & Twitter Accounts.
The Internet: SOCIALIZATION vs ISOLATION The Yin and Yang of BEING ONLINE.
Do you know what your employees are doing when they are supposed to be working?
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Social Collaboration Types: – Company blog – Social intranet – Private wiki or forum – IM’s, Facebook, Twitter, LinkedIn, forums, FAQs, open source software,
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Protection from internal threats: Evolution of DLP or Who sets trends.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Social Networking Presentation to Department Heads January 21, 2010.
Independent Broadcasters of Ireland – Consumer Radio Behaviour Survey.
Computer System and Internet Misuse at the Work Place By: Kris Dimon.
MEDIA & COMMUNICATIONS.  More than 800 million Facebook users  Over 100 million Twitter users  64 million LinkedIn users in North America alone  1.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
GOAL: TO UNDERSTAND WHERE SOCIAL NETWORKING SITES CAME FROM AND THE POSITIVE & NEGATIVE IMPACT THEY HAVE ON OUR LIVES. SOCIAL NETWORKING SITES.
DOJ CYBER RISK REPORT 2015 BREACHES & THE CYBER LANDSCAPE CYBER SECURITY? HUH?
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Hawaii Property Management Companies
To spy or not to spy; that is the question
انشاء موقع الكتروني.
Is Technology Derailing Your Performance?
– Communication Technology in a Changing World
E-Safety Survey Results
Lets Talk About Ethics.
Presentation transcript:

1 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Introduction

2 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking What is cyberslacking? a/k/a cyberloafing A way of alleviating boredom… How employees catch up on personal business Using work internet access for personal reasons

3 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Who is cyberslacking? 64% of employees say they use the Internet… 41% admit to personal surfing – over 3 hours a week!

4 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Lost productivity statistics 30-40% of lost productivity is cyberslacking Based on the total Internet access at work - 30 to 40% is non-work related Average worker spends 21 hours/week the office - but only 9.5 hours at home

5 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Lost productivity statistics 60% of all online purchases are made during working hours! 70% of ALL Internet porn traffic occurs during the 9-5 work day!

6 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking What are cyberslackers doing? Facebook, MySpace, Twitter Youtube Chat Personal Shopping…

7 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Other issues to consider 60% of Security breaches are inside jobs Sexual harassment from inappropriate Misuse of or Internet connections Confidential information being sent by unsecured

8 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking What does cyberslacking cost the agency? 15 minutes of cyberslacking per day costs $$$ Cyberslacking Calculator

9 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking One agencys example… 7 days of hits

10 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking A 30 day survey…in stealth mode

11 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Combating Cyberslacking Implement a company policy Monitor and manage the risk Invest Management time Hardware & software controls

12 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Questions?

13 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Panel Discussion