Bill Carey: HR’s role in enforcing good workplace cyber security practices

-

Cybercrime is a growing concern for companies of all sizes, with hacking and data breaches now a common occurrence in the business world.

The severity of individual cyber-attacks varies greatly, but the impact on business is almost always damaging. First there is the wasted time and financial cost that results from an incident such as this, with normal business suspended until the situation can be resolved. Then there is the need for businesses to redouble their security efforts to ensure that there are no more points of vulnerability in their IT network.

But potentially even more harmful is the damage to an organisation’s credibility. If a company gains a reputation for being unable to store its customers’ information securely, the campaign to win back consumer trust becomes enormously difficult.

HR professionals have a critical role to play in building their business’ defences against an attack. The HR department tends to deal primarily with policy development and implementation, so putting in place and enforcing an effective cyber security policy can and should be an important extension of its existing function.

HRreview Logo

Get our essential weekday HR news and updates.

This field is for validation purposes and should be left unchanged.
Keep up with the latest in HR...
This field is hidden when viewing the form
This field is hidden when viewing the form
Optin_date
This field is hidden when viewing the form

 

Understanding vulnerabilities

The first step in responding to the growing prospect of cyber-attack is having an understanding of the types of threats that your company could face. In this new era of cybercrime, key vulnerabilities for businesses lie primarily in three places: the “bring your own device” (BYOD) trend, cloud computing, and weak passwords.

In the case of BYOD, the rapidly growing trend of employees using personal devices for business purposes, there is a worrying possibility of company cyber security policies being undermined.

Many managers are keen to capitalise on the increased productivity and operational agility that BYOD can bring to their business. But it is also a key area of vulnerability for businesses, as employees are in charge of keeping software up-to-date and using effective security practices.

This makes it especially difficult for companies to maintain any substantial level of oversight. If your employees use their own smartphones and tablets to access company IT systems, it is important to make sure that they do so in a secure manner.

Cloud computing is another consideration for HR professionals when developing their company cyber security policy.

Small companies are increasingly looking to adopt cloud computing, as it can help them to scale up quickly while at the same time save on infrastructure costs. While cloud computing doesn’t come with inherent danger, as with any shift in business technology, moving to the cloud creates new vulnerabilities for companies to bear in mind.

Ultimately, the best way to address the potential complications that cloud computing can bring is simply to ensure that your cloud provider is reliable and safe, and make sure that applications are as secure as they can be.

Passwords, meanwhile, remain the most important line of defence against hackers, as well as the most vulnerable point of entry into a company’s computer system.

Weak passwords, like those containing dictionary words and all lowercase letters, can be breached in a matter of minutes. The best way to pre-empt this threat is for businesses to train their employees on how to create strong passwords, and encourage them to change passwords regularly.

A password management tool can also help to maintain a secure IT network, by creating and changing employees’ passwords automatically.

Establishing good cyber security practice right from the start

Making cyber security part of your induction or on-boarding for staff can prove extremely beneficial in combatting vulnerabilities and encouraging responsible behaviour right from the start.

Effective cyber security training should teach employees how to create strong passwords, avoid phishing or keylogger scams, and ensure that their personal devices are protected against malware and viruses if they are going to be used in a business context.

Once your staff have received the appropriate level of training, the next step is to ensure that they are held accountable.

An effective approach is to produce a written cyber security policy manual, and ask your employees to sign a document confirming that they have read it, and will abide by its guidelines for company-owned equipment, as well as personal devices that are used for work.

This step will indicate that you take cyber security seriously, as well as emphasising that you expect staff to follow company policies on cyber security both on their home and work devices. As long as staff have been adequately trained and educated in your organisation’s cyber security policy, they should have no complaints about this request.

Bringing employees with you

While individual departments within the business may come up with their own versions of security policies, HR is in the privileged position of being able to centralise the company’s approach and apply it consistently. This allows a company to improve its risk management strategy, and deal with threats more effectively.

Ultimately, though, a cyber security policy is only as good as the number of employees who truly buy into the idea, and work to put it into practice. For policies to be ef­fective, it is important that leaders of departments understand how important it is to gain employee buy-in.

Arguably HR’s most important role is to encourage executives to champion cyber security and model good behaviour for employees. This concept of leading by example will hopefully result in a positive change in employee mind sets.

Experience shows that developing an effective cyber security policy, training staff in that policy and holding them accountable can be highly effective in the fight against cybercrime.  HR professionals can add value by making sure that this happens – protecting data, devices and their company’s reputation.

Bill Carey is Vice President of Marketing & Business Development at Siber Systems Inc., which offers the top-rated RoboForm Password Manager solution. Find out more about RoboForm at http://www.roboform.com/

Latest news

Transgender staff excluded from single-sex toilets under new equality guidance

Transgender people must be excluded from single-sex toilets and changing rooms that correspond with their lived gender under updated...

Simon Coker: Closing the emotional gap – why AI in the workplace is as much a human challenge as a technological one

AI adoption is transforming how work gets done across every sector. But its deeper impact is less visible: it is reshaping how people feel about their work.

Employment tribunal delays stretch towards 2030 as lawyers warn system is nearing collapse

Employment tribunal hearings are being delayed for years as lawyers warn mounting backlogs are undermining workplace justice.

Keeping culture and purpose at the centre of a growing fintech

A fintech people leader explains how culture, wellbeing and purpose are being protected during rapid business growth.
- Advertisement -

Migrant worker with no right to work in UK wins discrimination case against employer

An employment tribunal has ruled that a migrant worker without the legal right to work in Britain can still pursue successful discrimination claims.

Government to replace some GP sick notes with return-to-work plans

Workers in four English regions will be directed towards personalised health and employment support as ministers test alternatives to GP-issued fit notes.

Must read

Bryan Adams: The shocking price of poor candidate experience

Amidst these swirling winds, recruiters are forced to invest more time, energy and creativity for opportunities to resonate with a new generation of candidate. With change abound, HR and recruitment professionals have struggled to offer outstanding candidate experience that cuts through the noise.

Jane Sunley: How to create a great leader

Leadership isn’t just about the inspirational and visionary CEO. To the person on the front line, their manager is the leader, exemplifying what the company is all about. Therefore, organisations must create leaders at all levels, starting with those who directly influence the most people, which, for many, will be the marzipan middle management layer.
- Advertisement -

You might also likeRELATED
Recommended to you