<

!Google ads have two elements of code. This is the 'header' code. There will be another short tag of code that is placed whereever you want the ads to appear. These tags are generated in the Google DFP ad manager. Go to Ad Units = Tags. If you update the code, you need to replace both elements.> <! Prime Home Page Banner (usually shows to right of logo) It's managed in the Extra Theme Options section*> <! 728x90_1_home_hrreview - This can be turned off if needed - it shows at the top of the content, but under the header menu. It's managed in the Extra Theme Options section * > <! 728x90_2_home_hrreview - shows in the main homepage content section. Might be 1st or 2nd ad depending if the one above is turned off. Managed from the home page layout* > <! 728x90_3_home_hrreview - shows in the main homepage content section. Might be 2nd or 3rd ad depending if the one above is turned off. Managed from the home page layout* > <! Footer - 970x250_large_footerboard_hrreview. It's managed in the Extra Theme Options section* > <! MPU1 - It's managed in the Widgets-sidebar section* > <! MPU2 - It's managed in the Widgets-sidebar section* > <! MPU - It's managed in the Widgets-sidebar section3* > <! MPU4 - It's managed in the Widgets-sidebar section* > <! Sidebar_large_1 - It's managed in the Widgets-sidebar section* > <! Sidebar_large_2 - It's managed in the Widgets-sidebar section* > <! Sidebar_large_3 - It's managed in the Widgets-sidebar section* > <! Sidebar_large_4 - It's managed in the Widgets-sidebar section* > <! Sidebar_large_5 are not currently being used - It's managed in the Widgets-sidebar section* > <! Bombora simple version of script - not inlcuding Google Analytics code* >

Bill Carey: HR’s role in enforcing good workplace cyber security practices

-

Cybercrime is a growing concern for companies of all sizes, with hacking and data breaches now a common occurrence in the business world.

The severity of individual cyber-attacks varies greatly, but the impact on business is almost always damaging. First there is the wasted time and financial cost that results from an incident such as this, with normal business suspended until the situation can be resolved. Then there is the need for businesses to redouble their security efforts to ensure that there are no more points of vulnerability in their IT network.

But potentially even more harmful is the damage to an organisation’s credibility. If a company gains a reputation for being unable to store its customers’ information securely, the campaign to win back consumer trust becomes enormously difficult.

HR professionals have a critical role to play in building their business’ defences against an attack. The HR department tends to deal primarily with policy development and implementation, so putting in place and enforcing an effective cyber security policy can and should be an important extension of its existing function.

Understanding vulnerabilities

The first step in responding to the growing prospect of cyber-attack is having an understanding of the types of threats that your company could face. In this new era of cybercrime, key vulnerabilities for businesses lie primarily in three places: the “bring your own device” (BYOD) trend, cloud computing, and weak passwords.

In the case of BYOD, the rapidly growing trend of employees using personal devices for business purposes, there is a worrying possibility of company cyber security policies being undermined.

Many managers are keen to capitalise on the increased productivity and operational agility that BYOD can bring to their business. But it is also a key area of vulnerability for businesses, as employees are in charge of keeping software up-to-date and using effective security practices.

This makes it especially difficult for companies to maintain any substantial level of oversight. If your employees use their own smartphones and tablets to access company IT systems, it is important to make sure that they do so in a secure manner.

Cloud computing is another consideration for HR professionals when developing their company cyber security policy.

Small companies are increasingly looking to adopt cloud computing, as it can help them to scale up quickly while at the same time save on infrastructure costs. While cloud computing doesn’t come with inherent danger, as with any shift in business technology, moving to the cloud creates new vulnerabilities for companies to bear in mind.

Ultimately, the best way to address the potential complications that cloud computing can bring is simply to ensure that your cloud provider is reliable and safe, and make sure that applications are as secure as they can be.

Passwords, meanwhile, remain the most important line of defence against hackers, as well as the most vulnerable point of entry into a company’s computer system.

Weak passwords, like those containing dictionary words and all lowercase letters, can be breached in a matter of minutes. The best way to pre-empt this threat is for businesses to train their employees on how to create strong passwords, and encourage them to change passwords regularly.

A password management tool can also help to maintain a secure IT network, by creating and changing employees’ passwords automatically.

Establishing good cyber security practice right from the start

Making cyber security part of your induction or on-boarding for staff can prove extremely beneficial in combatting vulnerabilities and encouraging responsible behaviour right from the start.

Effective cyber security training should teach employees how to create strong passwords, avoid phishing or keylogger scams, and ensure that their personal devices are protected against malware and viruses if they are going to be used in a business context.

Once your staff have received the appropriate level of training, the next step is to ensure that they are held accountable.

An effective approach is to produce a written cyber security policy manual, and ask your employees to sign a document confirming that they have read it, and will abide by its guidelines for company-owned equipment, as well as personal devices that are used for work.

This step will indicate that you take cyber security seriously, as well as emphasising that you expect staff to follow company policies on cyber security both on their home and work devices. As long as staff have been adequately trained and educated in your organisation’s cyber security policy, they should have no complaints about this request.

Bringing employees with you

While individual departments within the business may come up with their own versions of security policies, HR is in the privileged position of being able to centralise the company’s approach and apply it consistently. This allows a company to improve its risk management strategy, and deal with threats more effectively.

Ultimately, though, a cyber security policy is only as good as the number of employees who truly buy into the idea, and work to put it into practice. For policies to be ef­fective, it is important that leaders of departments understand how important it is to gain employee buy-in.

Arguably HR’s most important role is to encourage executives to champion cyber security and model good behaviour for employees. This concept of leading by example will hopefully result in a positive change in employee mind sets.

Experience shows that developing an effective cyber security policy, training staff in that policy and holding them accountable can be highly effective in the fight against cybercrime.  HR professionals can add value by making sure that this happens – protecting data, devices and their company’s reputation.

Bill Carey is Vice President of Marketing & Business Development at Siber Systems Inc., which offers the top-rated RoboForm Password Manager solution. Find out more about RoboForm at http://www.roboform.com/

Latest news

Turning Workforce Data into Real Insight: A practical session for HR leaders

HR teams are being asked to deliver greater impact with fewer resources. This practical session is designed to help you move beyond instinct and start using workforce data to make faster, smarter decisions that drive real business results.

Bethany Cann of Specsavers

A working day balancing early talent strategy, university partnerships and family life at the international opticians retailer.

Workplace silence leaving staff afraid to raise mistakes

Almost half of UK workers feel unable to raise concerns or mistakes at work, with new research warning that workplace silence is damaging productivity.

Managers’ biggest fears? ‘Confrontation and redundancies’

Survey of UK managers reveals fear of confrontation and redundancies, with many lacking training to handle difficult workplace situations.
- Advertisement -

Mike Bond: Redefining talent – and prioritising the creative mindset

Not too long ago, the most prized CVs boasted MBAs, consulting pedigrees and an impressive record of traditional experience. Now, things are different.

UK loses ground in global remote work rankings

Connectivity gaps across the UK risk weakening the country’s appeal to remote workers and internationally mobile talent.

Must read

Jonathan Firth: getting onboarding right – how to make new hires stick

Done right, onboarding into a new organisation can be the foundation of long-term engagement, performance and retention.

Tom Quayle: The University Challenge: What is a degree worth in 2015?

This year marks the graduation of the first students who had to pay £9,000 a year in tuition fees – and, worryingly, ComRes recently revealed that half of them feel their degrees weren’t worth the money.
- Advertisement -

You might also likeRELATED
Recommended to you

Exit mobile version