Items Tagged with "Employees"


65be44ae7088566069cc3bef454174a7

Messaging Misjudgments Kill Careers

June 25, 2012 Added by:Rebecca Herold

Personal and explicit messages sent through business systems could very well become widely known to the public in a very damaging and humiliating way. There are many e-discovery and open records laws that provide access to business email systems. You can ruin your business, and possibly personal life...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Breaking the Enigma Code: Creating a Functioning Compliance Culture

June 25, 2012 Added by:Thomas Fox

New York Times reporter Adam Bryant recently profiled Angie Hicks, one of the co-founders of Angie’s List, who has some interesting observations on leadership that I found applicable to creating a functional compliance effort within an organization, from compliance professionals to ethical leadership...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Save Your Photos from a BYOD Security Policy

June 24, 2012 Added by:Brent Huston

One of the more common rules is to enable the remote wipe and lock feature. This means that if your device was ever stolen or compromised, the IT department can remotely lock the device and then wipe any data from it. And yes, that would include all of your photos as well as other items...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats Confound Enterprise Security Efforts

June 20, 2012 Added by:Headlines

"The majority of staff within any organization are trustworthy and honest. But businesses must understand the scale of the threat posed by the small proportion of staff who act dishonestly and defraud their employer and the numerous ways in which an organization can be targeted"...

Comments  (1)

02a6d0efd54c7388e26f125d8df83671

Is BYOD a Nightmare for IT Security or a Dream Come True?

June 19, 2012 Added by:Megan Berry

While you still may be debating whether or not to allow employees to use their own smartphones or tables for work, many organizations realize that they may not have a choice. Though it may seem that the risks of unsecured devices are a security nightmare, with the right tools, companies can work BYOD to their advantage...

Comments  (24)

A88973e7d0943d295c99820ab9aeed27

Fashionable But Vulnerable: Mobile Devices in the Workplace

June 12, 2012 Added by:Simon Heron

Mobile devices are contributing to improved efficiency and are undoubtedly popular with employees, but they are also inherently vulnerable. To minimise the risks, organisations must develop specific mobile device management policies – and then enforce them...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Pink Floyd’s "The Wall" and Compliance

June 12, 2012 Added by:Thomas Fox

Compliance: One of the most important things is that sometimes you just hit a brick wall. You can carefully plan a strategy, implement the planned strategy and then measure the results, but it can still fall completely flat. In other words, you hit the proverbial wall...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

How and Why to Alert Your Employees of the LinkedIn Breach

June 07, 2012 Added by:Jason Clark

Cyber security teams should send out an employee alert explaining why LinkedIn passwords need to be changed and best practices for doing so. You may not have direct IT control over individual LinkedIn accounts, but your communication may alleviate social engineering attacks on employees and your network...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Awareness Training for Employees

June 07, 2012

Security awareness training can be a bit dull and boring, so we commonly try to come up with ways on how to make it a more engaging topic for our audience. But do we end up patronizing them with gimmicks and child-like messages?

Comments  (0)

37d5f81e2277051bc17116221040d51c

IT Security: Preventing Insider Threats

May 24, 2012 Added by:Robert Siciliano

An employee at Fannie Mae, knowing he is about to be fired, installed a logic bomb set to detonate almost 3 months after his departure. The detonation would have taken the organization off line for almost a week and cost millions and millions of dollars...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

BYOD - It's a Personal Matter

May 16, 2012 Added by:Phil Klassen

When you own something, especially a mobile device, there is a sense of entitlement that the individual has. So it's critical that you establish the fact that using a personal device to do company business is a privilege, not a right, and that privilege can be taken away...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance of Combating the Insider Threat

May 15, 2012 Added by:Infosec Island Admin

The thief who is harder to detect and who could cause the most damage is the insider — the employee with legitimate access. They may steal solely for personal gain or be a “spy”—someone who is stealing company information or products in order to benefit another organization or country...

Comments  (0)

Da9f2c6651b84f7db75ae55d6e372103

Securing Your Company Against BYOD-Created Threats

May 14, 2012 Added by:Ashley Furness

The increasing emergence of Bring Your Own Device (BYOD) policies has both good and bad implications. Here are four strategies your company should implement to keep data secure while supporting employees' choice to use their own laptops, smartphones and tablets in the workplace...

Comments  (3)

59d9b46aa00c70238bb89056cfeb96c0

Turn Compliance Beliefs Into Action: Impact Tone at the Bottom

May 11, 2012 Added by:Thomas Fox

This method is a good way for a compliance practitioner to get at ‘tone at the bottom’. By engaging employees at the level suggested you can find out not only what the employees think about the compliance program but use their collective experience to help design a more effective program...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Ninth Circuit Narrows Computer Fraud and Abuse Act Reach

May 07, 2012 Added by:David Navetta

The crux is the recent application of the Computer Fraud and Abuse Act criminalizing violations of website terms of use and employer restrictions on employee computer uses, stemming in particular from what the statute’s term “exceeds authorized access” does and does not mean...

Comments  (0)

4c22630536d3dc5e345fe1ec0ddc062b

Password Policy: Sharing Passwords

May 02, 2012 Added by:benson dana

I once worked at a place where a senior manager collected the passwords of employees. There had been resistance to giving up this policy, and the excuse was that this unit's mission was unique and that this was necessary. How often does the internal auditor hear this excuse?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »