Skip to main content
  • Personal
  • Business
  • Foundation
    Close
  • Select Region

      Select your region below to see curated info.

    • Global
    • India
    • MENA
  • mySHRM Login
  • MySHRM
    • Dashboard
    • Account
    • Logout
SHRM
  • Membership
    • Membership

      As a SHRM Member®, you’ll pave the path of your success with invaluable resources, world-class educational opportunities and premier events.

      Membership Benefits
      Secure your membership
  • Learning
    • SHRM Certification

      Demonstrate your ability to apply HR principles to real-life situations.

      • Register for the SHRM US Batch
      • Self-Study for your SHRM CP/SCP Certification
      • Book your SHRM CP/SCP Exam
      Prepare for the Exam
      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      Specialty Credentials

      Demonstrate targeted competence and enhance your HR credibility.

      ACHRM
      CEHRM
      AI in HR
      ACE.W
      PMQ
  • Events
    • MENA Events

      Demonstrate your ability to apply HR principles to real-life situations.

      • MENA Annual Conference
      • CEO Academy
      • SHRM Leadership Circle
      Global Events
      • US Annual Conference
  • Resources
    • Resources

      Stay up to date with news and leverage our vast library of resources.

      • Flagships
      • HR Research
      • Tools & Guides
      • Webinars
      HR Topics
      • AI in the Workplace
      • Civility at Work
      • Inclusion & Diversity
      • Talent Acquisition
      • HR Technology
      • Workplace Violence Prevention
  • Partners
Become a Member
Renew
Rejoin Now
Renew
Close
  • Personal
  • Business
  • Foundation
  • Membership
    back
    Membership
    • Membership

      As a SHRM Member®, you’ll pave the path of your success with invaluable resources, world-class educational opportunities and premier events.

      Membership Benefits
      Secure your membership
  • Learning
    back
    Learning
    • SHRM Certification

      Demonstrate your ability to apply HR principles to real-life situations.

      • Register for the SHRM US Batch
      • Self-Study for your SHRM CP/SCP Certification
      • Book your SHRM CP/SCP Exam
      Prepare for the Exam
      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      Specialty Credentials

      Demonstrate targeted competence and enhance your HR credibility.

      ACHRM
      CEHRM
      AI in HR
      ACE.W
      PMQ
  • Events
    back
    Events
    • MENA Events

      Demonstrate your ability to apply HR principles to real-life situations.

      • MENA Annual Conference
      • CEO Academy
      • SHRM Leadership Circle
      Global Events
      • US Annual Conference
  • Resources
    back
    Resources
    • Resources

      Stay up to date with news and leverage our vast library of resources.

      • Flagships
      • HR Research
      • Tools & Guides
      • Webinars
      HR Topics
      • AI in the Workplace
      • Civility at Work
      • Inclusion & Diversity
      • Talent Acquisition
      • HR Technology
      • Workplace Violence Prevention
  • Partners
Become a Member
Renew
Rejoin Now
Renew
  • Select Region

      Select your region below to see curated info.

    • Global
    • India
    • MENA
SHRM
mySHRM Login
  • MySHRM
    • Dashboard
    • Account
    • Logout
Close

  1. Topics & Tools
  2. Workplace News & Trends
  3. 5 Top Cybersecurity Concerns for HR in 2019
Share
  • Linked In
  • Facebook
  • Twitter
  • Email

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus convallis sem tellus, vitae egestas felis vestibule ut.


Error message details.

Copy button
Reuse Permissions

Request permission to republish or redistribute SHRM content and materials.


Learn More
News

5 Top Cybersecurity Concerns for HR in 2019

March 5, 2019 | Dave Zielinski

An image of a padlock on a circuit board.


​Artificial intelligence, bring-your-own-device (BYOD) policies and application programming interfaces that connect disparate HR systems have brought important new benefits to the workforce. But the adoption of these technologies—along with a rise in sophisticated new forms of cyberattack—also has created new risks to the security and privacy of sensitive human resources data.

A December 2018 study from Cambridge, Mass.-based Forrester Research found that 55 percent of enterprise network security decision-makers reported experiencing at least one data breach in the past 12 months. Forty-four percent of the breaches were caused by employees who—intentionally or not—exposed sensitive data to hackers or data thieves.

Security experts say there are a number of data security issues human resource information technology (HRIT) leaders should pay close attention to this year. Here are their tips for minimizing risk.

[SHRM members-only platform: SHRM Connect]

1. Phony Chatbots

Hackers are now creating malicious chatbots that attempt to trick job candidates or employees into clicking links, sharing confidential company data or downloading files, said Marc Laliberte, a senior security analyst with WatchGuard Technologies in Seattle.

In 2016, for example, a bot presenting itself as a "friend" on Facebook conned 10,000 users into installing malware that hijacked the users' Facebook accounts and gained access to their personal and financial data.

"Many chatbots are now used to help recruit, to answer frequently asked questions from employees and for other uses in HR," Laliberte said. "They open up a new avenue for phishing attacks from hackers because they can make fake chatbots pop up on a site and steer unsuspecting users toward giving up sensitive information by tricking them into thinking they're interacting with a company-created bot."

WatchGuard's 2019 Security Predictions study found that hackers primarily use basic text-based chatbots but could go after human speech bots like Google Duplex in the future.

Joe Nocera, leader of the Financial Services Cybersecurity practice at consulting firm PwC in Chicago, said companies should use penetration-testing methods with their AI applications in the same way they look for security vulnerabilities in other technologies. Penetration tests are simulated cyberattacks against your own system to check for exploitable vulnerabilities.

"It helps you understand what can go wrong and how bots react when they are being abused or created for malicious purposes," Nocera said. "That kind of simulation testing is a best practice when it comes to rolling out new bots."

2. Spear Phishing

Laliberte also expects more spear phishing attacks—a practice where e-mails are sent from supposedly known or trusted senders for nefarious purposes—largely because of how successful those methods have been for bad actors.

"Hackers have learned that it's much easier to hack people than to hack technology," Laliberte said. "Hackers may use information from a corporate website or other sources to find out who executives are, for example, and send out very convincing e-mails that can trick employees into giving up sensitive data or lead them into a bogus authentication portal to steal their credentials."

Companies should conduct phishing awareness training for workers, Laliberte said, particularly for those employees who have access to sensitive data.

3. Mobile Malware

Mobile devices will continue to be a top target of hackers' attacks, the Forrester study found.

The trend is rooted in part in poor "vulnerability management" by device manufacturers that cease supporting certain devices when new versions come out or that are slow to make security updates available.

There also continue to be security risks in BYOD policies, although modern security practices have reduced the chance of such dangers. Mobile device management allows companies to add important safeguards to mobile devices that employees use for work, Laliberte said, like data encryption, password enforcement and remote wiping.

The results of Sierra Cedar's 2018-2019 HR Systems Survey revealed that organizations with formal BYOD policies are more likely to employ security processes and technology such as multi-factor authentication (MFA) and remote wiping to protect both employees and the organization from hackers. MFA requires users to present multiple forms of evidence to authenticate their identities before accessing a network; remote wiping technology allows network administrators to send commands to delete stored data if a device is lost or stolen.

4. Internal Risks

Security experts say it's just as important to review employee use of internal systems and software as it is to focus on threats from the external environment. "It's not enough to perform external scans of systems, particularly user systems, because attackers aren't gaining access through exposed network services, but through the software your users use to read e-mail, to surf the web, and open documents," wrote senior data security analyst Josh Zelonis in the Forrester study.

Laliberte said threats can arise from modern features built into software that employees use every day. "There have been times when I've almost accidentally sent an e-mail to the wrong person when using the auto-complete feature in Outlook because I started filling in the name and didn't wait to see the last name pop up," he said. "If there is sensitive information in those misdirected e-mails, it can potentially present a big issue."

5. Balancing Access with Security

HRIT leaders will continue to face the balancing act of ensuring that employees have access to information they need to do their jobs while not exposing any sensitive data in the process. Security practices like data masking, encryption and roles-based access to data can help.

"Employees should only have access to that data they specifically need to complete their job tasks and nothing more," Laliberte said. "I would rather make an employee jump through one extra hoop that takes a small amount of time than run the risk of someone stealing all of my data."

Dave Zielinski is a freelance business writer and editor in Minneapolis.

HR Technology
Privacy & Security Compliance
Risk Management

Was this resource helpful?

Leave Feedback

SHRM-CP Promo Image
Validate your HR expertise

Earning your SHRM-CP credential makes you a recognized expert and leader in the HR field.

Get Certified


Related Content

(opens in a new tab)
News
How One Company Uses Digital Tools to Boost Employee Well-Being

Learn how Marsh McLennan successfully boosts staff well-being with digital tools, improving productivity and work satisfaction for more than 20,000 employees.

(opens in a new tab)
News
A 4-Day Workweek? AI-Fueled Efficiencies Could Make It Happen

The proliferation of artificial intelligence in the workplace, and the ensuing expected increase in productivity and efficiency, could help usher in the four-day workweek, some experts predict.

(opens in a new tab)
News
Rising Demand for Workforce AI Skills Leads to Calls for Upskilling

As artificial intelligence technology continues to develop, the demand for workers with the ability to work alongside and manage AI systems will increase. This means that workers who are not able to adapt and learn these new skills will be left behind in the job market.

HR Daily Newsletter

Stay up to date with the latest HR news, trends, and expert advice each business day.

Success title

Success caption

Manage Subscriptions
Our Brands

SHRM Foundation Logo
SHRM Executive Network Logo
CEO Circle Logo
SHRM Business Logo
SHRM Linkage Logo
SHRM Labs
Overview


  • About SHRM
  • Careers at SHRM
  • Press Room
  • Contact SHRM MENA
  • Ask an Advisor
  • SHRM Newsletter
  • Copyright & Permission
Contact Us


Email: SHRM.MEA@shrm.org
Landline: +971 43649464

SHRM KSA Office (Riyadh)
+966507266968

SHRM UAE Office (Dubai)
+971581101786


© 2026 SHRM. All Rights Reserved
SHRM provides content as a service to its readers and members. It does not offer legal advice, and cannot guarantee the accuracy or suitability of its content for a particular purpose. Disclaimer

Follow Us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

  1. Your Privacy Choices

  2. Terms of Use

  3. Accessibility

Join SHRM for Exclusive Access to Professional Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member? Login
Free Article

Login to unlock unlimited access or join SHRM today to get unlimited access to articles and member-exclusive resources.

Already a member? Login
Limit Reached

You've reached the limit of 1 free article this month. Join to access unlimited articles and member-only resources.

Already a member? Login
Free Article

Login to unlock unlimited access or join SHRM today to get unlimited access to articles and member-exclusive resources.

Already a member? Login
Exclusive Executive-Level Content

You've reached the limit of 1 free article this month. Join the Executive Network and enjoy unlimited content.

Already a member? Login
Unlock Your Career with SHRM Membership

Please enjoy this free resource! Join SHRM for unlimited access to exclusive articles and tools.

Already a member? Login
Join SHRM for Exclusive Access to Professional Premium Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member? Login
Join SHRM for Exclusive Access to Student Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member? Login
Join SHRM for Exclusive Access to Executive Network Content

SHRM member enjoys unlimited access to articles and exclusive member resources.

Already a member? Login

Your membership is almost expired! Renew today for unlimited access to member content.

Renew now

Your membership has expired. Renew today for unlimited access to member content.

Renew Now

Your Executive Network membership is nearing its expiration. Renew now to maintain access.

Renew Now

Your membership has expired. Renew your Executive Network benefits today.

Renew Now