Get access to the exclusive HR Resources you need to succeed in 2018.
Sign up for free email newsletters and get more SHRM content delivered to your inbox.
Is your employee handbook keeping up with the changing world of work? With SHRM's Employee Handbook Builder get peace of mind that your handbook is up-to-date.
Build competencies, establish credibility and advance your career—while earning PDCs—at SHRM Seminars in 14 cities across the U.S. this fall.
Gain the skills you need to rise to the next level in your career. Jon us at SHRM's Leadership Development Forum, October 2-3 in Boston.
If governments can’t stop terrorists, what can HR do to keep companies secure?
Members may download one copy of our sample forms and templates for your personal use within your organization. Please note that all such forms and policies should be reviewed by your legal counsel for compliance with applicable law, and should be modified to suit your organization’s culture, industry, and practices. Neither members nor non-members may reproduce such samples in any other way (e.g., to republish in a book or use for a commercial purpose) without SHRM’s permission. To request permission for specific items, click on the “reuse permissions” button on the page where you find the item.
What the Paris Attacks Mean for the Future of Cybersecurity
Could the terror attacks in Paris, Beirut and Baghdad last week have been prevented with better intelligence? The answer is unknown but it is likely governments now will want access to even more data, citing national security concerns.
Fortune repots, “the horrendous Paris attacks raise a number of national security issues, including one involving cybersecurity, and the debate over whether governments should have easy ways to break through technology that safeguards the privacy of our communications and transactions—all in the name of national security.”
One of the biggest unknowns is how the attackers were able to carry off the Paris attacks, which left nearly 130 people dead and hundreds more injured, while evading detection from government agencies. Experts believe they did so by using over-the-counter encrypted messaging apps, something
SHRM Online warned employers about earlier this year. (Fortune Magazine) and (The New York Times) and
new study, released Nov. 17, 2015 by MarketsandMarkets, the e-mail encryption market is expected to reach 4.21 billion by 2020. Most of that has been brought about by the increase of people using smartphones—especially for work. The Bring Your Own Device trend presented particular challenges for employers. The prevailing thought is that the terrorists used powerful encryption methods when communicating or they used the “dark web,” or no electronic communications at all, to carry out the attacks.
If Governments Can’t Stop Terrorists, What Can HR Do?
We live in uncertain times, certainly. Hackers have even found ways to infect resumes with worms. But experts say there are steps HR professionals can take to keep their corporations and employees safe from the threat of cyber warfare. One is simple: Make sure employees are aware that they are the first line of defense when it comes to data breach. Another is to put workplace policies in place that give employers guidelines on the proper ways to keep their data and work data secure.
Remember Ashley Madison?
Nowhere was that need more telling than during the Ashley Madison data breach over the summer. In one of the most surprising data breaches this year, millions of people had their personal lives exposed after it was discovered they used their work e-mail addresses to register on Ashley Madison, the dating site for married cheaters. A definite no-no, experts said. (SHRM Online)
Joint Training Helps
HR is the “natural choice to train other segments of the workforce” and should “team up with IT to provide joint training,” Philip L. Gordon, a shareholder in the Denver office of Littler and co-chair of the firm’s Privacy and Data Protection Practice Group told
SHRM Online. It’s up to organizations to make certain their employees are following company policies when it comes to data security. (SHRM Online)
You have successfully saved this page as a bookmark.
Please confirm that you want to proceed with deleting bookmark.
You have successfully removed bookmark.
Please log in as a SHRM member before saving bookmarks.
Please sign in as a SHRM member before saving bookmarks.
Please purchase a SHRM membership before saving bookmarks.
An error has occurred
Recommended for you
Choose from dozens of free webcasts on the most timely HR topics.
SHRM’s HR Vendor Directory contains over 10,000 companies