Skip to main content
  • Foundation
  • Executive network
  • CEO Circle
  • Enterprise Solutions
  • Linkage Logo
  • Store
  • Sign In
  • Account
    • My Account
    • Logout
    • Global
    • India
    • MENA
SHRM
About
Book a Speaker
Join Today
Renew
Rejoin Now
Renew
  • Membership
  • Certification
    Certification

    Smiling asian student studying in library with laptop books doing online research for coursework, making notes for essay homework assignment, online education e-learning concept
    Get Certified!

    Be recognized as an HR leader with your SHRM-CP or SHRM-SCP credential.

    • How to Get Certified

      Demonstrate your ability to apply HR principles to real-life situations. No other HR certification compares.

      • How to Get Certified
      • Eligibility Criteria
      • Exam Details and Fees
      • SHRM-CP
      • SHRM-SCP
      • Which Certification is Best for Me
      • Certification FAQs
    • Prepare for the Exam

      Give yourself the best chance to pass your SHRM certification exam.

      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      • Study Aids & Add-ons
    • Recertification

      Recertify your SHRM Credentials before your end date!

      • Specialty Credentials
      • Qualifications
  • Topics & Tools
    Topics & Tools

    Stay up to date with workplace news and leverage our vast library of resources to streamline day-to-day HR tasks.

    The white house in washington, dc.
    Executive Order Impact Zone

    Do not abandon, but evaluate and evolve. It is about legal, equal opportunity for all.

    • News & Trends

      Follow breaking news and emerging workplace trends.

      Legal & Compliance

      Stay informed on workplace legal updates and their impacts.

      From the Workplace

      Explore diverse perspectives from your peers on today's workplaces.

      Flagships

      Get curated collections of podcasts, videos, articles, and more produced by SHRM.

    • HR Topics
      • AI in the Workplace
      • Civility at Work
      • Compensation & Benefits
      • Inclusion & Diversity
      • Talent Acquisition
      • Workplace Technology
      • Workplace Violence Prevention
      SEE ALL
      SHRM Research
    • Tools & Samples

      Access member resources and tools to streamline HR tasks.

      • Forms & Checklists
      • How-To Guides
      • Interactive Tools
      • Job Descriptions
      • Policies
      • Toolkits
      SEE ALL
      Ask an Advisor
  • Events & Education
    Events & Education

    SHRM25 in San Diego, June 29 - July 2, 2025
    Join us for SHRM25 in San Diego

    Register for the World’s Largest HR Conference being held on June 29 - July 2, 2025

    • Events
      • SHRM25
      • The AI+HI Project 2025
      • INCLUSION 2025
      • Talent 2026
      • Linkage Institute 2025
      SEE ALL
      Webinars
    • Educational Programs

      Designed and delivered by HR experts to empower you with the knowledge and tools you need to drive lasting change in the workplace.

      Specialty Credentials

      Demonstrate targeted competence and enhance credibility among peers and employers.

      Qualifications

      Gain a deeper understanding and develop critical skills.

    • Team Training & Development

      Customized training programs unique to your organization’s needs.

  • Business Solutions
  • Advocacy
    Advocacy

    Make your voice heard on public policy issues impacting the workplace.

    Advocacy
    SHRM's President & CEO testifies to Congress on "The State of American Education"
    • Policy Areas
      • Workforce Development
      • Workplace Inclusion
      • Workplace Flexibility & Leave
      • Workplace Governance
      • Workplace Health Care
      • Workplace Immigration
      State Affairs

      SHRM advances policy solutions in state legislatures nationwide.

      Global Policy

      SHRM is the go-to for global HR leaders and businesses on workplace matters.

    • Advocacy Team (A-Team)

      SHRM’s A-Team is a key member benefit, giving you the tools, insights, and opportunities to shape workplace policy and drive real impact.

      Take Action

      Urge lawmakers to support policies that create lasting, positive change.

      Advocacy & Legislative Resources

      Access SHRM’s curated policy materials and content.

    • SHRM-Led Coalitions
      • Generation Cares
      • The Section 127 Coalition
      • Learn More & Partner with SHRM Government Affairs
  • Community
    Community

    Woman raising hand in group
    Find a SHRM Chapter

    Easily find a local professional or student chapter in your area.

    • Chapters

      Find local connections from over 607 chapters and state councils and create your personalized HR network.

      SHRM Connect

      Post polls, get crowdsourced answers to your questions and network with other HR professionals online.

      SHRM Northern California

      Join SHRM members in the greater San Francisco Bay area for local events and networking.

    • Membership Councils

      Learn about SHRM's five regional councils and the Membership Advisory Council (MAC).

      • Membership Advisory Council
      • Regional Councils
    • Volunteers

      Learn about volunteer opportunities with SHRM.

      • Volunteer Leader Resource Center
Close
  • Membership
  • Certification
    back
    Certification
    Smiling asian student studying in library with laptop books doing online research for coursework, making notes for essay homework assignment, online education e-learning concept
    Get Certified!

    Be recognized as an HR leader with your SHRM-CP or SHRM-SCP credential.

    • How to Get Certified

      Demonstrate your ability to apply HR principles to real-life situations. No other HR certification compares.

      • How to Get Certified
      • Eligibility Criteria
      • Exam Details and Fees
      • SHRM-CP
      • SHRM-SCP
      • Which Certification is Best for Me
      • Certification FAQs
    • Prepare for the Exam

      Give yourself the best chance to pass your SHRM certification exam.

      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      • Study Aids & Add-ons
    • Recertification

      Recertify your SHRM Credentials before your end date!

      • Specialty Credentials
      • Qualifications
  • Topics & Tools
    back
    Topics & Tools

    Stay up to date with workplace news and leverage our vast library of resources to streamline day-to-day HR tasks.

    The white house in washington, dc.
    Executive Order Impact Zone

    Do not abandon, but evaluate and evolve. It is about legal, equal opportunity for all.

    • News & Trends

      Follow breaking news and emerging workplace trends.

      Legal & Compliance

      Stay informed on workplace legal updates and their impacts.

      From the Workplace

      Explore diverse perspectives from your peers on today's workplaces.

      Flagships

      Get curated collections of podcasts, videos, articles, and more produced by SHRM.

    • HR Topics
      • AI in the Workplace
      • Civility at Work
      • Compensation & Benefits
      • Inclusion & Diversity
      • Talent Acquisition
      • Workplace Technology
      • Workplace Violence Prevention
      SEE ALL
      SHRM Research
    • Tools & Samples

      Access member resources and tools to streamline HR tasks.

      • Forms & Checklists
      • How-To Guides
      • Interactive Tools
      • Job Descriptions
      • Policies
      • Toolkits
      SEE ALL
      Ask an Advisor
  • Events & Education
    back
    Events & Education
    SHRM25 in San Diego, June 29 - July 2, 2025
    Join us for SHRM25 in San Diego

    Register for the World’s Largest HR Conference being held on June 29 - July 2, 2025

    • Events
      • SHRM25
      • The AI+HI Project 2025
      • INCLUSION 2025
      • Talent 2026
      • Linkage Institute 2025
      SEE ALL
      Webinars
    • Educational Programs

      Designed and delivered by HR experts to empower you with the knowledge and tools you need to drive lasting change in the workplace.

      Specialty Credentials

      Demonstrate targeted competence and enhance credibility among peers and employers.

      Qualifications

      Gain a deeper understanding and develop critical skills.

    • Team Training & Development

      Customized training programs unique to your organization’s needs.

  • Business Solutions
  • Advocacy
    back
    Advocacy

    Make your voice heard on public policy issues impacting the workplace.

    Advocacy
    SHRM's President & CEO testifies to Congress on "The State of American Education"
    • Policy Areas
      • Workforce Development
      • Workplace Inclusion
      • Workplace Flexibility & Leave
      • Workplace Governance
      • Workplace Health Care
      • Workplace Immigration
      State Affairs

      SHRM advances policy solutions in state legislatures nationwide.

      Global Policy

      SHRM is the go-to for global HR leaders and businesses on workplace matters.

    • Advocacy Team (A-Team)

      SHRM’s A-Team is a key member benefit, giving you the tools, insights, and opportunities to shape workplace policy and drive real impact.

      Take Action

      Urge lawmakers to support policies that create lasting, positive change.

      Advocacy & Legislative Resources

      Access SHRM’s curated policy materials and content.

    • SHRM-Led Coalitions
      • Generation Cares
      • The Section 127 Coalition
      • Learn More & Partner with SHRM Government Affairs
  • Community
    back
    Community
    Woman raising hand in group
    Find a SHRM Chapter

    Easily find a local professional or student chapter in your area.

    • Chapters

      Find local connections from over 607 chapters and state councils and create your personalized HR network.

      SHRM Connect

      Post polls, get crowdsourced answers to your questions and network with other HR professionals online.

      SHRM Northern California

      Join SHRM members in the greater San Francisco Bay area for local events and networking.

    • Membership Councils

      Learn about SHRM's five regional councils and the Membership Advisory Council (MAC).

      • Membership Advisory Council
      • Regional Councils
    • Volunteers

      Learn about volunteer opportunities with SHRM.

      • Volunteer Leader Resource Center
Join Today
Renew
Rejoin Now
Renew
  • Store
    • Global
    • India
    • MENA
  • About
  • Book a Speaker
  • Foundation
  • Executive network
  • CEO Circle
  • Enterprise Solutions
  • Linkage Logo
SHRM
Sign In
  • Account
    • My Account
    • Logout
Close

  1. Topics & Tools
  2. Workplace News & Trends
  3. All Things Work
  4. The Cybersecurity Challenge
Share
  • Linked In
  • Facebook
  • Twitter
  • Email

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus convallis sem tellus, vitae egestas felis vestibule ut.


Error message details.

Copy button
Reuse Permissions

Request permission to republish or redistribute SHRM content and materials.


Learn More
Feature

The Cybersecurity Challenge

With cyberthreats growing in sophistication, corporate digital security requires a real team effort.

October 12, 2019 | David Tobenkin

​Forget the image of teenage computer hackers late at night in a basement with cold pizza and parents asleep upstairs. Cybercrime is big business that's inflicting real damage to U.S. organizations and institutions, especially small and midsize employers.

In November 2018, a federal grand jury in Newark, N.J., returned an indictment charging Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah Mansouri, 27, both of Iran, in a 34-monthlong international computer hacking and extortion scheme involving sophisticated ransomware. Savandi and Mansouri allegedly collected more than $6 million in ransom payments and caused more than $30 million in losses to victims by encrypting the data on victims' computers and demanding ransom in return for decryption keys to recover the data. The more than 200 victims included sophisticated entities such as hospitals, municipalities and public institutions.




of employees receive cyber training and education on an annual basis.


Source: 2019 Chubb Cyber Risk Survey.



And in July 2018, Sinovel Wind Group LLC, a manufacturer and exporter of wind turbines based in China, was sentenced for stealing trade secrets from AMSC, a U.S.-based company formerly known as American Superconductor Inc. The theft resulted in the loss of more than $1 billion in shareholder equity and almost 700 jobs (more than half the company's global workforce), according to evidence produced at trial.

Yet when trying to protect against such actors, many businesses still treat cybersecurity efforts as a collection of noncore, check-the-box technical tasks that can interfere with getting work done. To effectively combat cybercrime, organizations will have to up their game by deploying significant and wide-ranging organizational defenses.

"While there is some recognition of the risk of data loss, the full range of risks from a cybersecurity breach―including operational risk, reputational damage and potential cultural impact on the company―are often underestimated," says Dominic Keller, senior cyber risk consultant at Willis Towers Watson. "Clients, employees and business goals may all be affected by a cyber incident. Having a proactive approach to risk assessment, and identifying the key business impacts of cyber incidents, is critical."

The Growing Threat

The financial costs of cybersecurity breaches are substantial, according to The Cybersecurity Imperative Pulse Report, a recent publication from ESI Thoughtlab that was sponsored by Willis Towers Watson and others. The underlying survey of 467 large companies (more than $200 million in revenue) worldwide found that, on average, those companies lost $4.7 million each in cyber incidents last year; more than 1 in 10 businesses reported losses of more than $10 million.

The types of cyberthreats vary and have grown in sophistication. Among them are:

  •      Use of confidential data to perpetrate fraud or blackmail.
  •      Theft of trade secrets.
  •      Inadvertent disclosure of confidential data by careless employees or contractors.
  •      Disclosure of confidential information by disgruntled or former employees seeking revenge or financial gain.
  •      Unauthorized entry to private computer systems by someone to create mischief or gain notoriety.

Threat levels differ by industry. Financial and medical institutions are particularly targeted, given the sensitive financial and health data they retain.

Mega-breaches of the largest companies have drawn the most media attention. But many medium and smaller organizations are increasingly being targeted, in part because they tend to have weaker cyber defenses and far fewer cybersecurity resources than the giants, says Joseph Steinberg, a cybersecurity consultant and author. Criminals reason that smaller firms are often more likely than their larger counterparts to pay ransomware demands, he notes.


Cybersecurity Is a Team Sport

So what's to be done? Many companies are still placing most or all of the burden for cybersecurity on their IT staff. Instead, cyber risk management must be understood as an effort that requires coordinated action by many business units across the company, Keller says. Employees, who are on the front lines of an organization's defense, need to be on alert, too. This year, National Cybersecurity Awareness Month (held every October) emphasizes the role that individuals play and the importance of taking proactive steps to enhance cybersecurity.

Ideally, an organization should have a detailed plan that governs its efforts to prevent and respond to a breach, including clear decision and communication processes across the organization, Keller says.

It starts at the top. C-suite officers must convey the importance of cybersecurity, lest it become just one of a number of to-dos on the list for employees. "Engaging leadership and key stakeholders to ensure that they have a clear understanding of the organization's cyber risk management strategy also ensures consistency of approach and improves cyber risk resilience," Keller says.


‘The full range of risks from a cybersecurity breach―including operational risk, reputational damage and potential cultural impact on the company―are often underestimated.’
Dominic Keller


Improving cybersecurity also calls for a change in attitude at many organizations. "The most important thing is for employees to understand and internalize that they are targets," Steinberg says. "People fall for social engineering and phishing attacks much less frequently if their guard is up."

Cyber risk management strategies should vary based on the potential business impact of cyber incidents. For example, an organization with one or two clients can face greater business damage than those with diversified client bases, Keller notes.

In addition to being pervasive, a good cybersecurity strategy should be multi-layered. "There's no single thing that stops all attacks, so you need to layer defenses," says Erich Kron, a security awareness advocate at Clearwater, Fla.-based KnowBe4 Inc., a cybersecurity awareness training organization.

"On the phishing side, you can use e-mail gateways to control how much potentially problematic e-mail gets to employees, though you won't stop them all," he says. "Then you train people to spot the bad e-mails. But they occasionally will still click on the links they contain. Then you use good antivirus software. And then, should the worst happen, you make sure data is backed up and test how you would respond and recover."

It's also important to tailor these controls to the threats coming in. "For example, if the organization is falling for phishing or malware a couple times a week," Kron says, "[curbing] that should be a priority."

The Challenge for IT

Many experts stress the importance of establishing well-designed IT data systems that segregate data, restrict data access and organize multiple operating systems by business function so that only those who need it have access to the systems and data. That ensures that infiltration of one business function will not infect others and sink the whole business.

IT also can be active in designing solutions that help prevent breaches. These include:

  •      Preventing the use of simple passwords that are easily hacked.
  •      Blocking employee transmittal of sensitive information that hasn't been encrypted or authorized.
  •      Monitoring intra-office flows of information for unusual patterns of communication.

The Internet of Things, teleworking and the smartphone revolution are compounding the cybersecurity challenge by dramatically increasing both the number and types of devices that store sensitive information, Steinberg says, as well as the potential points of entry for hackers.

The general rule is that only secured devices should be allowed to interface with a company's network; others should be connected to a guest network. "Furthermore, any device accessing corporate data needs security software on it," Steinberg says.

For many smaller organizations, identifying exactly who in IT should be dealing with cybersecurity can be a challenge. Most IT people are busy with myriad responsibilities and tasks, while cybersecurity experts are expensive to hire and hard to retain, Steinberg notes. Contracting with a competent third party to design and direct cybersecurity efforts may be the smartest approach.


The HR Challenge

HR has a critical role in cybersecurity, and it should be broader than organizing employee training. "HR is the critical link in the whole cybersecurity process," says Frederick Scholl, cybersecurity program director and associate teaching professor of cybersecurity with the School of Engineering at Quinnipiac University in Hamden, Conn. "They keep company culture, and if there's no culture of security, there's no effective program. It's important that they understand cybersecurity issues and vulnerabilities well."

IT and HR must work together to rapidly disseminate information about threats, as similar attacks will often follow one another or target additional employees. HR and IT also need to work together to ensure that employees access only the data they need.

Another HR task: recruiting employees who will proactively help ensure the security of the organization.


‘For us, privacy is a core tenet of our culture and one of the first things people are trained on.’
Marcy Klipfel

The importance of safety is baked into recruiting at Businessolver, a West Des Moines, Iowa-based benefits administration technology and services provider. "For us, privacy is a core tenet of our culture and one of the first things people are trained on," says Marcy Klipfel, senior vice president of employee engagement at the 1,200-employee organization. "When recruiting, we also look for people who understand the importance of security and why we take it very seriously."

And then there's the critical role of training. Only 31 percent of employees receive cyber training and education on an annual basis, according to the results of the 2019 Chubb Cyber Risk Survey.

Training employees to slow down and think about the e-mails they receive is important. "Most cybersecurity attacks target human behavior," Kron says.

Testing employees can help. "In HR, we partner with our IT department and phish our own employees," Klipfel says. "If we're successful, we meet with the employee and discuss what would have occurred if the situation had been real. Doing that creates a real chemical memory that persists; there are no repeat offenders."

Breach and attack simulation tools also can highlight vulnerabilities in an organization, Scholl notes.

A New World

Increasingly, cybersecurity is changing how business is conducted. Organizations are establishing policies and procedures to navigate key potential vulnerabilities, such as how money changes hands. For example, in response to fraud patterns in which real estate brokers' e-mail accounts are hacked and clients' closing payments are diverted, many state realtor bodies are establishing protocols for how closing transfers will be handled and how agents and brokers communicate with clients regarding such transfers.

Businesses, particularly those in industries with sensitive data, are closely scrutinizing current and potential partners to examine whether their cybersecurity efforts are adequate. "Any vendor software we integrate with our own must pass our cybersecurity review," Klipfel says. "And you would be surprised how many software vendors don't follow the protocols and procedures for good cybersecurity practices. For example, many lack cyber insurance. To me, that's an indication that they're not adequately thinking about cybersecurity."

Cyber insurance is now an organizational necessity, many experts say. If a breach occurs, businesses must also have detailed action plans that include which organizational units should be engaged; a communications plan to provide information to affected clients, business partners or media; and a clear strategy for business continuity while networks may be unavailable. These plans should be tested regularly, Keller says. As cybersecurity threats multiply, robust cyber defenses are absolutely critical.

David Tobenkin is a freelance writer based in the greater Washington, D.C., area.


Explore Further

SHRM provides advice and resources to help employers identify cyberthreats and improve security.

Policy: Computer Passwords
Establish standards for creating, managing and protecting strong passwords.

Policy: Computer, E-Mail and Internet Usage
Encourage employees to use your organization's Internet and e-mail systems responsibly.

Policy: Social Media
Set guidelines for the appropriate use of social media in the workplace.

HR Q&A: Data Security
Employee data is widely accessible via the Internet and mobile devices. What are the best ways to safeguard this information?

U.S. Department of Homeland Security Toolkit: National Cybersecurity Awareness Month 2019
Information to help you understand, secure and protect your digital profile.

Subscribe to the All Things Work Newsletter




Risk Management
Technology
Workplace Security

Related Articles

Kelly Dobbs Bunting speaks onstage at SHRM24
(opens in a new tab)
News
Why AI+HI Is Essential to Compliance

HR must always include human intelligence and oversight of AI in decision-making in hiring and firing, a legal expert said at SHRM24. She added that HR can ensure compliance by meeting the strictest AI standards, which will be in Colorado’s upcoming AI law.

(opens in a new tab)
News
A 4-Day Workweek? AI-Fueled Efficiencies Could Make It Happen

The proliferation of artificial intelligence in the workplace, and the ensuing expected increase in productivity and efficiency, could help usher in the four-day workweek, some experts predict.

(opens in a new tab)
News
How One Company Uses Digital Tools to Boost Employee Well-Being

Learn how Marsh McLennan successfully boosts staff well-being with digital tools, improving productivity and work satisfaction for more than 20,000 employees.

HR Daily Newsletter

Stay up to date with the latest HR news, trends, and expert advice each business day.

Success title

Success caption

Manage Subscriptions
  • About SHRM
  • Careers at SHRM
  • Press Room
  • Contact SHRM
  • Book a SHRM Executive Speaker
  • Advertise with Us
  • Partner with Us
  • Copyright & Permissions
  • Post a Job
  • Find an HR Job
Follow Us
  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • SHRM Newsletters
  • Ask An Advisor

© 2025 SHRM. All Rights Reserved

SHRM provides content as a service to its readers and members. It does not offer legal advice, and cannot guarantee the accuracy or suitability of its content for a particular purpose. Disclaimer


  1. Privacy Policy

  2. Terms of Use

  3. Accessibility

Join SHRM for Exclusive Access to Member Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member?
Free Article
Limit Reached

Get unlimited access to articles and member-exclusive resources.

You've reached the limit of 1 free article this month. Join to access unlimited articles and member-only resources.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join the Executive Network and enjoy unlimited content.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join and enjoy unlimited access to SHRM Executive Network Content.

Already a member?
Unlock Your Career with SHRM Membership

Please enjoy this free resource! Join SHRM for unlimited access to exclusive articles and tools.

Already a member?

Your membership is almost expired! Renew today for unlimited access to member content.

Renew now

Your membership has expired. Renew today for unlimited access to member content.

Renew Now

Your Executive Network membership is nearing its expiration. Renew now to maintain access.

Renew Now

Your membership has expired. Renew your Executive Network benefits today.

Renew Now