Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Putting human resources at the heart of cyber security The UK government considers cyber security as a tier-one national security priority alongside international terrorism, with an annual cost of around £27 billion. Yet research shows that 96 per cent of all cyber crime could be addressed through adherence to the basic security policies that already exist in many organizations. In order for these policies to be effective, however, employees must understand their value and demonstrate their commitment to improved security by consistently applying them in the way they think and behave. Human resources directors can play a key role in keeping organizations safe in cyberspace by: Taking ownership of the security risk posed by employees Most employees assume that cyber security is a technical issue and it is not until after a successful attack that they start taking personal responsibility for security. Attitudes like this make an organization vulnerable. To improve their chances of success, hackers are now searching out the organizations that are likely to be less aware of the cyber threat: those that have not been attacked yet, such as smaller companies or those with a lower public profile. HR has a vital role to play in educating employees about the impact their attitudes and behavior have on the organization’s security. Ensuring that security measures are practical and ethical Controls can stop people acting in a way that places the organization at risk, but they must be consistent with the way people behave and think. For example, randomly generated passwords are hard to crack, but most people have to write them down, which defeats their purpose. Monitoring can allow organizations to examine what employees are doing but often raise questions of trust and cross the boundary between private life and business. The HR team is best placed to advise on whether policies are likely to work and whether they are appropriate. Identifying employees who may present a particular risk Breaking into a network takes minutes. However, finding and safely extracting what they want may take criminal’s months or even years of research and planning. To shorten this process, cyber criminals are getting help from insiders (whether knowing or manipulated) in more than half of all advanced attacks. Attackers use social media to identify a useful target and to create a relationship with them. They target people with a pre-disposition to break security controls such as those with strong views, who do not react well to authority. They look for a trigger event, which will break the employee's psychological contract with their employer – such as a demotion, change in role, redundancy or dismissal. Employees who take action against their employer are most likely to do so within 30 days of such an event. This gives the HR team a chance to intervene, including taking steps to increase monitoring and deter them. Managing an employee's exit with a view to security is also one of the most critical of all the contributions the HR team can make. PA has worked with the UK government’s Centre for the Protection of National Infrastructure (CPNI) to help define, develop and deliver new national guidance on managing people, physical and cyber risk. The guidance will ensure the UK is at the forefront of enabling organizations across its national infrastructure to reduce counterproductive behavior. The Article expresses that monitoring can allow organizations to examine what employees are doing for prosecution but on the flip side this often raise questions of trust and cross the boundary between private life and business. Is monitoring workers within an organization doing more harm then deterring cyber attack by creating its own HR issue of violation of privacy?
Why might an organizational want to design jobs according to the priciples of scientific management?
I would like you to assume you are hiring a person for one of the jobs listed below and, using internet sources, find a salary range. You are only working with a job title so you will have to flesh out the details. You will have to consider whether y..
A risk management plan must be detailed to the point that every aspect of the crisis is considered. Suppose you own a small convenience market, about the size of a 7-11 or a Circle K, or any other comparable franchise outlet that you might be more fa..
What are the different disciplines within a typical supply chain? Compare the various supply chain segments within a company with which you are familiar.
for a service that you are familiar with how can its design be improved? think about a service that you are familiar
Gail has just been transferred to a foreign branch where all of the employees expect her to make all of the decisions and direct all operations. Which type of orientation is in place in this scenario?
Give two examples of unethical behavior for each of these areas inspection, process control, process capability. For each, name the relevant ethical principle.
Discuss what food stores are involved in this process and what social forces or trends you believe are behind the local, sustainable, and organic movement.
In the nissan case study Summarize the following theories: just in time (JIT), Toyota Production System (TPS), and Lean. How are these concepts related? Describe the advantages and disadvantages for using each of these concepts at the company present..
Briefly describe the four basic elements of strategic management. Explain the continuum of board involvement. What is stakeholder analysis? List the three-step process. Describe Porter's approach to industry analysis. Discuss the three basic organiza..
Milton Corporation recomputes its energy credit for the prior tax year and, as a result, claims a $100, 00 refund. The IRS reviews the claim and allows only $60, 000 of the requested refund. If Milton does not appeal, is this matter finished? Is Milt..
Pat Maggard needs to purchase a new milling machine. She is considering two different competing machines. Milling Machine A will cost $300,000, and will return $80,000 per year for six years, with no salvage value. What is the total payoff in $ of ma..
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd