Putting human resources at the heart of cyber security

Assignment Help Operation Management
Reference no: EM131224557

Putting human resources at the heart of cyber security The UK government considers cyber security as a tier-one national security priority alongside international terrorism, with an annual cost of around £27 billion. Yet research shows that 96 per cent of all cyber crime could be addressed through adherence to the basic security policies that already exist in many organizations. In order for these policies to be effective, however, employees must understand their value and demonstrate their commitment to improved security by consistently applying them in the way they think and behave. Human resources directors can play a key role in keeping organizations safe in cyberspace by: Taking ownership of the security risk posed by employees Most employees assume that cyber security is a technical issue and it is not until after a successful attack that they start taking personal responsibility for security. Attitudes like this make an organization vulnerable. To improve their chances of success, hackers are now searching out the organizations that are likely to be less aware of the cyber threat: those that have not been attacked yet, such as smaller companies or those with a lower public profile. HR has a vital role to play in educating employees about the impact their attitudes and behavior have on the organization’s security. Ensuring that security measures are practical and ethical Controls can stop people acting in a way that places the organization at risk, but they must be consistent with the way people behave and think. For example, randomly generated passwords are hard to crack, but most people have to write them down, which defeats their purpose. Monitoring can allow organizations to examine what employees are doing but often raise questions of trust and cross the boundary between private life and business. The HR team is best placed to advise on whether policies are likely to work and whether they are appropriate. Identifying employees who may present a particular risk Breaking into a network takes minutes. However, finding and safely extracting what they want may take criminal’s months or even years of research and planning. To shorten this process, cyber criminals are getting help from insiders (whether knowing or manipulated) in more than half of all advanced attacks. Attackers use social media to identify a useful target and to create a relationship with them. They target people with a pre-disposition to break security controls such as those with strong views, who do not react well to authority. They look for a trigger event, which will break the employee's psychological contract with their employer – such as a demotion, change in role, redundancy or dismissal. Employees who take action against their employer are most likely to do so within 30 days of such an event. This gives the HR team a chance to intervene, including taking steps to increase monitoring and deter them. Managing an employee's exit with a view to security is also one of the most critical of all the contributions the HR team can make. PA has worked with the UK government’s Centre for the Protection of National Infrastructure (CPNI) to help define, develop and deliver new national guidance on managing people, physical and cyber risk. The guidance will ensure the UK is at the forefront of enabling organizations across its national infrastructure to reduce counterproductive behavior. The Article expresses that monitoring can allow organizations to examine what employees are doing for prosecution but on the flip side this often raise questions of trust and cross the boundary between private life and business. Is monitoring workers within an organization doing more harm then deterring cyber attack by creating its own HR issue of violation of privacy?

Reference no: EM131224557

Questions Cloud

How might these chosen theories influence your decisions : Which theory or theories of management align most closely with your personal beliefs about how organizations should be conceived of and managed? Why? How might these chosen theories influence your decisions as a program administrator at a child dev..
Healthcare system is experiencing financial problems : Bright Road Healthcare System is experiencing financial problems like insurers with late payments, Medicare patients with high readmission rates within 30 days (lost Medicare reimbursement), high staff turnover increasing costs, and low admissions to..
Where an attempted motivational tool did not work : Next, provide an example of a situation where an attempted motivational tool did not work. What was it about the second example that did not work? Explain mwour answer.
Economic factors play in this war : Trace the forces that led to the Second Gulf War ( aka The Iraq War of 2003). What role, if any, did oil or other economic factors play in this war?
Putting human resources at the heart of cyber security : Putting human resources at the heart of cyber security The UK government considers cyber security as a tier-one national security priority alongside international terrorism, with an annual cost of around £27 billion. Yet research shows that 96 per ce..
Product has been on the market : Why is it that after a product has been on the market for a while and is selling very well, the price may go down?
Which is the main goal of privatization : Which of the following is the main goal of privatization? The trade theory that nations should accumulate financial wealth, usually in the form of gold, by encouraging exports and discouraging imports is called _______.
Problems with employees violating company policy-procedure : One of the top ten most common problems facing human resources today is training and compliance with corporate or departmental policies. In the following article, the author describes how several studies have shown that even with ethics training many..
Investigation of a current macroeconomic subject : You are required to write three unmistakable examination papers including an investigation of a current macroeconomic subject since 2011.

Reviews

Write a Review

Operation Management Questions & Answers

  Identify technologies we covered that can be used as part

Identify technologies we covered that can be used as part of a CRM strategy and discuss its applicability to the Fresh Foods grocery store we reviewed as a case study.

  Successfully or unsuccessfully managed growth

Search the web for articles about companies that successfully or unsuccessfully managed growth, and then share this article for the class. Write about your thoughts and key takeaways from the article.

  Compare and contrast u.s. healthcare policy

Compare and Contrast U.S. Healthcare Policy

  Where there was an incident of computer sabotage

Have any of you worked for a company where there was an incident of computer sabotage. If not, do you think your company has adequate IT controls to prevent such an occurrence?

  Cost cooperatively through waiting cost savings

The wheat harvesting season in the American Midwest is short, and most farmers deliver their truckloads of wheat to a giant central storage bin within a two-week span. Because of this, wheat-filled trucks waiting to unload and return to the fields ha..

  Develop a linear integer model to solve this puzzle

An aged merchant of Baghdad was much respected by all who knew him. He had three sons, and it was a rule of his life to treat them equally. Whenever one son received a present, the other two each received a present of equal value. Develop a linear in..

  How much could the firm save annually in ordering

How much could the firm save annually in ordering and carrying costs by using the EOQ?

  What should you do to prevent or mitigate such risks

You own University Heights Apartments, a business that rents primarily to students. One evening, your tenant Sharon is attacked by an intruder who forces the lock on the sliding glass door of her ground-floor apartment. Is the intruder liable for wha..

  Maintain safe and healthy workplaces

Explain how each of the following HR practices can be used to maintain safe and healthy workplaces: job analysis, selection, training, performance measurement and feedback, and incentives.

  Physical components of virtual infrastructure

Describe at least 3 physical components of virtual infrastructure and what role each of them component servers? Describe at least 3 things which can be done to secure/protect or maintain the security in a virtual infrastructure?

  What is sheeped

What is “SHEEPED?” Briefly summarize each component of SHEEPED and explain why it is relevant to medical strategic planning.

  Implementation in manufacturing/public sector organisations

Task: In this assignment you are required to undertake research (literature review with at least 20 quality references. Here quality refers to peer reviewed/refereed journal articles) and present your findings on ‘issues posed to ERP implementation i..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd