Sensitive data are high-value targets for hackers who will do (and can do) seemingly anything to get them. Large-scale attacks should serve to remind us to stay vigilant and motivate us to employ robust cybersecurity solutions to guard our data. The unfortunate reality is that even the most powerful tech can’t guard against things like […]
As companies grow and the business landscape becomes more competitive, companies will increasingly see remote work and the flexibility it offers as advantages for both them and their employees.
In part 1 of this article, HR Daily Advisor editor Jim Davis spoke with Catherine Mattice-Zundel, a consultant, coach, and trainer about workplace bullying, including where it parallels harassment and what the differences are under the law. Today we’ll look at the importance of accountability as well as some methods for preventing bullying.
It’s common for even presidents of the United States to chafe under the never-ending blanket of protection provided for them, in and out of the office, by the Secret Service. Similarly, executive protection must be thorough but not interfere with the executive’s ability to do their jobs and live their lives in a relatively normal […]
A merger and/or acquisition (M&A) can be an excellent way to expand your business. Done right, they can bring in new capabilities, help you reach new market segments, and take competitors under your own corporate umbrella. Unfortunately, if you’re not cautious, they can also end up being a cybersecurity nightmare.
The current job market is hot, and with unemployment at a low, many employers are struggling to attract top talent. While most industries are struggling to recruit the best people, those who are looking for qualified cybersecurity personnel might need to dig deep into their reservoir of patience. Hiring managers tasked with posting cybersecurity jobs […]
Most workers are familiar with or have at least heard of phishing attacks by now. Despite their varying levels of complexity, they share a core commonality: External threat actors pretending to be someone they are not (i.e., foreign dignitary, third-party vendor) to trick an employee into turning over their access credentials, click a malicious link, […]
Update: News items that revolve around car maker Tesla and its maverick CEO Elon Musk tend to attract a great deal of attention. Yet somehow, despite all the attention, the events in question have a fuzzy quality about them. No one situation exemplifies this better than last summer’s story about Musk’s claim about an insider […]
Account takeover incidents, where attackers steal employee credentials and use them to send e-mails from the user’s real account, are increasing in frequency and magnitude. In this report, we take a closer look at the motives and demographics behind these attacks.
TrainingToday®, a leading provider of online education programs for employees and supervisors, was selected for Training Industry’s Top 20 Health and Safety Training Companies list for the second year in a row.