Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]
The posted orders at a security officer’s position exist for a reason. Their existence provides rules, responses, and a formalized structure for the officer’s work shift. So why are posted orders so poorly written or not followed? What are the liability concerns if they aren’t followed? How can site security managers craft better orders?
As a security professional, you understand the complexity of defending your organization (or client’s organization) against any number of existing and potential threats. The exercise becomes Malthusian, however, when you’re forced to account for the security practices of every vendor in your organization’s supply chain. While basic strategies like regular anti-malware scans and limiting network […]
Workplace harassment is a pervasive issue that too often gets overlooked or simply dismissed by those with the authority to address issues before they escalate. Maybe employees on the receiving end of a workplace bully don’t feel comfortable reporting the incidents, or perhaps they don’t know what resources are available to them. Who should they […]
When it comes to compliance, keeping your data secure should be one of the biggest priorities for your business. How can different companies with different requirements make sure they are compliant?
As companies grow and the business landscape becomes more competitive, companies will increasingly see remote work and the flexibility it offers as advantages for both them and their employees.
As a security team leader, there’s one thing you have in common with every other manager in every organization around the world: You need to run effective meetings. Whether you oversee a cybersecurity team at a multinational company, set priorities for maintaining perimeter or facility security, or lead an entire security operation at a small […]
The modern technological era is one where organizations are continuously threatened by online hackers. These threat actors have become more intelligent, and by using a combination of new tools, old tricks, and perseverance, they remain adept at breaking through increasingly secure endpoints.
Relaxing properly is essential to maintaining your physical and mental health. (The Japanese actually have their own word, karōshi, to refer to death from overwork.) This is especially true for security professionals. Failure to relax can negatively impact the quality of your work; but learning not to think about work outside of working hours can, […]
The University of Rochester Medical Center (URMC) agreed to pay $3 million to the U.S. Department of Health and Human Services (HHS) and take substantial corrective action to settle alleged violations of the Health Insurance Portability and Accountability Act (HIPAA) privacy and security rules, HHS announced November 5.