SlideShare a Scribd company logo
1 of 11
Toll Free: 877.880.4477
Phone: 281.880.6525
www.hrp.net
Train Employees to Avoid Cybercrime
www.hrp.net
In an era of hyper-connectedness and a burgeoning global cybercrime
industry, you can't afford to hope you'll just be lucky and avoid a successful
attack. It's essential to establish policies and procedures to minimize risk and
train employees on how to protect your company.
www.hrp.net
The basic kinds of criminal acts you need to guard against are:
• Theft of proprietary or sensitive business data that could be sold to
competitors or other hackers,
• Installation of "ransomware" that locks you out of your own data until you
pay the cybercriminals' demands,
• Malicious damage to your system, such as crashing your website to
prevent customers from accessing it (often referred to as a "denial-of-
service attack," under which hackers overwhelm your site with data
requests), and
• Theft of employees' personal information to eventually steal from them.
Internal Threats
www.hrp.net
Building a defensive strategy starts with recognizing that, even with the best
technical external barriers in place, you could fall victim to an employee who
goes rogue, or even joins your organization specifically with cybercrime as a
goal.
While unlikely, it's essential for your hiring managers to be mindful of these
risks when reviewing employment applications — particularly those for
positions that involve open access to sensitive company data. It's just another
checklist item when reviewing applicants with unusual employment histories.
Checking references and conducting background checks is also a good idea.
www.hrp.net
In the same way, it's generally advisable to include a statement in your
employee handbook informing employees that their communications are
stored in a backup system, and that you reserve the right to monitor and
examine their company computers and emails (sent and received) on your
system.
When such monitoring systems are in place, prudence or suspicious activity
will dictate when they should be ramped up.
DHS Tips for Employees and IT Staff
www.hrp.net
It can also be useful to establish a policy encouraging employees to report any
suspicious computer-based activities they observe around them. Of course,
you don't want to foster employee paranoia or promote the spread of
baseless accusations. But deploying more eyes and ears can serve both to
forestall cyber bad behavior and detect it, if it occurs.
The largest threat isn't that employees may intentionally commit cybercrime,
but that they might inadvertently open the door to external cybercriminals.
www.hrp.net
That's why the Department of Homeland Security (DHS) considers cybercrime
serious enough to offer eight tips for employers to pass along to their
employees:
1. Read and abide by the company's Internet use policy.
2. Make passwords complex — use a combination of numbers, symbols, and
letters (uppercase and lowercase).
3. Change passwords regularly (every 45 to 90 days).
4. Guard user names, passwords, or other computer or website access
codes, even among coworkers.
5. Exercise caution when opening emails from unknown senders, and don't
open attachments or links from unverifiable sources.
6. Don't install or connect any personal software or hardware to the
organization's network or hardware without permission from the IT
department.
7. Make electronic and physical backups or copies of critical work.
8. Report all suspicious or unusual computer problems to the IT department.
www.hrp.net
Employees that follow these steps faithfully can serve as an additional layer of
protection against cyberattacks.
For those people who are charged with the responsibility to maintain a secure
system, the DHS offers the following advice:
• Implement a layered defense strategy that includes technical,
organizational and operational controls,
• Establish clear policies and procedures for employee use of the
organization's information technologies,
• Coordinate cyberincident response planning with existing disaster
recovery and business continuity plans across the organization,
• Implement technical defenses, such as firewalls, intrusion detection
systems and Internet content filtering,
• Update the existing anti-virus software often,
www.hrp.net
• Follow organizational guidelines and security regulations,
• Regularly download vendor security patches for all software,
• Change the manufacturer's default passwords on all software,
• Encrypt data and use two-factor authentication where possible,
• If a wireless network is used, make sure that it's secure, and
• Monitor, log and analyze successful and attempted intrusions to the
company's systems and networks.
Cybercrime Insurance
www.hrp.net
What else can be done? It's often a good idea for businesses to protect their
computer systems further by buying cybercrime insurance. Alone, this won't
prevent victimization, but it can offset some of the financial damage in case of
a successful attack.
In addition, most insurers perform a rigorous risk assessment before issuing a
policy and setting premiums. The results of such an assessment can be quite
eye-opening for business owners.
If you decide against buying insurance, it might be useful to have a consultant
conduct a cybercrime exposure risk assessment anyway. The growth, ubiquity
and high cost of cybercrime has spawned a large industry of cybersecurity
consulting firms. And, unless your company already has a robust IT staff with
expertise in cyber-risk mitigation, you'll likely save time and money engaging a
third-party vendor.
14550 Torrey Chase Blvd., Ste. 360 Houston, TX 77014 USA
www.hrp.net
E-mail : info@hrp.net
Toll Free
Phone
Fax
:
:
:
877.880.4477
281.880.6525
281.866.9426

More Related Content

What's hot

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacTicTac Data Recovery
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129Darren Wray
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Securitysandra sukarieh
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Network Security
Network SecurityNetwork Security
Network Securitypethurusan
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationCarolynrahn
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team ProjectThe TNS Group
 

What's hot (20)

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Network Security
Network SecurityNetwork Security
Network Security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 

Viewers also liked

Spring’16 Developer Highlights
Spring’16 Developer HighlightsSpring’16 Developer Highlights
Spring’16 Developer HighlightsSimon Lawrence
 
Spring '16 Lightning Experience Features
Spring '16 Lightning Experience FeaturesSpring '16 Lightning Experience Features
Spring '16 Lightning Experience FeaturesChristopher Lewis
 
A Fresh Look at Employee Incentive Compensation
A Fresh Look at Employee Incentive CompensationA Fresh Look at Employee Incentive Compensation
A Fresh Look at Employee Incentive CompensationHuman Resources & Payroll
 
A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyMatteo Cavallini
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distjayvinarora
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningSymantec
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
The Link Between Employee Motivation and Your Compensation Philosophy
The Link Between Employee Motivation and Your Compensation PhilosophyThe Link Between Employee Motivation and Your Compensation Philosophy
The Link Between Employee Motivation and Your Compensation PhilosophyHuman Resources & Payroll
 

Viewers also liked (10)

Spring’16 Developer Highlights
Spring’16 Developer HighlightsSpring’16 Developer Highlights
Spring’16 Developer Highlights
 
Spring '16 Lightning Experience Features
Spring '16 Lightning Experience FeaturesSpring '16 Lightning Experience Features
Spring '16 Lightning Experience Features
 
A Fresh Look at Employee Incentive Compensation
A Fresh Look at Employee Incentive CompensationA Fresh Look at Employee Incentive Compensation
A Fresh Look at Employee Incentive Compensation
 
A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in Italy
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for dist
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
The Link Between Employee Motivation and Your Compensation Philosophy
The Link Between Employee Motivation and Your Compensation PhilosophyThe Link Between Employee Motivation and Your Compensation Philosophy
The Link Between Employee Motivation and Your Compensation Philosophy
 

Similar to Train Employees to Avoid Cybercrime

5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breachincmagazineseo
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 

Similar to Train Employees to Avoid Cybercrime (20)

Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Mis
MisMis
Mis
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 

More from Human Resources & Payroll

Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Human Resources & Payroll
 
Leverage Benefits to Recruit and Retain Talent
Leverage Benefits to Recruit and Retain TalentLeverage Benefits to Recruit and Retain Talent
Leverage Benefits to Recruit and Retain TalentHuman Resources & Payroll
 
EEOC Seeks Enforcement of Pregnancy Discrimination Laws
EEOC Seeks Enforcement of Pregnancy Discrimination LawsEEOC Seeks Enforcement of Pregnancy Discrimination Laws
EEOC Seeks Enforcement of Pregnancy Discrimination LawsHuman Resources & Payroll
 
Employer Complaints Pour in as EEOC Wants More Data
Employer Complaints Pour in as EEOC Wants More DataEmployer Complaints Pour in as EEOC Wants More Data
Employer Complaints Pour in as EEOC Wants More DataHuman Resources & Payroll
 
Avoid Giving Birth to a Pregnancy Discrimination Charge
Avoid Giving Birth to a Pregnancy Discrimination ChargeAvoid Giving Birth to a Pregnancy Discrimination Charge
Avoid Giving Birth to a Pregnancy Discrimination ChargeHuman Resources & Payroll
 
Overtime Pay Rules: Avoid Making Costly Wrong Assumptions
Overtime Pay Rules: Avoid Making Costly Wrong AssumptionsOvertime Pay Rules: Avoid Making Costly Wrong Assumptions
Overtime Pay Rules: Avoid Making Costly Wrong AssumptionsHuman Resources & Payroll
 
DOL Announces Increased Civil Penalties for Violations of Federal Laws
DOL Announces Increased Civil Penalties for Violations of Federal LawsDOL Announces Increased Civil Penalties for Violations of Federal Laws
DOL Announces Increased Civil Penalties for Violations of Federal LawsHuman Resources & Payroll
 
New OSHA Rules Spotlight Workplace Injuries, Illnesses
New OSHA Rules Spotlight Workplace Injuries, IllnessesNew OSHA Rules Spotlight Workplace Injuries, Illnesses
New OSHA Rules Spotlight Workplace Injuries, IllnessesHuman Resources & Payroll
 
New Overtime Rules Issued: What it Means for You
New Overtime Rules Issued: What it Means for YouNew Overtime Rules Issued: What it Means for You
New Overtime Rules Issued: What it Means for YouHuman Resources & Payroll
 
EEOC Takes Aim at Gender-Based Pay Discrimination
EEOC Takes Aim at Gender-Based Pay DiscriminationEEOC Takes Aim at Gender-Based Pay Discrimination
EEOC Takes Aim at Gender-Based Pay DiscriminationHuman Resources & Payroll
 
Employee Health Screenings Can Be Well Worth the Effort
Employee Health Screenings Can Be Well Worth the EffortEmployee Health Screenings Can Be Well Worth the Effort
Employee Health Screenings Can Be Well Worth the EffortHuman Resources & Payroll
 
Perceived Retaliation Can Put Your Company in Hot Water
Perceived Retaliation Can Put Your Company in Hot WaterPerceived Retaliation Can Put Your Company in Hot Water
Perceived Retaliation Can Put Your Company in Hot WaterHuman Resources & Payroll
 
Take Steps to Help Employees Achieve Financial Wellness
Take Steps to Help Employees Achieve Financial WellnessTake Steps to Help Employees Achieve Financial Wellness
Take Steps to Help Employees Achieve Financial WellnessHuman Resources & Payroll
 
Boosting Employee Wellness is Achievable, but not Easy
Boosting Employee Wellness is Achievable, but not EasyBoosting Employee Wellness is Achievable, but not Easy
Boosting Employee Wellness is Achievable, but not EasyHuman Resources & Payroll
 

More from Human Resources & Payroll (20)

Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Leverage Benefits to Recruit and Retain Talent
Leverage Benefits to Recruit and Retain TalentLeverage Benefits to Recruit and Retain Talent
Leverage Benefits to Recruit and Retain Talent
 
Accommodating Employees with Mental Illness
Accommodating Employees with Mental IllnessAccommodating Employees with Mental Illness
Accommodating Employees with Mental Illness
 
New Overtime Rules Suspended for Now
New Overtime Rules Suspended for NowNew Overtime Rules Suspended for Now
New Overtime Rules Suspended for Now
 
Avoid the Legal Traps of Relocating Jobs
Avoid the Legal Traps of Relocating JobsAvoid the Legal Traps of Relocating Jobs
Avoid the Legal Traps of Relocating Jobs
 
EEOC Seeks Enforcement of Pregnancy Discrimination Laws
EEOC Seeks Enforcement of Pregnancy Discrimination LawsEEOC Seeks Enforcement of Pregnancy Discrimination Laws
EEOC Seeks Enforcement of Pregnancy Discrimination Laws
 
Making the Most of Staff Meetings
Making the Most of Staff MeetingsMaking the Most of Staff Meetings
Making the Most of Staff Meetings
 
Avoid Inadvertent Hiring Discrimination
Avoid Inadvertent Hiring DiscriminationAvoid Inadvertent Hiring Discrimination
Avoid Inadvertent Hiring Discrimination
 
Employer Complaints Pour in as EEOC Wants More Data
Employer Complaints Pour in as EEOC Wants More DataEmployer Complaints Pour in as EEOC Wants More Data
Employer Complaints Pour in as EEOC Wants More Data
 
Avoid Giving Birth to a Pregnancy Discrimination Charge
Avoid Giving Birth to a Pregnancy Discrimination ChargeAvoid Giving Birth to a Pregnancy Discrimination Charge
Avoid Giving Birth to a Pregnancy Discrimination Charge
 
Overtime Pay Rules: Avoid Making Costly Wrong Assumptions
Overtime Pay Rules: Avoid Making Costly Wrong AssumptionsOvertime Pay Rules: Avoid Making Costly Wrong Assumptions
Overtime Pay Rules: Avoid Making Costly Wrong Assumptions
 
DOL Announces Increased Civil Penalties for Violations of Federal Laws
DOL Announces Increased Civil Penalties for Violations of Federal LawsDOL Announces Increased Civil Penalties for Violations of Federal Laws
DOL Announces Increased Civil Penalties for Violations of Federal Laws
 
New OSHA Rules Spotlight Workplace Injuries, Illnesses
New OSHA Rules Spotlight Workplace Injuries, IllnessesNew OSHA Rules Spotlight Workplace Injuries, Illnesses
New OSHA Rules Spotlight Workplace Injuries, Illnesses
 
New Overtime Rules Issued: What it Means for You
New Overtime Rules Issued: What it Means for YouNew Overtime Rules Issued: What it Means for You
New Overtime Rules Issued: What it Means for You
 
EEOC Takes Aim at Gender-Based Pay Discrimination
EEOC Takes Aim at Gender-Based Pay DiscriminationEEOC Takes Aim at Gender-Based Pay Discrimination
EEOC Takes Aim at Gender-Based Pay Discrimination
 
Employee Health Screenings Can Be Well Worth the Effort
Employee Health Screenings Can Be Well Worth the EffortEmployee Health Screenings Can Be Well Worth the Effort
Employee Health Screenings Can Be Well Worth the Effort
 
Video Job Interviews Gaining Popularity
Video Job Interviews Gaining PopularityVideo Job Interviews Gaining Popularity
Video Job Interviews Gaining Popularity
 
Perceived Retaliation Can Put Your Company in Hot Water
Perceived Retaliation Can Put Your Company in Hot WaterPerceived Retaliation Can Put Your Company in Hot Water
Perceived Retaliation Can Put Your Company in Hot Water
 
Take Steps to Help Employees Achieve Financial Wellness
Take Steps to Help Employees Achieve Financial WellnessTake Steps to Help Employees Achieve Financial Wellness
Take Steps to Help Employees Achieve Financial Wellness
 
Boosting Employee Wellness is Achievable, but not Easy
Boosting Employee Wellness is Achievable, but not EasyBoosting Employee Wellness is Achievable, but not Easy
Boosting Employee Wellness is Achievable, but not Easy
 

Recently uploaded

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 

Recently uploaded (20)

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 

Train Employees to Avoid Cybercrime

  • 1. Toll Free: 877.880.4477 Phone: 281.880.6525 www.hrp.net Train Employees to Avoid Cybercrime
  • 2. www.hrp.net In an era of hyper-connectedness and a burgeoning global cybercrime industry, you can't afford to hope you'll just be lucky and avoid a successful attack. It's essential to establish policies and procedures to minimize risk and train employees on how to protect your company.
  • 3. www.hrp.net The basic kinds of criminal acts you need to guard against are: • Theft of proprietary or sensitive business data that could be sold to competitors or other hackers, • Installation of "ransomware" that locks you out of your own data until you pay the cybercriminals' demands, • Malicious damage to your system, such as crashing your website to prevent customers from accessing it (often referred to as a "denial-of- service attack," under which hackers overwhelm your site with data requests), and • Theft of employees' personal information to eventually steal from them.
  • 4. Internal Threats www.hrp.net Building a defensive strategy starts with recognizing that, even with the best technical external barriers in place, you could fall victim to an employee who goes rogue, or even joins your organization specifically with cybercrime as a goal. While unlikely, it's essential for your hiring managers to be mindful of these risks when reviewing employment applications — particularly those for positions that involve open access to sensitive company data. It's just another checklist item when reviewing applicants with unusual employment histories. Checking references and conducting background checks is also a good idea.
  • 5. www.hrp.net In the same way, it's generally advisable to include a statement in your employee handbook informing employees that their communications are stored in a backup system, and that you reserve the right to monitor and examine their company computers and emails (sent and received) on your system. When such monitoring systems are in place, prudence or suspicious activity will dictate when they should be ramped up.
  • 6. DHS Tips for Employees and IT Staff www.hrp.net It can also be useful to establish a policy encouraging employees to report any suspicious computer-based activities they observe around them. Of course, you don't want to foster employee paranoia or promote the spread of baseless accusations. But deploying more eyes and ears can serve both to forestall cyber bad behavior and detect it, if it occurs. The largest threat isn't that employees may intentionally commit cybercrime, but that they might inadvertently open the door to external cybercriminals.
  • 7. www.hrp.net That's why the Department of Homeland Security (DHS) considers cybercrime serious enough to offer eight tips for employers to pass along to their employees: 1. Read and abide by the company's Internet use policy. 2. Make passwords complex — use a combination of numbers, symbols, and letters (uppercase and lowercase). 3. Change passwords regularly (every 45 to 90 days). 4. Guard user names, passwords, or other computer or website access codes, even among coworkers. 5. Exercise caution when opening emails from unknown senders, and don't open attachments or links from unverifiable sources. 6. Don't install or connect any personal software or hardware to the organization's network or hardware without permission from the IT department. 7. Make electronic and physical backups or copies of critical work. 8. Report all suspicious or unusual computer problems to the IT department.
  • 8. www.hrp.net Employees that follow these steps faithfully can serve as an additional layer of protection against cyberattacks. For those people who are charged with the responsibility to maintain a secure system, the DHS offers the following advice: • Implement a layered defense strategy that includes technical, organizational and operational controls, • Establish clear policies and procedures for employee use of the organization's information technologies, • Coordinate cyberincident response planning with existing disaster recovery and business continuity plans across the organization, • Implement technical defenses, such as firewalls, intrusion detection systems and Internet content filtering, • Update the existing anti-virus software often,
  • 9. www.hrp.net • Follow organizational guidelines and security regulations, • Regularly download vendor security patches for all software, • Change the manufacturer's default passwords on all software, • Encrypt data and use two-factor authentication where possible, • If a wireless network is used, make sure that it's secure, and • Monitor, log and analyze successful and attempted intrusions to the company's systems and networks.
  • 10. Cybercrime Insurance www.hrp.net What else can be done? It's often a good idea for businesses to protect their computer systems further by buying cybercrime insurance. Alone, this won't prevent victimization, but it can offset some of the financial damage in case of a successful attack. In addition, most insurers perform a rigorous risk assessment before issuing a policy and setting premiums. The results of such an assessment can be quite eye-opening for business owners. If you decide against buying insurance, it might be useful to have a consultant conduct a cybercrime exposure risk assessment anyway. The growth, ubiquity and high cost of cybercrime has spawned a large industry of cybersecurity consulting firms. And, unless your company already has a robust IT staff with expertise in cyber-risk mitigation, you'll likely save time and money engaging a third-party vendor.
  • 11. 14550 Torrey Chase Blvd., Ste. 360 Houston, TX 77014 USA www.hrp.net E-mail : info@hrp.net Toll Free Phone Fax : : : 877.880.4477 281.880.6525 281.866.9426