Security might not be a popular topic around the office, but it is an important one—especially if you’re in the benefits industry. By nature, the PHI that is handled—from Social Security numbers to medical information—makes HR and healthcare extremely attractive targets for cyber hackers. Handling this sensitive data means HR administrators need to ensure they’re making data security a priority within their organization. It’s HR’s job to protect your people – that includes protecting their most personal information.
Pop Quiz: What is looming right now, today, as the largest security threat to every piece of employee and HR data your company has stored in the cloud?
With all of the hand-wringing and media attention surrounding data breaches in the past year or two, you’d think that the number of breaches would be dropping dramatically. Unfortunately, that’s an erroneous assumption.
While listening to NPR (National Public Radio) recently, we couldn’t help but notice that of the brief descriptions of the program’s three corporate supporters, two referred to doing business in the cloud and to data security:
“Support for NPR comes from ... AT&T. With AT&T, the network is on demand, the office is mobile and the cloud is designed for high security. ... And Carbonite — providing secure and automatic backup and recovery for businesses and homes.”
Last week we kicked off Security Awareness Month at Businessolver by encouraging some serious hacking. We cheered on our VP of IT Systems, Tom Pohl, as he headed to Las Vegas to compete at the 23rd annualin the Network Forensics Puzzle Contest. Out of four years of competing as an individual, against teams, Tom has consistently placed in the top four each year. We are delighted to announce that this year, he did it again, taking an impressive 2nd place!
With the headlines filled to the brim with recent data breaches, it might be hard to flip the switch and view hacking as a good thing. But we’ve found that hacking—and good hacking, at that—to be one of our most prized secret weapons when it comes to data security.
Let’s face it. IT-speak does not come naturally to most HR leaders. It’s not necessarily what you’re trained in. Who really knows what “encrypted at rest” means, anyway? And why does it matter?
HR leaders are increasingly being asked to dive into the murky waters of cloud technology and data security, and to be able to discuss what they find with their IT people and the C-suite, a quick refresh on technical terms can go a long way. Here are 8 technical terms that HR should know to help bridge the gap when discussing HR technology security and risk.
A private health care exchange involves the sharing of multiple data points and technology platform security should be of utmost importance to companies that are utilizing, or considering, a private exchange. Ryan Keehn, Businessolver’s Assistant VP Information Technology, was recently interviewed by Brian Kalish, online managing editor for Employee Benefit Adviser, in a podcast tackling private exchange security. Ryan brought up five specific points that you should be discussing with your potential (and current) exchange providers to ensure that your data is secure.
By now you’ve no doubt heard about Anthem’s data breach last Wednesday that compromised the personal information of 80 million customers and employees. The information included social security numbers, names, employment information, addresses, phone numbers, email addresses, dates of birth and member ID’s. According to the Identify Theft Resource Center, medical and healthcare breaches accounted for more than 42% of data breaches in 2014. If this stat makes you shiver, that’s good—because it should. Cyber security and data breaches are a real threat and events like these are a fierce reminder to treat them as such.
In light of the recent event, we want to take a moment to reiterate our security practices and steps we are taking to help stop these types of events at Businessolver.