In the past few years, cyber hackers have become vastly more sophisticated, both at infiltrating systems and eluding detection; however, employee cybersecurity training hasn’t evolved to effectively prevent hackers’ increased savvy: While 84 percent of organizations experience staff-related security incidents, 60 percent of businesses admit their employees have no knowledge of security risks.
Wherever technology is involved, information security can’t be far behind. While we lean on technology to help streamline Annual Enrollment and benefits administration, and make the user experience more positive and personalized, we can’t ignore that technology also opens the door to personal data getting into the hands of the wrong people.
Security might not be a popular topic around the office, but it is an important one—especially if you’re in the benefits industry. By nature, the PHI that is handled—from Social Security numbers to medical information—makes HR and healthcare extremely attractive targets for cyber hackers. Handling this sensitive data means HR administrators need to ensure they’re making data security a priority within their organization. It’s HR’s job to protect your people – that includes protecting their most personal information.
Pop Quiz: What is looming right now, today, as the largest security threat to every piece of employee and HR data your company has stored in the cloud?
With all of the hand-wringing and media attention surrounding data breaches in the past year or two, you’d think that the number of breaches would be dropping dramatically. Unfortunately, that’s an erroneous assumption.
While listening to NPR (National Public Radio) recently, we couldn’t help but notice that of the brief descriptions of the program’s three corporate supporters, two referred to doing business in the cloud and to data security:
“Support for NPR comes from ... AT&T. With AT&T, the network is on demand, the office is mobile and the cloud is designed for high security. ... And Carbonite — providing secure and automatic backup and recovery for businesses and homes.”
Last week we kicked off Security Awareness Month at Businessolver by encouraging some serious hacking. We cheered on our VP of IT Systems, Tom Pohl, as he headed to Las Vegas to compete at the 23rd annualin the Network Forensics Puzzle Contest. Out of four years of competing as an individual, against teams, Tom has consistently placed in the top four each year. We are delighted to announce that this year, he did it again, taking an impressive 2nd place!
With the headlines filled to the brim with recent data breaches, it might be hard to flip the switch and view hacking as a good thing. But we’ve found that hacking—and good hacking, at that—to be one of our most prized secret weapons when it comes to data security.
Let’s face it. IT-speak does not come naturally to most HR leaders. It’s not necessarily what you’re trained in. Who really knows what “encrypted at rest” means, anyway? And why does it matter?
HR leaders are increasingly being asked to dive into the murky waters of cloud technology and data security, and to be able to discuss what they find with their IT people and the C-suite, a quick refresh on technical terms can go a long way. Here are 8 technical terms that HR should know to help bridge the gap when discussing HR technology security and risk.
A private health care exchange involves the sharing of multiple data points and technology platform security should be of utmost importance to companies that are utilizing, or considering, a private exchange. Ryan Keehn, Businessolver’s Assistant VP Information Technology, was recently interviewed by Brian Kalish, online managing editor for Employee Benefit Adviser, in a podcast tackling private exchange security. Ryan brought up five specific points that you should be discussing with your potential (and current) exchange providers to ensure that your data is secure.