Concurrent Session: Cybersecurity: What HR Practitioners Need to Know
CAHR21
Keyword(s)
General HR, Cyber Threats, Cybersecurity, Employee Data, HR Technology
Concurrent Session:
Cybersecurity: What HR Practitioners Need to Know
presented by Jenny Hayes
Cyber threats are real, and it's not only the responsibility of IT professionals to safeguard data. HR practitioners need to be aware of potential cyber threats. Business Email Compromise (BEC), in particular, is a threat to HR organizations, as scammers are pretending to be C-suite execs and ask unsuspecting HR team members for confidential employee data. At the end of the day, it's the responsibility of the person responding to the email to be "cyber aware."
This session won’t be highly technical, but a practical discussion to cover the recent press regarding phishing and BEC/BES. In 2016, CompTIA revealed that 45% of employees receive no cybersecurity training from their employers. We will address recent reports from the IRS as well as Google regarding phishing scams. Technology transforms how HR departments contact employees, store files and analyze employee performance. When used properly, technology makes HR practices more efficient. When used poorly, it can get in the way of HR operations. Good HR practices maximize the benefits and minimize the problems.
All areas of HR are going to be touched by technology. HR has typically been a bit behind the times on technology. However, things have changed. IT and HR have merged, as many applications that HR professionals use do not involve IT anymore. Cloud-based apps that can run on any browser and are platform/OS independent means that HR practitioners are on their own. About half of all HR systems today reside in the cloud, meaning that HR has become more influential in how technology decisions are made. HR is more likely to "own" its technology while IT's role is limited to ensuring that it meets requirements in security, systems integration and other technical areas. This new dynamic between the HR and IT departments means relationships can grow tense; IT must adjust to a position in which it wields less clout.
Having worked with the Computing Technology Industry Association (CompTIA) to promote their research on cybersecurity, we found:
● 63% of employees use their work mobile device for personal activities.● 94% of employees connect their laptop/mobile to public Wi-Fi networks.● 49% of employees have at least 10 logins, but only 34% have at least 10 unique logins.
We will discuss 5 key areas of focus and tips to help educate your users to change their common “bad habits.”
Learning Objectives include:
1. Top cyber security threats that plague companies today.
2. What is BEC/BES and how does this apply to HR practitioners?
3. Training that can be provided to help empower the HR practitioner and end user.
2. What is BEC/BES and how does this apply to HR practitioners?
3. Training that can be provided to help empower the HR practitioner and end user.
Credits
HRCI - HR (General):1.0, SHRM - PDC:1.0
Description
About the speaker...
Jenny Hayes
Jenny Hayes, MSOD, PHR, has over 20 years of experience in the staffing and technology industries. She earned her BA in Psychology from the University of Oklahoma and her MS in Organization Development from the University of San Francisco. A certified professional in human resources, Jenny is an HR Technologist at a Silicon Valley staffing services company and is a former adjunct instructor at UCSC Silicon Valley. She resides in San Jose, California.