The Wall Street Journal (WSJ) recently published an article that shines a spotlight on hacking—“What I Learned From the Hacker Who Spied on Me”—and how easily someone can access one of your many devices and technology. They accomplish this through a process called phishing. Pronounced like fishing, phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
In the WSJ piece, journalist Joanna Stern hired an ethical hacker, Alexander Heid, the hacker tried to access her computer and home. Very quickly he was able to easily access her home network, sending a webcam photo of Joanna’s daughter sleeping in her bedroom. Alexander talks in the article about how he accessed her network, which happened to be by applying for a job. He created a fake persona applying for a videographer job with a resume attachment and a video reel. The scariest part is, it worked. In the pilot episode of the Workolog Go podcast, I touched on how data security concerns are growing in importance as more HR teams, their data, and employee records are housed in the cloud. Here, I’m going to dig a little deeper into how to keep your data and employee records secure.
Some losses are easy to calculate, such as time spent on help desk activities, investigations and legal defense. Other losses are harder to quantify, such as reputational damage to the business. A report by Gemalto’s Breach Level Index reveals that 945 data breaches led to a staggering 4.5 billion data records being compromised worldwide in the first half of 2018, with the total number of breaches down year-on-year—but the number of records compromised up 133 percent as the severity of incident rises. Malicious outsiders caused the largest percentage of data breaches (56 percent), a slight decrease of almost seven percent over the second half of 2017 and accounted for over 80 percent of all stolen, compromised or lost records.
Accidental loss accounted for over 879 million (9 percent) of the records lost this half, the second most popular cause of data breaches representing over one third of incidents. The number of records and incidents involved in malicious insider attacks fell by 50 percent this half compared to the same time period in 2017.
According to the 2018 Cost of a Data Breach Study: Global Overview from IBM Security and Ponemon Institute, the global average cost of a data breach is $3.86 million, up 6.4 percent from the previous year. When broken down by country, the U.S. is leading in the most data breaches, equaling out to $7.91 million. Next is Canada with $4.74 million average cost for data breaches and Germany with $4.67 million. The countries with the smallest average cost was Brazil ($1.24 million) and India ($1.77 million).
Also included in the study was the amount of time it took for the companies to identify a data breach in their systems. The average time companies took to identify their breaches was 197 days and 69 days, respectively. The study noted that companies that contained their breach within 30 days ended up saving over $1 million vs. those that took over 30 days to resolve the situation.
As HR and workplace leaders, data security must be at the top of your list in order to protect your company. Human resources is the hub for all employee and candidate data. Considering the example I began with in this post, HR is also the most vulnerable to data breaches. The following steps are a good starting place to review any potential areas of vulnerability and institute best practices to protect your company’s data.
Data protection is one of the highest stakes areas of compliance for any company. According to SHRM, state laws are the primary source of potential identity-theft liability for employers. “State laws in this area are a patchwork collection and are neither uniform nor completely consistent,” said Patrick Fowler, an attorney with Snell & Wilmer in Phoenix, in an interview with SHRM Online. California and Massachusetts have been more active than other states in passing data privacy legislation, but virtually all of the states have data breach notification laws. Employers should make sure they know what is required under relevant state laws.
When selecting a vendor that manages data, such as candidate and employee data collected during a background screen or criminal background check, it’s important to work with a verified company with certification in the industry and a pristine reputation. Because your third-party vendors are collecting data on behalf of your company, they must be as vigilant (if not more so) in protecting that data. Companies like Cisive not only ensure data security, they can also help with recruiting database integration best practices to advise your company on best practices for maintaining secure transmission and exchange of data.
Supported By WordPress Database Support Services