A staggering 91% of data breaches occur at the communication layer – with email being the primary source.
While some breaches are caused by phishing attacks, many information leaks result from well-intentioned employees making accidental mistakes.
Unfortunately, breaches often are not identified until well after they have occurred (if it at all).
As an HR professional, you have likely been trained on how to spot email phishing attacks and other suspicious behavior.
However, despite maintaining good cyber hygiene, it’s possible that you have fallen victim to security vulnerabilities at the hands of others inside your organization.
When you send information over email, you lose control over the security, access and permissions (e.g., printing, forwarding, copying, etc.) of your data.
It’s also very difficult to know if your recipient maintains good cyber hygiene or if they have fallen victim to a phishing attack, thereby allowing others to read their emails.
How do you prevent your information from leaking to unauthorized people?
It’s important to establish a plan for:
We’ve found that most HR departments need to protect data relating to hiring/firing/furloughs, opening/closing of locations, internal investigations, compensation/benefits and other sensitive topics.
Given its sensitive nature, it’s critical that only authorized people have access to this information.
Managers should control what others can do with sensitive data, including whether they can forward, print, copy or edit the information.
Additionally, the ability to delete/destroy/archive conversations and documents can be of paramount importance.
Since email, text message, and team collaboration platforms don’t provide the described level of privacy, security and control, “what does?”
First, let’s identify the technology you should be using:
What solution offers this technology?
Despite everything you do, you don’t have control over other people. We recommend using technology, rather than relying on other people, to stay in control of your information.
If you’d like to learn more, you can schedule time with us here.
Encrypted messaging tools like Signal, WhatsApp, and Telegram are increasingly finding their way into businesses as secure communication solutions. While it may seem like a prudent decision to use them, … Read More