HR’s Role in Protecting Your Business

As part of our “security takes a village” theme, we are exploring how stakeholders other than dedicated cybersecurity or IT teams can take part in the protection of your organization. Today our own HR Manager Alyssa Miller looks at cybersecurity challenges facing HR, ways that HR stakeholders can help protect the entire organization, and the implications to the small to medium-sized business for involving HR at the highest level.

I’m the Human Resources Manager for IntelliGO Networks, so I have a unique perspective on this topic – a healthy mix of cybersecurity awareness and the general responsibilities, challenges, and goals within my department. Typically, people in HR are quite sensitive to privacy, since we deal with personal information and have conversations in strict confidence. So, what can we do to help secure our department and our company as a whole? Ultimately, leading by example, collaborating with others, and being an ally for those more traditional security stakeholders can help. I will show my peers how we help just by doing our jobs well, and our IT and Leadership readers the opportunities to contribute!

No Stranger to Sensitive Information

HR has access to some of the most personal/sensitive data within an organization! You have personally identifiable information (from email addresses to Social Insurance Numbers), not to mention employment contracts, payroll/banking information; all attractive to hackers, or disgruntled insiders. Other information is particularly sensitive to employees – like personal details around their health, disciplinary actions taken against them, complaints against/made by them, results of their police checks. Plus, you have a lot of it; you capture information about all past, present, and future employees!

This makes HR a target for people trying to access or manipulate information, but also the perfect choice to help secure it! For example, I recently received an (Read more...)

*** This is a Security Bloggers Network syndicated blog from IntelliGO MDR Blog authored by IntelliGO Networks. Read the original post at: