A merger and/or acquisition (M&A) can be an excellent way to expand your business. Done right, they can bring in new capabilities, help you reach new market segments, and take competitors under your own corporate umbrella. Unfortunately, if you’re not cautious, they can also end up being a cybersecurity nightmare.
Update: News items that revolve around car maker Tesla and its maverick CEO Elon Musk tend to attract a great deal of attention. Yet somehow, despite all the attention, the events in question have a fuzzy quality about them. No one situation exemplifies this better than last summer’s story about Musk’s claim about an insider […]
The current job market is hot, and with unemployment at a low, many employers are struggling to attract top talent. While most industries are struggling to recruit the best people, those who are looking for qualified cybersecurity personnel might need to dig deep into their reservoir of patience. Hiring managers tasked with posting cybersecurity jobs […]
In part 1 of this article, HR Daily Advisor editor Jim Davis spoke with Catherine Mattice-Zundel, a consultant, coach, trainer, and Workplace Violence Prevention Symposium 2019 presenter had to offer about workplace bullying, including where it parallels harassment and what the differences are under the law. Today we’ll look at the importance of accountability as […]
Sensitive data are high-value targets for hackers who will do (and can do) seemingly anything to get them. Large-scale attacks should serve to remind us to stay vigilant and motivate us to employ robust cybersecurity solutions to guard our data. The unfortunate reality is that even the most powerful tech can’t guard against things like […]
Account takeover incidents, where attackers steal employee credentials and use them to send e-mails from the user’s real account, are increasing in frequency and magnitude. In this report, we take a closer look at the motives and demographics behind these attacks.
Most workers are familiar with or have at least heard of phishing attacks by now. Despite their varying levels of complexity, they share a core commonality: External threat actors pretending to be someone they are not (i.e., foreign dignitary, third-party vendor) to trick an employee into turning over their access credentials, click a malicious link, […]
TrainingToday®, a leading provider of online education programs for employees and supervisors, was selected for Training Industry’s Top 20 Health and Safety Training Companies list for the second year in a row.
What’s not to love about flying? You get to sit uncomfortably close to strangers, are cut off from your e-mail, and get to choose between broken cookies or bland pretzels to snack on. What’s not to love? Well, now you can add sexual predators to that charming list of in-flight hazards.
The core components of a Threat Assessment Team should stay mostly the same, with HR, Security, Legal, and the CEO’s office representing the most critical departments. Certain industries and organizations can benefit from staffing their teams with specific participants that bring a necessary subject matter expertise.