Protecting Employees From Data Breaches

Most of us have read about large data breaches, like the recent Yahoo breach of 500 million accounts, reportedly the largest such incident in history. Businesses are ramping up security, training, response, and insurance tactics to respond to this ever-increasing threat.

Although this continues to be a significant area of focus, many businesses fail to realize that many of their employees have been “hacked” through these data breaches and are struggling to regain their identity, repair their credit, or repair their health records.

This scenario is becoming almost commonplace, causing presenteeism (coming to work despite illness, injury or anxiety but resulting in reduced productivity), missed work and undue stress.

Unfortunately, businesses need not only a strategy to protect the business itself but also a strategy to help employees impacted by breaches. A solid plan can actually become an employee benefit.

Recently, an employee of a local business experienced a cyber breach of his medical records, which resulted in over $500,000 in medical expenses being “charged” to his health insurance account. This created a record-clearing nightmare for this individual. He had to work to repair his medical records, have financial records changed and charges reversed, and consider credit monitoring.

To make matters worse, the insurance company was uncooperative and unresponsive. As you can imagine, this breach that impacted one individual has created significant effort, strife and poor feelings about a “benefit” being provided to him by his employer.

Employees can experience cyber breaches at home or work. These breaches can have a significant negative impact on both the employee and the company, regardless of the source.

Much has been written about the big breaches like Target and Yahoo, but many are impacted by all types and sizes of breaches. The likelihood of your business associates or you personally being “hacked” is growing every day.  

Most businesses would benefit from providing employees with training, tools, resources and insurance advice to reduce the impact on employees and, ultimately, their company.

Some basic computer protection is always in order. This applies to business, personal and mobile devices. IT professionals can assist with installing firewalls, anti-virus programs and security software. Updating software programs with upgrades provided regularly by software manufacturers is critical in keeping all programs up to date with security provisions. Regular backup of all devices is paramount.

Passwords are my personal nemesis. Making sure they are changed regularly, making them “strong and secure” and storing them in a safe and secure place are key security practices.

Many hackers use password-cracking software, and weak passwords are especially vulnerable.

Some basics password-creation tips:

  • Make them at least 10 characters in length, including at least one uppercase letter
  • Include one or two special characters, and include one to four numbers
  • Passwords should be changed regularly (at least annually) and should be different for most accounts

Most businesses develop training programs for staff. Many, however, do not provide effective training on business and personal computer security.

Protecting online accounts from phishing is an example of a tactic used to “trick” a user into providing information or clicking on a link that installs malware. Training programs that address the strategies hackers use, such as social media security, mobile devices and wireless networks, can prove invaluable for both business and personal users.

In addition to training, businesses can help employees by offering group discounts or access to credit monitoring/fraud prevention services.

Services such as Identity Guard, Lifelock and All Clear ID are just a few of the offerings that provide help monitoring credit reports, website surveillance and restoration of identity, finances and health information.

Individual insurance coverage can be added to or included in an employee’s personal insurance program such as a home-owner’s policy. This coverage is normally limited for items such as lost wages, costs associated with restoration and legal fees.

Businesses can and should be an advocate for their employees, and computer security is no exception. This area is particularly important for both the business and its employees. Training, services and insurance advice can be part of an overall strategy to reduce risk and create an additional employee benefit.

News-Leader:           Dealing With Insider Data Theft:    Seven Profiles Of Highly Risky Insiders:

« Non-Secure IoT Devices Are Powerful Weapons
WikiLeaks Wants A Database To Verify Twitter Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.