Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing administrative headaches for the business and encouraging employee participation. The key is to find an appropriate balance that protects the business while allowing employees to take advantage of the technology.
Resource Search
Countless hours are spent training employees to provide excellent service, and it is this helpful nature that con artists use to get privileged information through deception. This tactic is called Social Engineering and can be attempted via any of the ways that people communicate with each other. It is a highly effective weapon in the hacker's arsenal, but there are ways to thwart it.
At the heart of risk management is a gloomy truth: You can never achieve zero risk. In a world of limited resources there are always tradeoffs to be made: how much to invest here and how much there, how much risk to tolerate and how much to mitigate or insure against. To answer those questions, risk quantification is necessary—to estimate how likely an outcome is to occur and more importantly, what will the cost be; translating complex real-world events into dollar figures that can enable rational decision making is critical to effective risk management.
Workplace harassment costs employers millions of dollars every year through poor employee morale, higher absenteeism, reduced productivity and costly settlements and lawsuits. Employers need to create the right culture, supported by appropriate policies and training. With the recent stunning revelations from Hollywood, the Media and Washington have clearly signaled that sexual harassment remains a serious social issue.
The 13th edition of the World Economic Forum's Global Risks Report, undertaken with Marsh & McLennan Companies, examines the evolving macro-level risk landscape and highlights the systematic threats that may disrupt expectations.
Three major cyber events in 2017 set new precedents for the scope and impact of damage wrought by cyber-attack in terms of geographic and industry reach, operational disruption, and economic losses, as well as the destruction of market capital and reputation. While the concepts of cybersecurity may be foreign for many executives and board members, protecting their companies against risk is not. Great executives understand their limitations and leverage resources to fill the gaps.
Valentine’s Day is a time when employees celebrate, while HR representatives, in-house counsel, and business owners hold their breath. In this #MeToo era, employers should consider proactively addressing workplace relationships and shoring up internal policies for dealing with complaints. Here are some tools to help employers get in the Valentine’s Day spirit.
Artificial intelligence (AI) is advancing quickly, and it’s impossible for anyone to give a precise vision of how the next ten—much less five—years will unfold. Our aim here is different: to make specific predictions about AI trends for the next 12 months and draw out key implications for business, government, and society as a whole.
The future. It’s the topic on the mind of most business leaders—what’s going to happen in the future? And importantly, how do you ensure you’re prepared for it? Today, as technological advances impact the scale, scope, and utility of data and information, a new ecosystem of information and trust is taking shape around us. Businesses are responding by using and reporting information that goes beyond financial information.
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine. With enough policies and procedures in place, Social Engineering Fraud (SEF) is preventable. However, what these professional criminals are counting on is being able to manipulate an employee to violate the company’s policies.