Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Operation Management Expert

Putting human resources at the heart of cyber security The UK government considers cyber security as a tier-one national security priority alongside international terrorism, with an annual cost of around £27 billion. Yet research shows that 96 per cent of all cyber crime could be addressed through adherence to the basic security policies that already exist in many organizations. In order for these policies to be effective, however, employees must understand their value and demonstrate their commitment to improved security by consistently applying them in the way they think and behave. Human resources directors can play a key role in keeping organizations safe in cyberspace by: Taking ownership of the security risk posed by employees Most employees assume that cyber security is a technical issue and it is not until after a successful attack that they start taking personal responsibility for security. Attitudes like this make an organization vulnerable. To improve their chances of success, hackers are now searching out the organizations that are likely to be less aware of the cyber threat: those that have not been attacked yet, such as smaller companies or those with a lower public profile. HR has a vital role to play in educating employees about the impact their attitudes and behavior have on the organization’s security. Ensuring that security measures are practical and ethical Controls can stop people acting in a way that places the organization at risk, but they must be consistent with the way people behave and think. For example, randomly generated passwords are hard to crack, but most people have to write them down, which defeats their purpose. Monitoring can allow organizations to examine what employees are doing but often raise questions of trust and cross the boundary between private life and business. The HR team is best placed to advise on whether policies are likely to work and whether they are appropriate. Identifying employees who may present a particular risk Breaking into a network takes minutes. However, finding and safely extracting what they want may take criminal’s months or even years of research and planning. To shorten this process, cyber criminals are getting help from insiders (whether knowing or manipulated) in more than half of all advanced attacks. Attackers use social media to identify a useful target and to create a relationship with them. They target people with a pre-disposition to break security controls such as those with strong views, who do not react well to authority. They look for a trigger event, which will break the employee's psychological contract with their employer – such as a demotion, change in role, redundancy or dismissal. Employees who take action against their employer are most likely to do so within 30 days of such an event. This gives the HR team a chance to intervene, including taking steps to increase monitoring and deter them. Managing an employee's exit with a view to security is also one of the most critical of all the contributions the HR team can make. PA has worked with the UK government’s Centre for the Protection of National Infrastructure (CPNI) to help define, develop and deliver new national guidance on managing people, physical and cyber risk. The guidance will ensure the UK is at the forefront of enabling organizations across its national infrastructure to reduce counterproductive behavior. The Article expresses that monitoring can allow organizations to examine what employees are doing for prosecution but on the flip side this often raise questions of trust and cross the boundary between private life and business. Is monitoring workers within an organization doing more harm then deterring cyber attack by creating its own HR issue of violation of privacy?

Operation Management, Management Studies

  • Category:- Operation Management
  • Reference No.:- M91980481

Have any Question?


Related Questions in Operation Management

1 educate us on one of the terms covered under corporate

1. Educate us on one of the terms covered under Corporate Intelligence 2. What three cultural influences have you seen in your fire department’s relationship with the community and with fire prevention, specifically? 3. ...

Aggregate planningfind the optimal aggregate plan for

Aggregate Planning Find the optimal aggregate plan for Example 3 (on Slide 25) by using LP method. Explain how your plan meets the demand of each period, i.e., how much of regular, overtime and subcontract capacity utili ...

Deere amp company recorded its best-ever year in fiscal

Deere & Company recorded its best-ever year in fiscal 2013, with sales and earnings of $37.8 billion and $3.5 billion, respectively. The company’s revenues and earnings declined to $36.1 billion and $3.2 billion in fisca ...

To assess your understanding for e- supply chain e

To assess your understanding for E- Supply Chain / E Logistic Management in an organization of your choice or the startup business of yours. Action Items: Create or choose any business organization of your choice and des ...

1 how can an eventual sponsorship be integrated into the

1. How can an eventual sponsorship be integrated into the total marketing plan for Helly Hansen clothes in the US market? 2. Identify 4 companies that are innovative , two less than 5 years old and others at least 10 yea ...

1 how does the wwe world wrestling entertainment

1. How does the WWE (World Wrestling Entertainment) Differentiation Strategy? to stay successful and at the same time continue to grow? 2. Please analyze or summarize globalization, corporate social responsibility, susta ...

Assignmentthe property manager of a city government issues

Assignment The property manager of a city government issues chairs, desks, and other office furniture to city buildings from a centralized distribution center. Like most government agencies, it operates to minimize its c ...

While risks may be obvious in a project individual biases

While risks may be obvious in a project, individual biases can influence the ability for change to be effective and may be more subversive. The purpose of this assignment is for you to explore potential biases that can a ...

1 evaluate the performance of the ceo of fedex from the

1. Evaluate the performance of the ceo of FedEx from the perspective of (a) stockholders, (b) employees, (c) customers, and (d) suppliers. What does this evaluation tell you about the ability of the ceo and the prioritie ...

1 as a manager looking to hire additional workers what

1. As a manager looking to hire additional workers , what steps would you take to maximize the effectiveness of your recruitment effort using social media ? 2. Talk about current Stratgic of eBay company? 3. What type of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As