The Best Security Advice from Leading Experts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22
Next The Best Security Advice from Leading Experts-3 Next

Bring HR into the Mix

HR and IT departments are realizing that they must work together more closely to prevent serious data breaches, and Jacqui Summons, international HR director at Clearswift, explained how to start making that transition to closer cooperation and communication:

"The advice I've given to HR people is not to make an assumption that this task fits within the IT function, and that there's therefore no need for them to be involved. Ask the questions you need to ask — don't just assume that somehow or other this is magically being sorted by your IT function, and that you will never suffer any kind of data breach. The challenge, in terms of asking the right questions, is one I face myself, to a degree — HR people are typically not very technically minded. That isn't normally what you find within an HR function. For some HR people it's a whole new world, and a whole new language that they have not in the past had to be involved in."

Read more at Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says.

Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.

In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.