Employees: Its Biggest Potential Security Threat

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Philadelphia &mdash; May 22&nbsp;</strong><br />A company&#39;s greatest security threat might not come from outside sources but from its own employees, and employers need to take specific measures to reduce these potential risks, according to Pepper Hamilton, a multipractice law firm with more than 450 attorneys.</p><p>Among the possible security threats a company&#39;s own employees may pose are:</p><ul><li>Information technology employees potentially represent one of the greatest security risks. </li></ul><p>&quot;With companies increasingly reliant on technology, workers in the information technology department pose one of the greatest potential threats to compromising a company&#39;s systems,&quot; said Jonathan Kane, chairman of Pepper Hamilton&#39;s labor and employment practice.&nbsp; &quot;IT employees know all the &#39;sacred codes,&#39; frequently work during hours when other employees are off, and in restricted-access settings. Some IT employees feel their work is unappreciated, and that they don&#39;t receive their due respect, so bad morale among IT workers can present a big problem.&quot;<br /></p><ul><li>Financial and accounting employees also can be a potential security threat.&nbsp; </li></ul><p>&quot;Employees in the financial functions have access to, and unique knowledge about, the company&#39;s money,&quot; said Sharon Klein, a partner with Pepper Hamilton. &quot;Bad morale among financial employees could give workers an incentive to steal.&quot;<br /></p><ul><li>Employees bringing work or work materials outside the office can be another possible security threat. </li></ul><p>&quot;A company&#39;s secure data, such as client or consumer identification information, could be at risk if misplaced,&quot; Kane said. &quot;Many security breaches have occurred when laptops were misplaced or stolen. Although forbidding employees from taking work home may be counterproductive and ultimately unavoidable, restricting who can do this, for what purposes and for how long, can decrease loss of confidential data &mdash; and can put procedures in place that more closely monitor who takes home what.&quot;<br /></p><ul><li>Employees with drug or gambling problems are another potential security threat.&nbsp; <br /></li></ul>&quot;Workers with these problems may be tempted to steal to sustain their addictions or cover their losses,&quot; Klein said.<p>Among the tips Pepper Hamilton offers employers to diminish possible security breaches caused by their employees are:<br /></p><ul><li><strong>Conduct background checks. </strong>&quot;Before making a hire, companies should conduct an employee screening that includes prior references, a criminal background check and a credit check,&quot; Kane said.&nbsp; &quot;Although screening won&#39;t necessarily pick up bad behaviors, it is a process that will provide employers with a better understanding of the people they are hiring. Sophisticated attorneys can assist with improved background screening that helps get important reference data.&quot; </li></ul><ul><li><strong>Establish a social contract. </strong>&quot;The social contract between employers and employees is quickly deteriorating,&quot; Klein said. &quot;People are not as loyal to their employers as they once were. But more importantly, employees generally do not feel as valued and appreciated. Employers need to pay more attention to the way they treat their employees on a daily basis and establish a comfortable and loyal workforce.&quot; </li></ul><ul><li><strong>Make employees aware of confidentiality policies. </strong>&quot;Problems can arise in the transfer of trade secrets or confidential information to someone outside the company,&quot; Kane said. &quot;Employees should be informed of a company&#39;s general confidentiality policies, especially with regard to e-mail. Often, these clauses are buried in an employee handbook, even though they are essential to maintaining a company&#39;s key assets. Take time to train, educate and remind on an ongoing basis.&quot;</li></ul><ul><li><strong>Adapt company policies to new technologies. </strong>&quot;As technology continues to evolve, businesses need to be informed and adapt their policies accordingly.&nbsp; Now that cell phones can take pictures, and external hard drives can easily download a computer&#39;s entire content, there are more ways a company&#39;s sensitive information can be compromised,&quot; Klein said.</li></ul>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>