Remove Computer Remove Security Remove Technology
article thumbnail

Employers may be responsible for employee damages from cyber security hacks

BMT Office Administration

Mail scams may be making a comeback, but the quickest, easiest, and most efficient way for a scammer or phisher to steal employees’ identities is to hack into your computer network. But ESS portals are risky, too, because they create more points of entry into your computer network for phishers to create havoc. The case is Dorsey v.

Security 246
article thumbnail

Overcoming Zero Trust Challenges with Edge Computing

Spiceworks

Could edge technology make zero trust security more financially and logistically feasible? The post Overcoming Zero Trust Challenges with Edge Computing appeared first on Spiceworks.

Computer 166
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Balancing Technology in the Workplace: 9 Tips That Actually Help

Insperity

In our personal lives, and at work, technology can be a blessing or a curse. In many instances, technology boosts productivity. Who owns the technology? When employees use their own devices for work purposes, they’re responsible for keeping your company’s networks and data secured. Remember who owns the device.

article thumbnail

Are your one-on-one meetings falling flat? Try these tips

Insperity

If all you want to know is the status of a project, use technology as much as possible. Put your computer in sleep mode to avoid notification dings and pings. Put secondary computers in sleep mode. Secure a quiet room: If you are in the office, and you have a door, you’re all set. Mute or forward all calls on desk phones.

Computer 312
article thumbnail

You need a data protection policy – Here’s the basics

Insperity

From communicating the importance of information security to new employees to dealing with the potential information security issues every company faces, you play a vital role in keeping company information safe. Personally identifiable information no longer only includes data like social security and driver’s license numbers.

article thumbnail

Protect Your Workplace From Cyber Security Threats

The Receptionist

Additionally, dealing with a cyber security attack can overburden your employees and ultimately lead to employee churn, as well. While protecting your workplace from cyber security threats may seem like an overwhelming job, fortunately, there are simple things you can do right now to thwart unwelcomed attacks. That’s the bad news.

Security 130
article thumbnail

How to bridge the generation gap in the workplace

Insperity

What their comfort level is with new technologies. Biggest technology development in their childhood was the widespread use of TVs and phones. Witnesses to the rise of computers (“digital immigrants”). Ability to see expanded possibilities, as a result of the rapid proliferation of new technologies. Job security.