you're visitor #


The Norton 2013 Cybercrime Report¬†provided a good basis to propose an initiative for the 2014¬†strategic¬†¬†plan. The HR¬†in me would not want to ¬†pass this opportunity to be proactive and take on a lead role in reducing the risk exposure of the company and its employees to¬†cyber crime. This will be the topic of this article, the 3rd instalment of my 3 post mini-blog series about the 2013 Norton Report.¬†To start the ball rolling, ¬†let’s have a brief review:

Now to lay down basis for HR initiative, let’s go back to Norton’s findings:


Though only key positions are given company issued mobile devices (lap top, tablets, smartphones), these employees are likely to access confidential and proprietary information using their mobile devices, and in some cases, store these info on their device. In the absence of safety and security guidelines, the company maybe at risk.

Likewise, the absence of clear-cut guidelines or a culture of liberality on the use of company issued devices may put at risk mobile devices from malware, and find it’s way to the company network.

When USB ports are disabled on most company computers, employees resort to cloud storage or social networks to save and access their file real time to continue working at home or off site.

Now, this is where the strategic function of HR comes handy. Since the online security gap is about employee behaviour, and  can be addressed by guidelines, policies and orientation/training, an HR turf, HR should initiate and take the lead in providing a solution.

In my observation, this is the the main reason why a company, through it’s employees, can be at risk to cyber crime.

Without online philosophy, digital and mobile safety guidelines & policies, and employee training, behaviour of employees can place the company at risk.

As a¬†Brand, Social Business and HR/OD ¬†Strategist rolled in one as a consequence of my organic work in HR/OD, ¬†early adoption to Social Web and hands-on experience to digital marketing, here’s my recommendation:

We can find the balance between liberality & creativity on one end (fun side), and security and control on the other (boring side).

Sonnie Santos giving a talk at Norton's 2013 Report Press briefeing. Photo courtesy of Technoodling

Sonnie Santos giving a talk at Norton’s 2013 Report press event. Photo courtesy of Technoodling

As¬†strategic¬†partner, HR should collaborate with IT, Marketing and Corporate Communications (if this function is not part of either HR or Marketing) to draft an all-inclusive online philosophy, digital and communication strategy, social web and mobile safety guidelines & policies. The group’s output, can be used as basis for employee orientation and training on “mobile and surf safe habits“, “online reputation management” and “personal and corporate privacy”. IT can proposed anti-virus solutions and other interventions to protect the company network and IT infrastructure, while Marketing can provide the framework for brand management and Corp. Communications, the framework on social media and online postings and communications.

Below are the consequence  of a lack of  digital framework and social web guidelines/policies if an initiative fails to take of.

  1. Employer branding is not aligned to marketing’s over-all brand strategy
  2. Employee will use social media, unofficially, to get work done, i.e. unofficial creating a fan page for recruitment
  3. Employee will use social media to rant displeasure to their boss or organisation.
  4. Employee will over share- confidential, proprietary and strategic information being shared by loyal, proud and over enthusiastic employee
  5. There will be unregulated and unsecured use of cloud storage
  6. There will be undefined and blur line between fun and work
  7. Unclear responsibility of recipients of company issued mobile devices
  8. Employee misuse of marketing collaterals on social media

These undoubtedly, will result to

  1. Employer reputation being tarnished by employee online behaviour
  2. Loss of strategic advantage when confidential and propriety information is accidentally leaked-out
  3. Compromised mobile devices, and eventually the company network
  4. Waste of company time and resources
    • for uncoordinated and unaligned strategies
    • man-hours lost for unregulated use of internet and social web of ¬†employees
    • bandwidth wastage¬†for unregulated use of internet and social web of employees

Corporate inaction to harness opportunities and prevent the risk provided by mobile and social computing will result to substantial losses in real money, strategic advantage and other resources.

Speak-up and let me know your thoughts.


Thanks for subscribing!