Sign-up to receive updates or join our viber community. Keep safe!



544 Views.

The Norton 2013 Cybercrime Report¬†provided a good basis to propose an initiative for the 2014¬†strategic¬†plan. The HR¬†in me would not want to pass this opportunity to be proactive and take on a lead role in reducing the risk exposure of the company and its employees to¬†cybercrime. This will be the topic of this article, the 3rd instalment of my 3 post-mini-blog series about the 2013 Norton Report.¬†To start the ball rolling, ¬†let’s have a brief review:

Now to lay down the basis for the HR initiative, let’s go back to Norton’s findings:

 


Though only key positions are given company-issued mobile devices (laptop, tablets, smartphones), these employees are likely to access confidential and proprietary information using their mobile devices, and in some cases, store this info on their device. In the absence of safety and security guidelines, the company may be at risk.

Likewise, the absence of clear-cut guidelines or culture of liberality on the use of company-issued devices may put at risk mobile devices from malware, and find their way to the company network.

When USB ports are disabled on most company computers, employees resort to cloud storage or social networks to save and access their files in real-time to continue working at home or off-site.

Now, this is where the strategic function of HR comes in handy. Since the online security gap is about employee behaviour and can be addressed by guidelines, policies and orientation/training, HR should initiate and take the lead in providing a solution.

In my observation, this is the main reason why a company, through its employees, can be at risk of cybercrime.

Without online philosophy, digital and mobile safety guidelines & policies, and employee training, behaviour of employees can place the company at risk.

As a¬†Brand, Social Business and HR/OD ¬†Strategist rolled in one as a consequence of my organic work in HR/OD, ¬†early adoption to Social Web and hands-on experience to digital marketing, here’s my recommendation:

We can find the balance between liberality & creativity on one end (fun side), and security and control on the other (boring side).

Sonnie Santos giving a talk at Norton's 2013 Report Press briefeing. Photo courtesy of Technoodling

Sonnie Santos giving a talk at Norton’s 2013 Report press event. Photo courtesy of Technoodling

As¬†strategic¬†partner, HR should collaborate with IT, Marketing and Corporate Communications (if this function is not part of either HR or Marketing) to draft an all-inclusive online philosophy, digital and communication strategy, social web and mobile safety guidelines & policies. The group’s output can be used as the basis for employee orientation and training on “mobile and surf safe habits“, “online reputation management” and “personal and corporate privacy”. IT can propose anti-virus solutions and other interventions to protect the company network and IT infrastructure, while Marketing can provide the framework for brand management and Corp. Communications, the framework on social media and online postings and communications.

Below are the consequences of a lack of digital framework and social web guidelines/policies if an initiative fails to take off.

  1. Employer branding is not aligned to marketing’s overall brand strategy
  2. Employees will use social media, unofficially, to get work done, i.e. unofficial creating a fan page for recruitment
  3. Employees will use social media to rant displeasure to their boss or organisation.
  4. The employee will over share- confidential, proprietary and strategic information being shared by loyal, proud and over-enthusiastic employee
  5. There will be unregulated and unsecured use of cloud storage
  6. There will be undefined and blur lines between fun and work
  7. Unclear responsibility of recipients of company-issued mobile devices
  8. Employee misuse of marketing collaterals on social media

These undoubtedly will result to

  1. Employer reputation being tarnished by employee online behaviour
  2. Loss of strategic advantage when confidential and propriety information is accidentally leaked-out
  3. Compromised mobile devices, and eventually the company network
  4. Waste of company time and resources
    • for uncoordinated and unaligned strategies
    • man-hours lost for unregulated use of internet and social web of ¬†employees
    • bandwidth wastage¬†for unregulated use of internet and social web of employees

Corporate inaction to harness opportunities and prevent the risk provided by mobile and social computing will result in substantial losses in real money, strategic advantage and other resources.

Speak up and let me know your thoughts.

Liked this article? You can buy us a coffee, subscribe to get updates, or join our viber community