Do your healthcare employees text? Careful – this could be a serious HIPAA compliance problem. According to SearchHealthIT, nurses and physicians are likely already using the unsecure text-messaging apps that come with their personal smartphones to communicate at a quicker pace.
The hiring process overseas can be a much taller hurdle than anticipated – How can enterprise security executives vet candidates effectively?
August 1, 2013
Background checks are a normal course of the hiring process for many companies in the United States. In some industries – like financial services and education – this due diligence is actually mandated by government regulations.
In every element of our daily lives there are rules that guide our behavior. These rules come to us in many forms. From the time we are infants, our parents teach us what types of behaviors are acceptable and those that are not. We all remember the dreaded “No” from our mothers or fathers which was usually coupled with a stern look on their face.
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.