Do your healthcare employees text? Careful – this could be a serious HIPAA compliance problem. According to SearchHealthIT, nurses and physicians are likely already using the unsecure text-messaging apps that come with their personal smartphones to communicate at a quicker pace.
The hiring process overseas can be a much taller hurdle than anticipated – How can enterprise security executives vet candidates effectively?
August 1, 2013
Background checks are a normal course of the hiring process for many companies in the United States. In some industries – like financial services and education – this due diligence is actually mandated by government regulations.
In every element of our daily lives there are rules that guide our behavior. These rules come to us in many forms. From the time we are infants, our parents teach us what types of behaviors are acceptable and those that are not. We all remember the dreaded “No” from our mothers or fathers which was usually coupled with a stern look on their face.
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
Schools, businesses and enterprises across the world have experienced a paradigm shift since the terrorist attacks on Paris and Belgium. As active shooters and terrorists get more creative in choosing and evaluating softer targets, security leaders are striving to keep their enterprises safe and alert without damaging the culture.