{"id":2230,"date":"2021-01-17T15:23:07","date_gmt":"2021-01-17T14:23:07","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=2230"},"modified":"2021-01-17T15:23:07","modified_gmt":"2021-01-17T14:23:07","slug":"workplace-privacy-data-management-security-report","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2021\/01\/17\/workplace-privacy-data-management-security-report\/","title":{"rendered":"Workplace Privacy, Data Management &amp; Security Report"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/bf704-img.jpg?w=756\" alt=\"\" class=\"wp-image-1352\" width=\"836\" height=\"557\" \/><\/figure>\n\n\n\n<p>The implementation of the European Union\u2019s General Data Protection Regulation (GDPR), was effective date of May 25, 2018, is just around the corner, and with it will come pressure on the human resources (HR) department to update its approach to handling employee data. The GDPR significantly enhances employee rights in respect to control over their personal data.<\/p>\n\n\n\n<p>In particular, the GDPR introduces the concept of a \u201cright of erasure\u201d i.e. a \u2018right to be forgotten\u2019. Although the concept currently exists under EU law, it is currently applicable under very limited circumstances, when data processing may result in damage or distress. Under the GDPR, pursuant to <a href=\"https:\/\/gdpr-info.eu\/\">Article 17<\/a> and <a href=\"https:\/\/gdpr-info.eu\/recitals\/no-65\/\">Recital 65<\/a>, an employee will have a right to have his\/her data erased and no longer processed, where consent of processing is withdrawn, where the employee objects to such processing, or where processing is no longer necessary for the purpose for which it was gathered. That said, the employer, under certain circumstances, can refuse to comply with an employee\u2019s request for erasure of personal data \u2013 where data processing is required by law or in connection with a legal proceeding.<\/p>\n\n\n\n<p>Further, there is a time limit for responding to a request for erasure of data by an employee. An employer will be required to comply with a request by an employee \u2018without undue delay\u2019, and not later than one month of receipt of the request, together with the reasons for delay (<a href=\"https:\/\/gdpr-info.eu\/art-12-gdpr\/\">Article 12<\/a>).<\/p>\n\n\n\n<p>To effectively meet the GDPR\u2019s new requirements, employers will need to take stock of the employee data they process related to EU operations (see Does the GDPR Apply to Your U.S.-based Company?). What categories of EU employee data are processed? What categories of EU employee data are processed? Where does it comes from? In what context and where is it processed and maintained? Who has access to it? Are the uses and disclosures being made of that information permitted? What rights do EU employees have with respect to that information? The answers to these questions are not always self-evident. Employee data may cover current, former, or prospective EU employees as well as interns and volunteers. It may come from assorted places and be processed in less traditional contexts.<\/p>\n\n\n\n<p>To better understand how an employee\u2019s \u201cright of erasure\u201d will impact day-to-day HR operations, below are a few practical examples of instances where an employee will have the right, under the GDPR, to request that his\/her data be erased and no longer processed.<\/p>\n\n\n\n<p>Circumstances where an HR department may be compelled to erase employee data:<\/p>\n\n\n\n<p>You collected the data during the employee\u2019s hiring process, but, following the completion of that process, you can no longer demonstrate compelling grounds for continuing to process it.&nbsp; Such data could include, inter alia: (i) past employment verifications, (ii) education and credential verifications, (iii) credit reporting and other financial history data, (iv) government identification numbers.<\/p>\n\n\n\n<p>You collected data about an employee in order to administer benefits to him or her, but the employee has since de-enrolled from the benefits program.<\/p>\n\n\n\n<p>You collected employee online monitoring data for work productivity purposes \u2013 but you collected data which the employee does not expect is reasonable processing (personal emails, personal messenger conversations, etc.).<\/p>\n\n\n\n<p>You collected employee data (g., profiling data) for use in evaluating whether to promote an employee to Position X, but end up promoting another employee to that position instead.<\/p>\n\n\n\n<p>You processed data related to employee job performance issues (g., late arrivals, absences, disputes with a coworker, etc.) a number of years ago, and the employee has not had similar issues since.<\/p>\n\n\n\n<p>You collected identifying data on an employee such as an employee\u2019s past address, phone number, email address, username, financial account information, etc., but the employee has since provided updated information.<\/p>\n\n\n\n<p>Employers must be ready to comply with the new EU data regime upon its effective date next month. If your organization has not yet started, it should begin implementing policies and procedures that inform employees of their enhanced rights to control over their personal data, ensure that operationally the organization can comply with such rights, and train HR personnel handling employee requests for erasure of data. This includes developing a plan of how to respond timely and effective to employees\u2019 requests, and a review process for when there is a legal basis to deny a request.<\/p>\n\n\n\n<p>I have created over the years I am working within IT Security a report which I am using in almost any company and this is for you free to use, I will show an example of this report and you have the ability to download this template for your benefit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/x.jpeg?w=1024\" alt=\"\" class=\"wp-image-2240\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/y.jpeg?w=1024\" alt=\"\" class=\"wp-image-2241\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/z.jpeg?w=1024\" alt=\"\" class=\"wp-image-2242\" \/><\/figure>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/security-report.pdf\">security-report<\/a><a href=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/security-report.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2018\/06\/sengg1.jpg?w=698\" alt=\"\" class=\"wp-image-756\" width=\"838\" height=\"361\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2018\/06\/sengg1.jpg 698w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2018\/06\/sengg1-300x129.jpg 300w\" sizes=\"(max-width: 838px) 100vw, 838px\" \/><\/figure>\n\n\n\n<p><strong>The cybersecurity industry is rapidly growing every day. As more specialists join the ranks,\u00a0more malware is being launched than ever before, with approximately\u00a0230,000 new malware samples\/day.\u00a0 Although more resources are being deployed to counter cyber-attacks, the nature of the industry still has a long way to go before we can, as a whole, catch up with these threats.<\/strong><\/p>\n\n\n\n<p> It\u2019s important for us to define what the current information security and cybersecurity industry looks like with these alarming\u00a0<strong>13 Cyber Security Facts and Stats.<\/strong><\/p>\n\n\n\n<p><strong>3. 95% of breached records came from only three industries in 2019<\/strong><\/p>\n\n\n\n<p>Government, retail, and technology.&nbsp;The reason isn\u2019t necessarily because those industries are less diligent in their protection of customer records. They\u2019re just&nbsp;<a href=\"https:\/\/www.techrepublic.com\/article\/forrester-what-can-we-learn-from-a-disastrous-year-of-hacks-and-breaches\/\">very popular targets<\/a>&nbsp;because of the high level of personal identifying information contained in their records.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/a.png?w=981\" alt=\"\" class=\"wp-image-2233\" \/><\/figure>\n\n\n\n<p><strong>2. There is a hacker attack every 39 seconds<\/strong><\/p>\n\n\n\n<p>A Clark School study at the&nbsp;<a href=\"https:\/\/www.umd.edu\/\">University of Maryland<\/a>&nbsp;is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access\u2014&nbsp;<a href=\"https:\/\/www.securitymagazine.com\/articles\/87787-hackers-attack-every-39-seconds\">every 39 seconds on average<\/a>, affecting one in three Americans every year \u2014and the non-secure usernames and passwords we use that give attackers more chance of success.<\/p>\n\n\n\n<p><strong>3. 43% of cyber-attacks target small business<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cybintsolutions.com\/industries-likely-to-get-hacked\/\">64% of companies have experienced web-based attacks.<\/a>&nbsp;&nbsp;62% experienced phishing &amp; social engineering attacks. 59% of companies experienced malicious code and botnets and 51% experienced denial of service attacks.<\/p>\n\n\n\n<p><strong>4. The average cost of a data breach in 2020 will exceed $150 million<\/strong><\/p>\n\n\n\n<p>As more business infrastructure gets connected,&nbsp;<a href=\"https:\/\/www.juniperresearch.com\/home\">Juniper Research<\/a>&nbsp;data suggests that cybercrime will cost businesses over $2 trillion total in 2019.<\/p>\n\n\n\n<p><strong>5. Since 2013 there are 3,809,448 records stolen from breaches every day<\/strong><\/p>\n\n\n\n<p>158,727 per hour, 2,645 per minute and 44 every second of every day reports&nbsp;<a href=\"https:\/\/cybersecurityventures.com\/cybercrime-diary-whos-hacked-list-of-q3-2018-data-breaches-and-cyberattacks\/\">Cybersecurity Ventures.<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/b.png?w=1024\" alt=\"\" class=\"wp-image-2234\" \/><\/figure>\n\n\n\n<p><strong>6. Over 75% of healthcare industry has been infected with malware over last year<\/strong><\/p>\n\n\n\n<p>The&nbsp;<a href=\"http:\/\/www.prnewswire.com\/news-releases\/report-reveals-healthcare-industry-lacking-in-basic-security-awareness-among-staff-putting-entire-medical-infrastructure-at-risk-300352485.html\">study examined<\/a>&nbsp;700 healthcare organizations including medical treatment facilities, health insurance agencies and healthcare manufacturing companies.<\/p>\n\n\n\n<p><strong>7. Large-scale DDoS attacks increase in size by 500%<\/strong><\/p>\n\n\n\n<p>According to the&nbsp;<a href=\"http:\/\/t.sidekickopen10.com\/e1t\/c\/5\/f18dQhb0S7lC8dDMPbW2n0x6l2B9nMJW7t5XX4643_Q8W5w05nb5vg2blW1pgBJ-56dFdPf7tRgn002?t=https:\/\/www.nexusguard.com\/threat-report-q2-2018&amp;si=4526991739453440&amp;pi=2ee51cac-c430-43cf-aee1-a3265e0db520\">Q2 2018 Threat Report<\/a>,&nbsp;<a href=\"https:\/\/www.nexusguard.com\/\">Nexusguard<\/a>\u2019s quarterly report, the average distributed denial-of-service (DDoS) attack grew to more than 26Gbps, increasing in size by 500%.<\/p>\n\n\n\n<p><strong>8. Approximately $6 trillion is expected to be spent globally on cybersecurity by 2021<\/strong><\/p>\n\n\n\n<p>Organizations&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/11\/09\/how-not-to-waste-a-trillion-dollars-on-cybersecurity\/#46bb9462df9a\">need to make a fundamental change in their approach to cybersecurity<\/a>&nbsp;and reprioritize budgets to align with this newly defined reality of our modern society.<\/p>\n\n\n\n<p><strong>9. Unfilled cybersecurity jobs worldwide will reach $3.5 million by 2021<\/strong><\/p>\n\n\n\n<p>More than&nbsp;<a href=\"https:\/\/thehill.com\/opinion\/cybersecurity\/365802-cyber-jobs-are-available-but-americans-dont-realize-they-are-qualified\">300,000 cybersecurity jobs in the U.S. are unfilled,<\/a>&nbsp;and postings are up 74% over the past five years.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/c.png?w=1012\" alt=\"\" class=\"wp-image-2235\" \/><\/figure>\n\n\n\n<p><strong>10. By 2020 there will be roughly 200 billion connected devices<\/strong><\/p>\n\n\n\n<p>The risk is real with IoT and its growing. According to figures compiled within a recent&nbsp;<a href=\"https:\/\/www.symantec.com\/security-center\/threat-report\">Symantec Internet Security Threat Report<\/a>, there are 25 connected devices per 100 inhabitants in the US.<\/p>\n\n\n\n<p><strong>11. 95% of cybersecurity breaches are due to human error<\/strong><\/p>\n\n\n\n<p>Cyber-criminals and hackers will infiltrate your company through your weakest link,&nbsp;<a href=\"https:\/\/www.cybintsolutions.com\/companies\/\">which is almost never in the IT department<\/a>.<\/p>\n\n\n\n<p><strong>12. Only 38% of global organizations claim they are prepared to handle a sophisticated cyber attack<\/strong><\/p>\n\n\n\n<p>What\u2019s worse? An estimated 54 percent of companies say they have experienced one or more attacks in the last 12 months.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/hjinterim.files.wordpress.com\/2021\/01\/d.png?w=972\" alt=\"\" class=\"wp-image-2236\" \/><\/figure>\n\n\n\n<p><strong>13. Total cost for cybercrime&nbsp;committed globally has added up to over $1 trillion dollars in 2018<\/strong><\/p>\n\n\n\n<p>Don\u2019t think that all that money comes from hackers targeting corporations, banks or wealthy celebrities. Individual users like you and me are also targets. As long as you\u2019re connected to the Internet, you can become a victim of cyber attacks.<\/p>\n\n\n\n<p><strong>What does it all mean?<\/strong><\/p>\n\n\n\n<p>Last year,\u00a0Ginni Rometty, IBM\u2019s chairman, president and CEO, said:\u00a0<strong>\u201cCybercrime is the greatest threat to every company in the world.\u201d\u00a0<\/strong>And she was right.\u00a0During the next five years, cybercrime might become the greatest threat to every person, place and thing in the world. With evolving technology comes evolving hackers, and we are behind in security. Understanding the cyber terminology, threats and opportunities is critical for every person in every business across all industries.\u00a0By providing advanced cyber training and education solutions in all departments of your business, from marketing and sales to IT and InfoSec, you are investing in your company\u2019s protection against cyber threats. Learn more at\u00a0Cybint Solutions.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The implementation of the European Union\u2019s General Data Protection Regulation (GDPR), was effective date of May 25, 2018, is just around the corner, and with it will come pressure on the human resources (HR) department to update its approach to handling employee data. The GDPR significantly enhances employee rights in respect to control over their &#8230; <a title=\"Workplace Privacy, Data Management &amp; Security Report\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2021\/01\/17\/workplace-privacy-data-management-security-report\/\">Read more<span class=\"screen-reader-text\">Workplace Privacy, Data Management &amp; Security Report<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,18,28,19,20,29,21,22,23,24,25,26,27],"tags":[],"class_list":["post-2230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","category-education","category-entities","category-financial-industry","category-gdpr","category-government","category-null-null","category-reaching-out-network","category-recruitement","category-reporting","category-security","category-security-treats","category-your-help-is-needed"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/2230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=2230"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/2230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=2230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=2230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=2230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}