Remove cyber-risk how-to-get-employees-to-care-about-security
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. Erin: So, let’s get started.

article thumbnail

GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk

The Last Watchdog

Even the most well-protected companies can be susceptible to attacks if they are not careful about a proactive approach towards cyber security. Here are a few of the top security weaknesses that threaten organizations today: Poor risk management. No organization is immune to cybersecurity threats.

Risk 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

The Last Watchdog

We are in the midst of a workplace mental health crisis that’s affecting individual employees and entire companies. While it’s obvious people are not getting the mental health care they need and deserve, and we must do better as a nation, there is an overlooked aspect of this crisis affecting businesses.

article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime. Teaching children about good cyber security habits starts with helping them realize their power to learn to make smart choices.

Privacy 174
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

And yet our pervasive deployment of IoT systems has also vastly expanded the cyber attack surface of business networks, especially in just the past few years. This shift is just getting started. Here’s what all companies and individuals should fully grasp about our IoT systems under attack, post Covid-19. A lot is at stake.

IoT 277
article thumbnail

Bring-Your-Own-Device Programs: A Balance Between Privacy and Cybersecurity

Data Protection Report

A ”bring your own device” ( BYOD ) program is a popular arrangement used by employers, whereby employees use their personal devices (e.g., Last year, about two-thirds of Canadian private sector employers had at least one employee using personal devices for business-related activities. [1]

Privacy 124
article thumbnail

Organisations are struggling to monitor remote employees

IT Governance

Their reason for that is understandable: remote working makes it almost impossible to keep an eye on employees and make sure they’re acting responsibly. The reality is that most companies wouldn’t have the resources to do that even if they wanted to – and many don’t care how many times you go to the toilet as long as the work gets done.

GDPR 119