Tags
Administration
Benefits
Communication
Communication Programs
Compensation
Conflict & Dispute Resolution
Developing & Coaching Others
Employee Satisfaction/Engagement
Executive Coaching
HR Metrics & Measurement
HR Outsourcing
HRIS/ERP
Human Resources Management
Internal Corporate Communications
Labor Relations
Labor Trends
Leadership
Leadership Training & Development
Leading Others
Legal
Management
Motivating
Motivation
Organizational Development
Pay Strategies
Performance Management
Present Trends
Recognition
Retention
Staffing
Staffing and Recruitment
Structure & Organization
Talent
The HR Practitioner
Training
Training and Development
Trends
U.S. Based Legal Issues
Vision, Values & Mission
Work-Life Programs & Employee Assistance Programs - EAP
Workforce Acquisition
Workforce Management
Workforce Planning
Workplace Regulations
corporate learning
employee engagement
interpersonal communications
leadership competencies
leadership development
legislation
News
Onboarding Best Practices
Good Guy = Bad Manager :: Bad Guy = Good Manager. Is it a Myth?
Five Interview Tips for Winning Your First $100K+ Job
Base Pay Increases Remain Steady in 2007, Mercer Survey Finds
Online Overload: The Perfect Candidates Are Out There - If You Can Find Them
Cartus Global Survey Shows Trend to Shorter-Term International Relocation Assignments
New Survey Indicates Majority Plan to Postpone Retirement
What do You Mean My Company’s A Stepping Stone?
Rewards, Vacation and Perks Are Passé; Canadians Care Most About Cash
Do’s and Don’ts of Offshoring
Error: No such template "/hrDesign/network_profileHeader"!
Blogs / Send feedback
Help us to understand what's happening?
Reason
It's a fake news story
It's misleading, offensive or inappropriate
It should not be published here
It is spam
Your comment
More information
Security Code
How HR Professionals Can Play a Role in Protecting the Enterprise
Created by
Hord Tipton
Content
The story that made headlines this past summer of the San Francisco IT administrator who locked top administrators out of the city’s network for several days should spark some serious discussion among HR professionals. The incident was a classic example of what a disgruntled employee with elevated privileges can do to take down the enterprise, such as encrypting data or changing passwords to restrict access to business functions. <br />
<br />
IT professionals perform invaluable functions – without their services, organizations could not function. On the flip side, disgruntled IT employees are generally recognized as the highest risk an organization has, as they can do irreparable damage by stealing, corrupting or restricting access to data. A recent study indicated that an incredible 88 percent of IT workers would take company secrets and remote access credentials with them if they were fired. To mitigate this staggering statistic and avoid situations similar to the one in the San Francisco lockout, HR needs to develop a close relationship with their information security staff. <br />
<br />
Once a disgruntled IT employee gets into a position where there are red flags that he or she might be a risk to the organization, steps need to be taken to restrict that person’s access to the network. Having regular contact between the HR and information security departments will help management stay informed of potential “problem” employees, which is key to approaching the entire issue of insider threats. <br />
<br />
Keeping your organization’s data secure requires the cooperation of every employee – but HR in particular should play a critical role, especially with IT professionals, starting with the hiring process. When putting together a job description for a position that will have access to the organization’s information assets, such as a network or system administrator, HR needs to clearly understand the duties and responsibilities of that position. For example, how much authority is vested in a particular job? What sort of access control will be in place for this position? Effectively communicating job responsibilities requires a close relationship between HR and the information security department, yet security professionals are often left out of the process. <br />
<br />
The organization must also place a relative value of importance upon the information in the database that is being protected. Until an organization classifies what the data is worth, it will never know how valuable it is. What would be the impact of the damage to the organization if certain data was lost? For instance, what if the company’s intellectual property fell into a competitor’s hands? It could put your company out of business.<br />
<br />
Another important factor to consider in the IT hiring process is to know more about the type of person you’re putting in charge of your information assets. Thorough background checks should be performed before any hiring decision is made. That means more than a simple credit check and 15-second phone call, which is all that transpires in many cases. You need to look into the past of those employees requiring elevated clearance levels to determine if there’s a history of disruption or any sign of previous instability. In many instances, this type of information is not discovered until after the person has already been hired; you may then have to alter their job or even terminate them. <br />
<br />
Once employees have been hired and put in place, the next point of consideration for HR should involve separation of duties. Giving any one position too much power is rarely a good idea. For the IT professional, there should be a clear separation of duties, whereby one person doesn’t have complete network control or authority. It is advisable to divide network responsibilities between at least two people to prevent significant changes within the IT infrastructure. Even if the two positions are totally independent of one another, the position descriptions should be linked to communicate that no one person will have sole responsibility for a particular function, such as access to changing passwords across the entire network.<br />
<br />
Companies need to be especially aware of employee behavior during difficult times. Actions such as layoffs, lack of bonuses or pay increases, or turning an employee down for a promotion can prompt some people to want to ‘make themselves more important’ – escalating their privileges to give themselves additional responsibilities and control. Companies need to be aware of suspicious behavior within their network. Therefore, an independent, knowledgeable party such as an information security professional should consistently review network logs to check who has accessed various portions of the database and network. Your company’s network(s) and databases must also be segmented with access control best practices in place. <br />
<br />
If bad company news, or even the rumor of bad news, is on the horizon, HR should alert the security person to be on the lookout for suspicious behavior. For example, if there is a massive change of passwords by one individual, or someone suddenly has more authority than they had before, that individual needs to be closely monitored or even isolated until a sufficient investigation can occur. Enforced vacations and job rotations are sometimes necessary for those holding highly sensitive positions. <br />
<br />
Any time an organization tries to cut corners with their security and doesn’t have enough people in place to provide a separation of duties, the organization runs the risk of putting all their eggs in one basket. The days when it was satisfactory to perform a ‘minimum’ level of security are gone. Having a second person in place that can understand the technology and undo any damage – or prevent the damage from happening in the first place – is crucial to any organization’s well-being. <br />
<br />
<span style="font-size: x-small;"><br />
<br />
<br />
<br />
For more information about how HR can become a key component in securing the organization, please visit www.ISC2.org/HRCenter for white papers, hiring guides, case studies and other relevant documents.</span><br />
<br />
Copyright © 1999-2025 by
HR.com - Maximizing Human Potential
. All rights reserved.