Document 13385040

advertisement
Human Resources Report™
Reproduced with permission from Human Resources Report, 33 HRR 201, 3/2/15. Copyright 姝 2015 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com
Cyber Security
Transparency Is Key in Regaining Employee
Trust After a Cyber Attack, Practitioners Say
hen an employer is hacked, workers can lose
trust in its ability to protect their most personal
and valuable information. In order to regain that
trust, the employer should be transparent about how
the breach occurred and explain to employees exactly
what is being done to ensure it doesn’t happen again,
practitioners told Bloomberg BNA.
Recent computer hacks at two large employers, Sony
Pictures Entertainment (32 HRR 1351, 12/22/14) and
Anthem Blue Cross Blue Shield (33 HRR 121, 2/9/15),
one of the nation’s largest health insurers, which not
only included employee data but consumer information,
such as medical records and other personal identification, have many workers wondering if they can trust
their employers with sensitive information. Both companies quickly offered credit monitoring to employees
and consumers who were affected by the breach.
Matt Brosseau, chief technology officer and head recruiter at Chicago-based consulting firm Instant Alliance, told Bloomberg BNA Feb. 20 that the first step in
regaining employee trust following a hack is making
sure that the organization is clear in communicating exactly what happened and how it happened.
‘‘The first stage of trust is clear and open communication,’’ he said. ‘‘Let them know what happened in a
way that is easy to understand so they feel like they are
a part of what is going on.’’
Brosseau said that the better companies are at sharing that information, including what data were lost and
what the organization understands about the nature of
the breach, the better chance there is of ‘‘minimizing
whispers among employees about whether the company is doing enough to protect their personal information.’’
Attorney Suzanne J. Thomas, a partner with the labor
and employment practice in K&L Gates LLP’s Seattle
office, told Bloomberg BNA Feb. 23 that state and federal laws require employers to make certain disclosures
about data breaches to their employees.
‘‘Where there is an ongoing criminal investigation,
employers might need to defer to state and local laws
about proper notice when there has been a data
breach,’’ Thomas said.
She noted that many employers ‘‘send out a preliminary e-mail saying, ‘this is all we know right now but
please be aware that a data breach has happened, we
W
COPYRIGHT 姝 2015 BY THE BUREAU OF NATIONAL AFFAIRS, INC.
are gathering information and we will keep you fully informed.’ ’’
Depending on the size of the company, Thomas said,
employers might have an ‘‘all hands on deck’’ meeting
to ease employee concerns. ‘‘In my experience, the
companies that have at least some informal dialogue
with their employees anecdotally seem to have fewer
who get completely panicked about the event,’’ she
added.
Trisha Zulic, regional HR director at Efficient Edge
HR & Insurance Services in San Diego and a technology panelist for the Society for Human Resource Management, also recommended open communication with
employees.
‘‘Explain how it happened,’’ she told Bloomberg BNA
Feb. 20. ‘‘Transparency is the only way to regain employee trust. You want to be consistently talking to
[employees] and telling them what type of efforts are
being made in order to change those vulnerabilities.
Say ‘we suffered this breach and now we are making
changes across the board in order to improve security
standards throughout the organization.’ ’’
Brosseau recommended setting up a roundtable discussion or a phone line with IT professionals. ‘‘That’s
really helpful,’’ he said. ‘‘It helps employees come back
to trusting their organization.’’
Improving Data Security. According to Thomas, a lot of
the rebuilding of trust happens on the front end by employers demonstrating that they are working on improving security measures.
‘‘What employers should be doing is checking the security of their various computer systems and devices,’’
she said.
Thomas asserted that often employers may either
have these systems in place but they are ignored, or
don’t have them in place at all.
‘‘It is the employer’s responsibility to make sure that
their usage settings are in line and that they have
clearly defined rules in place for what employees
should be doing while on the company’s network, that
is, what they should be sending over the company system and the type of data that they should be storing,’’
Zulic said.
To get ahead of a breach, Brosseau said a good security platform is always about proactive work as opposed
to reactive patching and trying to stop ‘‘hemorrhages of
data.’’
To do that effectively, he said, organizations should
set up an internal security group that monitors cybersecurity risks, assesses them, researches them and
brings that information back to a cyber security team.
ISSN 1095-6239
2
‘‘Spending the time to educate employees on not just
the ‘this is what you need to do to be more secure’ but
the ‘why’ is equally as important,’’ Brosseau said. ‘‘As
much as I hate to say it, there are all kinds of cybersecurity problems that happen and unfortunately 90
percent of them happen because end users make an error at some point in time. So taking the time to educate
3-2-15
your employees on why they have to be secure in cyberspace is critical.’’
BY CARYN FREEMAN
To contact the reporter on this story: Caryn Freeman
in Washington at cfreeman@bna.com
To contact the editor responsible for this story:
Simon Nadel at snadel@bna.com
COPYRIGHT 姝 2015 BY THE BUREAU OF NATIONAL AFFAIRS, INC.
HRR
ISSN 1095-6239
Download