Tagged: Security

IT leaders pick productivity over security

Posted on May 11, 2016 by Leapros Information Technology · Data Processing · Risk Management · Security

Implementing security measures can make systems run slower and essentially bog down productivity, which is causing some enterprises to abandon effective security measures. Two recent studies highlight the severity of lacking cybersecurity practices.

This article is brought to you by CIO.com

Implementing Effective Cyber Security Training for End Users of Computer Networks

Posted on February 2, 2016 by Leapros Human Resources · Security

This paper reviews what is known about effective cyber security training for end users of computer systems and offers suggestions about how HR leaders can effectively implement this training.

This whitepaper is brought to you SHRM.org

The Ultimate Guide To IT Audit Readiness

Posted on January 18, 2016 by Leapros Information Technology · Big Data · FP&A · Security

11 steps to winning back your time & reducing IT risk

This whitepaper is brought to you by CIO.com

SHRM-SIOP Role of Human Resources in Cyber Security

Posted on December 16, 2015 by Leapros Human Resources · Security

This paper reviews what is known about effective cyber security training for end users of computer systems and offers suggestions about how human resource (HR) leaders can effectively implement this training. This includes a broad review of the cyber security policies and competencies that are the basis for training needs analysis, setting learning goals, and effective training design. Finally, the paper discusses opportunities for human resource (HR) practitioners, industrial and organizational (I-O) psychologists, and information technology (IT) specialists to integrate their skills and enhance the capabilities of organizations to counteract cyber security threats.

This whitepaper is brought to you by SHRM.org

Why you shouldn’t accept every LinkedIn connection invite

Posted on August 21, 2015 by Leapros Information Technology · Hiring · Interview · Management · Security

Next time you receive an invitation to connect on LinkedIn from someone unfamiliar, think twice before you accept. This is not only sound advice, it’s part of LinkedIn’s official rules. Section 8.2 of the site’s user agreement specifies that members agree not to “invite people you do not know to join your network.” While Facebook and Twitter are great for broadcasting random thoughts and bragging about your private life to complete strangers, LinkedIn is designed to be personal and relevant to your professional life.

This article is brought to you by CIO.com