Welcome to our five-part series on human resources’ (HR) role in managing employee data privacy with grace, agility, and expertise. In this five-part series, each article will build on previous ...
"Identity theft" first appeared in use in 1964. Long before the internet, thieves would use the telephone to deceive their targets to obtain personal information. The '80s saw a new approach with ...
A new report released today by security awareness training company KnowBe4 Inc. finds that human resources-related email subjects remain a principal strategy among cyberattackers, accounting for more ...
October was Cybersecurity Awareness Month, a good time to reassess our approach to one of the most persistent challenges in cybersecurity: the human element. Despite advancements in technology and ...