Security Career / Staffing
News
Trend Micro A/NZ hires new managing director from global ranks
Security vendor Trend Micro Australia and New Zealand has announced a replacement from within its global ranks for outgoing managing director Dave Patnaik who is leaving the company after four years.
Telstra seeks CISO to work with the Dept of Defence
Telstra is on the hunt for a chief information security officer (CISO) to work primarily with the Department of Defence to oversee the development and security of its network.
Techie seeks job by using malware, blackmail
A 26-year-old Hungarian citizen is being detained in the US for infecting the computers of hotel giant Marriott and attempting gain a job by blackmail.
Ethical hacking course offered by Coventry University
Coventry University is to open an 'Ethical Hacking Lab', the latest UK institution to put money into developing the practical skills that have been in short supply during the cybercrime boom of the last decade.
Learn to ask the right questions on cloud security before it's too late
The hard sell around cloud computing is in full swing, but many potential customers are finding it hard to evaluate the security profiles of potential providers and should take a broader view of their objectives and standards, an expert in the auditing of IT security infrastructures has warned.
Sign up now »
-
Tate Tasman Access Floors Reveals In-Floor Cooling Systems to Australian Market
-
CA Technologies Adds Aspera Software License Management to its Service Management Portfolio
-
Cool Vendor, XMPro, participates in Gartner’s 2012 Business Process Management Summit in Sydney
-
Ensyst Pty Ltd — MAPA 2012 Finalist
-
Imation Expands Line of High-Capacity, High-Security, Hardware Encrypted USB Hard Drives
At a fundamental business level, social media is a useful additional tool for communicating and collaborating with customers, colleagues and new business prospects. From an HR point of view, the social web is not only useful for recruitment but also as a knowledge network. At an employee level, social media is changing the way we work: Employees increasingly expect to be able to access personal technology and services in the workplace. As the lines between work and home life blur, staff are looking for greater flexibility in their roles; working from home is an increasing trend, but so too is ‘home-ing from work’, where staff expect to be able to perform personal tasks at work.
But social media brings risk and reward to business in equal measure. Information security is a key concern: Many organisations view social media channels as yet another route along which sensitive data can escape from the business, whether accidentally or maliciously. On top of this, senior management may be concerned about the amount of time employees spend on social networks.
This cultural shift raises new questions about trust in the workplace, the balance of power in employer / employee relationship and levels of control over people and content.
Organisations using content and web security technology can manage the way their staff use email and the internet without having to resort to a default position of mistrust. With a whopping third of ANZ employers completely blocking social media access at work, there’s a real danger of throwing the benefits of collaboration out with the risks.
It doesn’t have to be that way.
Trust breeds responsibility: People underestimate the amount of company time they spend on personal browsing. Allow staff to view their own web usage and foster more responsible behaviour without undermining trust.
Know limits: Set clear limits on personal surfing and communicate them to users. Alert them when they are approaching their limit. Help your people to play by the rules.
Share the load: Spread responsibility for usage reporting among managers and department heads so everyone gets to see how their usage impacts on the rest of the organisation. This also gives managers greater control and visibility into usage.
Need to know: Yes, you need reports and visibility. What you don’t need is employee data becoming common knowledge. Access control means reporting can be adjusted on a need-to-know basis.
7 Ways to Protect Your Business Printers
Can a hacker burn down your business by remotely setting one of your printers on fire? Researchers at Columbia University have recently proposed such a scenario, although HP quickly denied that it's possible. However, even if your printers can't be used as remote firestarters, there are many risks involved in networking a printer.