Security Awareness Research 5 November 2010
|
|
- Eustacia McDaniel
- 8 years ago
- Views:
Transcription
1 Security Awareness Research 5 November % of data breaches happen as a result of frustrations with IT security policy restricting employees from doing their job
2 Foreword I am delighted to introduce this global research project which Clearswift has undertaken to examine IT security policies within businesses. This report follows on from the hugely successful series of reports published in April 2010 examining corporate attitudes towards Web 2.0 technologies, and the use of such tools in the workplace. Richard Turner Chief Executive The results of the original research illustrated a significant mind shift amongst businesses, making it clear that businesses now accept that Web 2.0 and other collaborative technologies are critical to the future success of their company. But as the corporate IT landscape becomes ever more complex, undergoing rapid changes as a result of the impact that Web 2.0 technologies have had, how prepared are companies, and more importantly, their staff, to cope with the ensuing security challenges? This new research moves on to examine attitudes towards IT policies in companies around the world, and the results are both fascinating and thought-provoking. One particularly interesting finding is the apparent lack of training of employees when it comes to IT policies many staff report only receiving training when they first join a company, and with technology changing so rapidly, this clearly isn t ideal. The reality is that staff can be a vital component for safeguarding data and information security within a business. Ensuring staff know and understand policies can be a huge advantage to companies. IT security companies have for too long made a living out of making their customers feel insecure, trading on fear and negativity to maximise profit. It is clear to me that in order to be more secure, companies must first stop feeling insecure. My overarching message as a result of this report is simple IT security must be brought out of the dark depths of the IT department and given clarity across the organisation. By having a relevant and current security policy in place, a company is enabling its employees to get on with the jobs that they need to do and aiding productivity and innovation.
3 Key Stats 71% of office workers say company has clear Internet policy that most employees understand 50% of office workers have discussed Internet policy with colleagues in the last 12 months, but only 29% have received training on the subject during this time 22% do not know if their Internet use is monitored at work Only 15% of office workers are concerned that they may be inadvertently breaching security policy but security breaches are most likely to be attributed to ignorance / lack of understanding (63%) Results of the Clearswift Security Awareness Survey are based on 2000 online interviews with office workers in UK, USA, Australia, Germany and Netherlands. The research was conducted by Loudhouse, an independent market research consultancy based in London Summary As technology for sharing information becomes more and more embedded in our lives, it becomes more and more important for those with access to data in the workplace to understand what uses of data are permitted and which activities may be putting data at risk. The Clearswift Security Awareness Survey explores the extent to which office workers understand the data security implications of their day-to-day activities and highlights an interesting data security phenomenon amongst office workers. It appears that employees in office environments have a misplaced confidence in their own levels of understanding and are not always equipped with the knowledge they need to keep data safe. As such, data security can be regarded as an unknown unknown workers who think they understand data protection are not aware that they need more information and guidance. Overconfidence can therefore be seen as the main data protection hazard in today s office environments. Employees are confident that they understand what is safe and what is permitted, which is leading many to take a casual attitude toward IT generally, often freestyling and blindly moving data from place to place without consideration of potential security risks. This situation is being compounded by the fact there is a lack of consistent communication about security policy, and consequently many office workers do not understand it fully. Despite the fact that the majority of office workers in this survey consider themselves to be risk-averse, individually and collectively they are inadvertently leaving their employers exposed to data security risks. In order to drive best practice in data security, Clearswift advises employers to actively engage their employees in a dialogue about security, responsibility, and risk. technology for sharing information becomes more and more embedded in our lives
4 Policy in practice With Internet use a ubiquitous part of working life for many, it is not surprising that most employers now have internet policies in place. Indeed, 71% claim that not only does their employer have such a policy, but that most of their fellow employees understand the policy which is in place. Only 20% say their company has no official policy at all. Furthermore, these policies for the most part are considered by employees to be fair and comprehensible only 10% see their employers rules as unfair, and only 8% feel employer policy makes no sense. Despite the existence of Internet policies and high reported levels of understanding of such policies amongst office workers, formalised communications around Internet policies are non-existent at worst, patchy at best. Whilst Internet use policy may be a topic of water cooler conversation, Figure 2 shows that half of office workers (50%) have had a conversation about Internet use policy in the last 12 months. In contrast, only 29% have had a dedicated training session on the policy within that time, and only 14% have raised a query to see if something they were doing was permitted under company policy. Indeed, half of respondents have never had a dedicated training session on their current company s security policy. Indeed, 38% have had no training at all about security issues in their current job (whether in a dedicated session or otherwise.) This suggests that even those who have had some training (at an induction or a scheduled session), are not provided with up-to-date information as they move through their organisations. Employees feel that their companies are being proactive about security 58% believe that their employer proactively encourages employees to understand and implement the policies they have, and generally see the policies as well-intentioned, but it is clear that the gap between good intentions and concrete action is large for many employers. Figure 1: Existence and understanding of company Internet policy Figure 2: Communication about Internet security Company has clear Internet policy / most employees do not understand policy, 9% Company has guidelines on Internet use but not enforced policy, 17% Company has no policy / guidelines on employee Internet use, 3% % in last 12 months... Discussed Internet use policy with colleagues 50% Received info about company security policies via Started using new software or hardware tools at work Have had dedicated training session on company security policy Consulted IT support about issue involving security tools Raised query about whether something I did online permitted under company s policy Warned informally by manager/colleague that something I did online might not be permitted 8% 14% 29% 28% 49% 46% Company has clear Internet policy / most or all employees understand policy, 71% employees understand the policy which is in place
5 Compliance confusion The majority of office workers claim general understanding of their employers internet policies, but many still experience confusion about aspects of that policy. Monitoring of internet use at work is the largest area of confusion: 21% say that their employer s electronic monitoring is the single most confusing aspect of using the internet at work. Figure 3 shows that over 1 in 5 office workers (22%) does not know if their internet use is being monitored at work. Of those (57%) who know that their internet use at work is monitored, 38% feel that their employer accesses information about personal internet use more than is necessary to maintain security. As one respondent put it No-one knows exactly who sees the Internet activity and what sort of information is on the reports, how often it is looked at and shared. Levels of office worker understanding of data security issues are shown in Figure 4. Confidence is highest in understanding what data can be sent via (79% are confident), what it is okay to do on work related social media (65%) and lower for understanding the security on work (52%). Other areas of employee data security confusion relate to the following: Who has access to data about my Internet use at work What data I can share with people in other functions and departments What data I am allowed to share outside work What I can say about work to others Who I can communicate with when I am at work Figure 3: Internet monitoring at work My use of the Internet at work is monitored electronically by my employer Don t know, 22% Figure 4: Employee confidence around data security issues Extremely confident Confident Neutral Not very confident Not at all confident No, 21% Yes, 57%...what data loss prevention means in the context of my work...the security on my work - if I make a mistake, the software will prevent incorrect use of data...what my company can see when I use personal or social media at work...what it is OK to do on work-related social media (work accounts on Facebook, Twitter, etc.)...what data can be sent via 34% 27% 25% 8% 27% 25% 30% 10% 9% 35% 24% 24% 9% 7% 42% 23% 18% 7% 8% 48% 31% 16% 3% 38% feel employer doesn t access information about personal online activity more than necessary to maintain security 1 in 5 (22%) feel employer accesses personal online activity more than necessary to maintain security Monitoring of internet use at work is the largest area of confusion
6 Casual compliance Interestingly, although personal levels of data security confidence are high only 15% of office workers are concerned that they may be inadvertently breaching company security policy through their use of the Internet - 63% of office workers attribute most security breaches to ignorance or a lack of understanding [Figure 5]. It seems therefore that office workers have a tendency to rate their own level of understanding of data security issues as higher than everyone else s! It is also worth noting that 1 in 5 people think security breaches occur in order to get jobs done efficiently or effectively, whilst 11% think they are down to frustrations with unrealistic IT security policy. Part of the problem appears to stem from an attitude of casual compliance. Office communications can be likened to a game of Chinese whispers with half of office workers (50%) reporting that there are informal rules about the internet at work, and that most people understand what s acceptable, regardless of what the official policy says [Figure 6]. Without training and consistent, up-to-date communication on company policy, lines between these informal standards and actual policy are being blurred and company data is being left exposed. With only 27% of office workers thinking that their company could be better at communicating its online security policy, it seems that security is off the radar for many people and not a top-of-mind concern in their day-to-day rush to get their jobs done. Patchy levels of confidence around data security issues only serve to paint a picture of misplaced confidence amongst both employees and employer and to highlight the need for security policy to be more fully and more frequently communicated by employers. Figure 5: Reason why IT security gets breached Figure 6: Casual compliance amongst office workers % agreeing (rating 4 or 5) Malicious intent 6% Frustrations with unrealistic IT security policy 11% I am confident that I understand my employer s policies about online activity I feel I understand which parts of my at-work internet use are visible to my employer There are informal rules about the Internet at my work - people know what s okay regardless of what the official policy says My company could be better at communicating its online security policy I am concerned that I may be inadvertently breaching company security policy through my use of the Internet 15% 27% 50% 56% 74% To get their jobs done more efficiently / effectively 20% Ignorance / lack of understanding 63% 1 in 5 people think security breaches occur in order to get jobs done efficiently or effectively
7 IT free-styling Office workers around the world are using a range of technologies in order to do their jobs and manage their personal lives. The boundaries between work and home use and appropriate and inappropriate use of technology are ever-shifting and essentially unclear. Figure 5 shows just some examples of where office workers are essentially IT free-styling, applying their own rules to technology use, regardless of what official policy says. 44% of office workers report storing data at work on personal memory devices, 39% download software to their computer at work and 25% use personal accounts on social networks to comment about their job. As one respondent put it I access my personal accounts and also do shopping during my lunch hour. I m hoping that no-one can see my card details or read my s. Most of the online activity during the day is likely personal, since only 14% use social media for work purposes (i.e., contributing to Facebook, Twitter, LinkedIn, or another social site as part of their job descriptions). still dominates work communication, and much of this is hosted in the cloud, raising security issues of which employees may not be aware. 74% frequently use and other web-based mediums to communicate with customers or clients about business. In short, office workers are using a variety of technologies, at varying levels of risk on a regular basis. The fact that office workers remain confident that they are compliant with data security policy in the absence of formalised training around such issues is a cause for concern. This situation is clearly untenable in the long term as data protection threats become more diverse and sophisticated, technology becomes more mobile and the lines between personal and work lives continue to blur. Figure 7: Examples of IT freestyling % doing at work at least sometimes Store data on work memory devices 46% Store data on personal memory devices 44% Download software to my computer Use personal accounts on social networks to comment about my job Use social networking sites in a professional capacity 25% 23% 39% Use media sharing sites in a professional capacity 20% office workers are essentially IT free-styling
8 Summing up It is clear that, whilst employees are confident that they understand their employers security policies this confidence is often unwarranted. Knowledge is too often transmitted informally, through conversations between employees, and hardened into informal guidelines that can supersede actual data protection policies in the absence of training. IT freestyling blurs the lines between personal and work technology, creating risks as sensitive work data is stored on personal USB sticks and personal information feeds through work laptops. This situation is risky in the long run, to both employers (who may suffer the consequences when workers break the rules) and to employees (who may inadvertently be revealing personal information through workplace monitoring or opening themselves up to career risk.) There are high levels of goodwill within organisations, however, and this creates the chance for outreach to close the security gap. The most forward-thinking organisations will need to close security gaps by acting on two problems at once. Technological solutions can help keep data under control, by automating enforcement and limiting risk. More regular training is needed alongside these solutions however, if employees are to feel confident about acting to protect sensitive data at work. Contact Clearswift United States Clearswift Corporation 161 Gaither Drive Centerpointe Suite 101Mt. Laurel, NJ Tel: Fax : United Kingdom 1310 Waterside, Arlington Business Park, Theale, Reading, Berkshire, RG7 4SA Tel: +44 (0) Fax: +44 (0) Australia Level 5, Suite 504, 165 Walker Street, North Sydney, New South Wales, 2060 Tel : Fax : Spain Cerro de los Gamos 1, Edif Pozuelo de Alarcón, Madrid Tel: / Fax: Germany Amsinckstrasse 67, Hamburg Tel: Fax: Japan Hanai Bldg. 7F, 1-2-9, Shiba Kouen Minato-ku Tokyo Tel : +81 (3) Fax : +81 (3)
Essential Steps to Web Security. A Clearswift Best Practice Guide
Essential Steps to Web Security A Clearswift Best Practice Guide Introduction Web 2.0 brings Threat 2.0 The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online
More informationWeb 2.0 in the Workplace Today
Web 2.0 in the Workplace Today 2 Contents Foreword 3 Employers enthusiastically embracing potential of Web 2.0 4 Brave new world 5 Web 2.0 and security: new approach needed? 7 Clearswift SECURE Gateways
More informationSECURE Web Gateway Sizing Guide
Technical Guide Version 02 26/02/2015 Contents Introduction... 3 Overview... 3 Example one... 4 Example two... 4 Maximum throughput... 4 Gateway Reporter... 4 Gateway Reporter server specification... 5
More informationSecuring Microsoft Office 365
Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering
More informationClearswift SECURE Web Gateway Evaluation Guide
Clearswift SECURE Web Gateway Evaluation Guide Revision 1.1 Introduction Thank you for taking the time to evaluate the Clearswift SECURE Web Gateway. Balancing the requirement for strong network security
More informationHas the enforcer become the enabler?
Has the enforcer become the enabler? What the next evolution of Data Loss Prevention technology means for business collaboration and productivity Dr. Guy Bunker Contents Into the eye of a perfect information
More informationBusiness Opportunity Enablement through Information Security Compliance
Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement
More informationEssential Steps to Web Security. A Clearswift Best-Practice Guide
Essential Steps to Web Security A Clearswift Best-Practice Guide Introduction Web 2.0 brings Threat 2.0. The web is changing fast from a one-way medium for brochure-ware to a highly interactive, sophisticated
More informationCritical Information Protection & Security Questions for the Board to ask. January 2016
Critical Information Protection & Security Questions for the Board to ask January 2016 Introduction Board Directors have a number of roles and responsibilities. Asking the right questions of those managing
More informationData Quality Insight. Graham Rhind. Sponsored by Capscan Ltd
Graham Rhind Sponsored by Capscan Ltd Table of Contents Page Executive Summary 2 Introduction 4 Key Findings 5 Responsibility 5 Importance 6 Action 7 Stagnation 8 Introspection 14 Conclusion 17 1 Executive
More informationCorporate Security in 2016.
Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried
More informationCYBER STREETWISE. Open for Business
CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that
More informationDIGITAL AMNESIA AT WORK. the risks and rewards of forgetting in business
DIGITAL AMNESIA AT WORK the risks and rewards of forgetting in business 12 9 3 6 43 Executive summary Digital Amnesia is the experience of forgetting information that has been entrusted to a digital device.
More informationEncryption Buyers Guide
Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from
More informationDIGITAL STRATEGY 2014-2017
DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology
More informationWhite Paper. The Importance of Securing Emails as Critical Best Practice within Financial Services. Executive Summary
White Paper The Importance of Securing Emails as Critical Best Practice within Financial Services IN THIS WHITE PAPER 1. Latest survey results Attitudes toward data security within Financial Services conducted
More informationAddressing the challenges of Performance Management. part of our We think series
Addressing the challenges of Performance Management part of our We think series Contents Contents 2 The Return on Investment in Performance Management 3 The challenges of effective Performance Management
More informationThe Impact of Anonymous Proxies In Education
The Impact of Anonymous Proxies In Education 2014 Survey Results Proxies can be used to access pornographic or file sharing sites. during Once a student successfully finds a proxy site, everyone knows
More informationThe Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers
The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority
More informationStaff Use of Social Media Policy
Staff Use of Social Media Policy Printed copies must not be considered the definitive version DOCUMENT POLICY NO. 11 CONTROL Policy Group Information Governance and Security Author John Version No. 3.0
More informationSimplifying the Challenges of Mobile Device Security
WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the
More informationThe Online Safety Landscape of Wales
The Online Safety Landscape of Wales Prof Andy Phippen Plymouth University image May 2014 SWGfL 2014 1 Executive Summary This report presents top-level findings from data analysis carried out in April
More informationHow To Be A Successful Employee
Talent Trends 2014 What s on the minds of the professional workforce Introduction For career-minded people everywhere, these are interesting times. Economies continue to falter in several regions of the
More informationA report by Leigh Day into the experiences of disabled people in the workplace
A report by Leigh Day into the experiences of disabled people in the workplace There are over 6.9 million disabled people of working age in Great Britain, nearly a fifth of the total working-age population.
More informationThe Shape of Email. Research Report. June 2012. www.mimecast.com
The Shape of Email Research Report June 2012 www.mimecast.com Introduction Many companies today are concerned with how information is exchanged both between their organization and others and also within
More informationBYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already
More informationINFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
More informationBEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS.
BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS. 1 CONTENTS INTRODUCTION 2 ACHIEVE TARGETED MARKETING 6 CUSTOMER SERVICE AND SATISFACTION 3 EMPOWER STAFF WITH MOBILE CRM 7 DON T RELY ON SPREAD
More informationNHS Fife. Your Business @ Risk - Information Governance and Security Survey
NHS Fife Your Business @ Risk - Information Governance and Security Survey Prepared for NHS Fife September 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability
More informationWhite Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
More informationWHITE PAPER. PCI Compliance: Are UK Businesses Ready?
WHITE PAPER PCI Compliance: Are UK Businesses Ready? Executive Summary The Payment Card Industry Data Security Standard (PCI DSS), one of the most prescriptive data protection standards ever developed,
More informationSocial Media Policy & E- Safeguarding Staff & Student Guidance
Social Media Policy & E- Safeguarding Staff & Student Guidance Introduction Social Media is a fast growing phenomenon and popular sites include: Facebook, Twitter, LinkedIn, Google+. This communication
More informationSERVICE OVERVIEW SERVICES CATALOGUE
SERVICE OVERVIEW SERVICES CATALOGUE February 2010 With a proven track record of 600 modernization projects to date, harness Micro Focus outstanding record and experience of delivering enterprise application
More informationTHREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
More informationThe 2015 Cloud Readiness Survey for Australian Accounting Firms
The 2015 Cloud Readiness Survey for Australian Accounting Firms HOW FAR HAVE ACCOUNTANTS TRAVELLED TOWARDS CLOUD ACCOUNTING? A DIGITAL FIRST REPORT FOR SAGE AUSTRALIA Contents Cloud Readiness Survey 1
More informationBRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA Managing Risk Maximising Opportunity www.controlrisks.com TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA The concept of employees
More informationCyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
More informationYour Company Data, Their Personal Device What Could Go Wrong?
Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate
More informationTHE NEW FORMULA FOR CONNECTING WITH B2B BUYERS
THE NEW FORMULA FOR CONNECTING WITH B2B BUYERS How to use social selling to successfully convert prospects into customers INTRODUCTION B2B Buyers Today: Well Connected, More Demanding, Better Informed
More informationSimplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
More informationexperts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation
experts in your field Get the profile: A Progressive Recruitment career guide Contents Introduction... 2 Why you need an online reputation... 3 Monitoring your online reputation... 3 How to protect your
More informationWeb Application Vulnerability Scanner: Skipfish
Web Application Vulnerability Scanner: Skipfish Page 1 of 7 EXECUTIVE SUMMARY Skipfish is an automated web application vulnerability scanner available for free download at Google s code website. It is
More informationAn Acquirer s view: Payment security best practice and PCI DSS compliance. PCI London 23 January 2014
An Acquirer s view: Payment security best practice and PCI DSS compliance PCI London 23 January 2014 Looking back over the years that the Barclaycard Payment Security team has presented at the PCI London
More informationThe Public Sector Guide to Social Media Strategy and Policy
The Public Sector Guide to Social Media Strategy and Policy Use social media with confidence. This guide contains practical steps that will help public sector agencies, organizations and departments develop
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationCisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
More information30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY
RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected
More informationBYLAW 26. Skate Australia Social Media Usage Policy
BYLAW 26 Skate Australia Social Media Usage Policy Adopted August 12, 2012 1.0 Definitions For the purposes of this policy the following definitions apply: Skate Australia (or SA) broadly includes all
More informationIntroduction to Dementia Care Mapping (DCM )
Introduction to Dementia Care Mapping (DCM ) Dementia Care Mapping is an established approach to achieving and embedding person-centred care for people with dementia. For over 20 years it has been used
More informationYour Complete CRM Handbook
Your Complete CRM Handbook Introduction Introduction Chapter 1: Signs You REALLY Need a CRM Chapter 2: How CRM Improves Productivity Chapter 3: How to Craft a CRM Strategy Chapter 4: Maximizing Your CRM
More informationMoving your business to the Cloud Fact or Fiction?
Moving your business to the Cloud Fact or Fiction? Introduction The cloud, perhaps one the most commonly used business terms, has changed the way we work and using cloud applications has many benefits
More informationAn Employee Centric Approach To HR Employee Experience Journey Mapping (EXJM)
An Employee Centric Approach To HR Employee Experience Journey Mapping (EXJM) Table of ConTenTs 03 Executive Summary 04 We re all on a journey... 04 More of the same from HR isn t going to cut it 07 Does
More informationAn Introduction to Continuous Controls Monitoring
An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc
More information5 costly mistakes you should avoid when developing new products
5 costly mistakes you should avoid when developing new products By Paul Forsythe Managing Director at Alemare Solutions And Product Development expert with 25 years experience Hello, As you will know,
More informationFrom the experts: Managing mobility for the enterprise
From the experts: Managing mobility for the enterprise Key insights around Enterprise Mobility Management Vodafone Power to you The human factor Your people are out there using their own devices already.
More informationMacmillan Cancer Support Volunteering Policy
Macmillan Cancer Support Volunteering Policy Introduction Thousands of volunteers dedicate time and energy to improve the lives of people affected by cancer. Macmillan was started by a volunteer and volunteers
More informationThe Career Paradox for UK Women. An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline.
The Career Paradox for UK Women An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline. Executive Summary This report is an examination of the
More informationToday s Talent Flight Risk:
RESEARCH STUDY Today s Talent Flight Risk: Why Your Employees Are Taking Off and What HR Can Do About It Employee Development Survey September 2015 Imagine walking into your workplace and seeing one out
More informationNHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
More informationData Centre Services. Secure management of business critical data and systems
Data Centre Services Secure management of business critical data and systems DATA CE Many businesses house their valuable and sensitive IT infrastructure within expensive and inadequate floor space where
More informationConsumer Awareness Guide. Using Recruitment Agencies
Consumer Awareness Guide Using Recruitment Agencies Prepared By Ian M Campbell Avenue Scotland Introduction At Avenue Scotland, we take great pride in the honest, professional service we provide. We have
More informationINFORMATION SECURITY AWARENESS TRAINING. A New Approach.
INFORMATION SECURITY AWARENESS TRAINING A New Approach. 2 Information Security Awareness Training - A New Approach Introduction From Jason Baker, Head of Instructional Design EMEA, SAI Global Compliance
More informationFrequently Asked Questions
Clearswift SECURE ICAP Gateway v4.2 Version 01 30/07/2015 Clearswift Public Copyright Version 1.0, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The materials contained
More informationThe principles of PRINCE2
The principles of PRINCE2 The project management framework known as PRINCE2 is based upon a set of principles. These principles are the bedrock and foundations upon which everything else in the framework
More informationInformation Governance in Dental Practices. Summary of findings from ICO reviews. September 2015
Information Governance in Dental Practices Summary of findings from ICO reviews September 2015 Executive summary The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that
More informationProtecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
More informationKEY GUIDE. The key stages of financial planning
KEY GUIDE The key stages of financial planning Financial planning has witnessed significant change, so it is not surprising that most people are unclear about what financial planners actually do. The aim
More informationA SHORT GUIDE TO THE IRISH FOOTBALL ASSOCIATION BETTING RULES. Your reputation! Your responsibility! Your career!
A SHORT GUIDE TO THE IRISH FOOTBALL ASSOCIATION BETTING RULES Your reputation! Your responsibility! Your career! why are there rules relating to betting? Introduction UEFA and the Irish Football Association
More informationBeginners Guide to Sports Arbitrage Trading and Bonus Scalping
Beginners Guide to Sports Arbitrage Trading and Bonus Scalping Contents What Is Sports Arbitrage Trading? What Is Bonus Scalping? Risks of Sports Arbitrage Trading? Betfair/Betdaq The Spreadsheet Worked
More informationPreparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world
Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,
More informationWeb Success For Your Business
Graham Jones Internet Psychologist Web Success For Your Business How a completely new online strategy will boost your business Contents Introduction...3 Assessing the opportunity...4 It s different online...5
More informationReturning to work after brain injury
Returning to work after brain injury Introduction There are many ways to approach returning to work after a brain injury and this factsheet provides some strategies that have been shown to enhance the
More informationGetting Ahead of the Mobile Revolution
Getting Ahead of the Mobile Revolution Leverage the Power of Your Growing Mobile Workforce Today s businesses face a technological sea change as employees continue to make BYOD (bring your own device)
More informationCyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
More informationEnterprise Social Networks - The Seven Advantages
BEST PRACTICE IN ENTREPRISE SOCIAL NETWORKING - 2013 BY WITH 0 ZYNCRO 2013. All right reserved CONTENU - 1/ GUIDELINES FOR USING ENTERPRISE SOCIAL NETWORKS - P.02 2/ HOW AND WHEN TO USE ENTERPRISE SOCIAL
More informationSocial Media For Law Firms
Social Media For Law Firms Considerations and Recommendations (Based on the SRA Handbook and the Law Society practice notes) January 2013 Introduction Social Media in the Legal Industry The last year (2012)
More informationManaging Growth, Risk and the Cloud
Managing Growth, Risk and the Cloud Executive Summary of Independent Market Research Commissioned by Zenium Data Centers Spring 2015 Foreword Rising data volumes combined with the always on approach to
More informationCloud Storage and Sharing Platforms - The Fear of risk
2014 Danger in the Cloud Report Tresorit research report: examining the attitudes on the safety and security of professional and private information online in the U.S. September 2014 Foreword by Istvan
More informationEmail Etiquette (Netiquette) Guidance
Email Etiquette (Netiquette) Guidance January 2007 Email Etiquette (Netiquette) Guidance January 2007-1/13 Version Control Version Author(s) Replacement Date 1.0 Timothy d Estrubé Information Governance
More informationOnline leadership academy at Telefonica O2 How learning design and technology can provide a complete learning journey
Online leadership academy at Telefonica O2 How learning design and technology can provide a complete learning journey O ne of the biggest L&D investments organisations make is in their leadership development
More informationEvolving your network for the BYOD Era
Viewpoint Evolving your network for the BYOD Era 3-step guide to developing a mobility strategy Survive the rising tide of mobile devices in your workplace 1 Contents uide for CIOs Introduction: The Rise
More informationProject Management made easy
Project Management made easy www.wetrack.com @Wetracksoftware Contents Introduction pg 3 Customisation & Reports pg 5 Objectives, Risks and Activities pg 7 Incident Management Module pg 9 Run Sheet Module
More informationMobile Users and Privacy Issues
MOBILE PRIVACY: Consumer research insights and considerations for policymakers February 2014 Mobile and Privacy 1 2 MOBILE INTERNET: MAXIMISING GLOBAL OPPORTUNITIES AND ADDRESSING PRIVACY CHALLENGES The
More informationWinning Legal Business from Medium-Sized Companies. Silvia hodges phd
Winning Legal Business from Medium-Sized Companies Silvia hodges phd Published by In association with Winning Legal Business from Medium-Sized Companies is published by Ark Group UK/EUROPE OFFICE Ark Conferences
More informationBalancing your content distribution strategy across paid, earned and owned channels. Insight. a guide for the B2B technology marketer
Insight Balancing your content distribution strategy across paid, earned and owned channels a guide for the B2B technology marketer 1 Tel: +44 (0) 2074 286017 www.pulsecomms.com C ontent marketing has
More informationCareer Development Research Summary. Exploring the career development landscape in 2014, after one of the deepest recessions in recent history
Career Development Research Summary Exploring the career development landscape in 2014, after one of the deepest recessions in recent history Introduction Every company wants engaged, motivated, proactive
More informationROBERT WALTERS WHITEPAPER USING SOCIAL MEDIA IN THE RECRUITMENT PROCESS
ROBERT WALTERS WHITEPAPER USING SOCIAL MEDIA IN THE RECRUITMENT PROCESS INTRODUCTION The social media phenomenon has opened up new paths of engagement and revolutionised the exchange of information. With
More informationSocial Media- tips for use and development Useful tips & things to avoid when using social media to promote a Charity.
Social Media- tips for use and development Useful tips & things to avoid when using social media to promote a Charity. This is compilation of some of the advice and guidance found online to help organisations
More informationThe Importance of Professional Email Services for Small Business
The Role of Professional Email Services for Small to Medium Enterprises (SMEs) May 2013 The Role of Professional Email Services for Small to Medium Enterprises. Executive Summary The means by which small
More informationEmployees tell the truth about your company s data. How to make mobile devices safe for work and play
Employees tell the truth about your company s data How to make mobile devices safe for work and play Table of contents Executive summary... p3 Introduction the habit of a lifetime... p3 The survey results
More informationHealth and safety management. Cardinus Risk Management explain why safety comes first with JobWatch powered by BigChange
Health and safety management Cardinus Risk Management explain why safety comes first with JobWatch powered by BigChange Contents 3 Introduction 4 How it works 5 Benefits 6 Improving behaviour and communication
More informationIn good health. Public health teams in local authorities Year 2. February 2015
In good health Public health teams in local authorities Year 2 February 2015 Foreword The public health workforce is at the heart of both improving and protecting the public s health and as such the views
More informationPrepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW
embracing the opportunities, averting the risks. Prepared by August 2009 INTRODUCTION There is little question that social media is high on the agenda of corporate and nonprofit decision-makers across
More informationUnderstanding and articulating risk appetite
Understanding and articulating risk appetite advisory Understanding and articulating risk appetite Understanding and articulating risk appetite When risk appetite is properly understood and clearly defined,
More informationPerception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
More information8 Tips for creating a savvy Social Media Policy
8 Tips for creating a savvy Social Media Policy Introduction In today s modern world, the number of people using social media continues to rise on a daily basis. Whether or not you re using social channels
More informationARgon: The Foundation of an Adaptive Data Loss Prevention Strategy
ARgon: The Foundation of an Adaptive Data Loss Prevention Strategy Dr. Guy Bunker White paper ARgon: Adaptive Data Loss Prevention Strategy V1.0, April 2015 www.clearswift.com 2 ARgon: Adaptive Data Loss
More informationA Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
More informationFEELING VULNERABLE? YOU SHOULD BE.
VULNERABILITY ASSESSMENT FEELING VULNERABLE? YOU SHOULD BE. CONTENTS Feeling Vulnerable? You should be 3-4 Summary of Research 5 Did you remember to lock the door? 6 Filling the information vacuum 7 Quantifying
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More information