Keeping Your Network Safe

Romeo, Jim
December 2002
HR Magazine;Dec2002, Vol. 47 Issue 12, p42
Focuses on the role of human resource (HR) executives in the protection of sensitive data from internal and external security threats in the workplace. Risks to HR management systems; Protection from Internet hacking; Prevention of a security breach.


Related Articles

  • Leave your passwords in your will.  // Computer Weekly;9/21/2010, p30 

    In this article the author offers his opinion on the need to create an impenetrable password to avoid increasing online fraud and identity theft.

  • Develop good habits. Murphy, Lynn // People Management;4/2/1998, Vol. 4 Issue 7, p72 

    Offers tips for personnel management professionals on how to implement CPD programs. Types of behavior of personnel management professionals of keep CPD records.

  • The Emerging World of the Manager. Crockett, William J. // Training & Development Journal;Apr81, Vol. 35 Issue 4, p76 

    Examines the issues and challenges being faced by the human resource development manager. Narrowing autonomy and diminished power; Increasingly limited human resources in the face of increased demand for more of the things that only people can do for us; Increased complexity; ways that will...

  • HR efforts should focus on variances among generations, ASHHRA says. Costello, Mary Ann // AHA News;11/13/2000, Vol. 36 Issue 45, p8 

    Discusses the findings of the report `HR Commission Monograph on the Workforce for the New Millennium,' which deals with the role of human resource (HR) managers in health care organizations. Changes needed to meet the demands and variances in the workforce; Generational differences among...

  • Prioritizing Internet Security. Demers, Marie Eve // Electronic News;01/22/2001, Vol. 47 Issue 4, p46 

    Calls for Internet-based companies to increase investments that prioritize computer and data security. Estimated corporate loss from external hacking and internal piracy; Percentage of information technology budget spent on data security; Advice on the selection of a security company;...

  • FIDNet Alive And Searching For Dollars. Brown, Doug // Inter@ctive Week;04/03/2000, Vol. 7 Issue 13, p108 

    Focuses on the Federal Intrusion Detection Network (FIDNet) in the United States. Comments from Jim Dempsey of the Center for Democracy and Technology about the system; One of the problems of FIDNet; Proposed spending on the program in 2001; Criticism of the program in 1999.

  • Online data thefts soar: Remind staff that unapproved access is federal crime.  // HR Specialist;Dec2016, Vol. 14 Issue 12, p4 

    The article offers information on how to prevent online data theft in organization by reminding employees that attempting access to unauthorized access is unlawful and could lead to prison.

  • Why HR can't win today. Laabs, Jennifer // Workforce (10928332);May98, Vol. 77 Issue 5, p62 

    Focuses on the dichotomy of roles played by human resource professionals. Follower and leader; Reactive and proactive management; Human resource managers as employee advocate and manager. INSETS: Being the conscience and a businessperson;Being an employee advocate and a manager;Who's HR's...

  • Do Your Managers Have the Right Stuff? Simonsen, Peggy // Workforce (10928332);Aug99, Vol. 78 Issue 8, p47 

    Discusses the role of human resources professionals in developing an effective manager. Information on a study which identified and defined the `emerging worker'; Business role of a developmental manager; Characteristic of a developmental manager; Four critical competencies used in career...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics