As shelter in place orders near lifting, now is the time to begin planning your businesses return to work strategy even if you don't plan to recall employees for many weeks or months. We have created a Return to Work: Technology & Employee Planning Guide to help businesses achieve a smooth return to work.
On the employee front, it is important to consider government restrictions and expectations as well as review guidance from industry bodies such as Occupational Safety and Health Administration and SHRM as you create your return to work plan.
We explore technology and cyber-strategy recommendations for the C-Suite to support the World Economic Forum's cybersecurity guidelines for the coronavirus threat landscape.
Gartner, Inc. released a survey showing "that 88% of organizations have encouraged or required employees to work from home, regardless of whether or not they showed coronavirus-related symptoms." In this article we share tips on when to work, where to work, establishing boundaries between work and personal life, and more.
It is important to enable multi-factor authentication and other IT security must dos to mitigate risk during COVID-19 and beyond.
Zoom is making headlines with a variety of privacy and security issues, including Zoombooming. The risks are real, so we sat down with a few of our security experts to capture this list of tips and recommendations.
As we start to somewhat settle into our new working from home reality, it’s a good time to reflect on what could have been done to better prepare for a prolonged period of remote working, from an organisational point of view.
One challenge for some CTOs and technology leaders is communicating the importance of IT and cybersecurity and its role in the overarching business. Here are three tips for communicating the importance of IT and cybersecurity internally.
The importance of security measures to have in place when operating remotely cannot be stressed enough. Following a prolonged period of remote working, it is understandable to become somewhat relaxed about this, but organisations are urged to remind their employees not to get complacent.
Babson College Professor, Scott N. Taylor, PhD shares some of the exercises that can help you evaluate what kind of leader you want to be, and how to get there in times of change.
Employees – particularly those with unrestricted access to sensitive information and financials – are a hacker’s easiest access point into a firm. Every day, more employees fall victim to social engineering schemes and phishing attacks designed to fool them.