Messaging Apps: To Ban or Not to Ban?
Do we really know what our employees are saying? Hugh Bigwood and Trevor Wiles provide an overview of the rising ...
BYOD refers to the trend of consumer hardware and software being brought into the workplace. Examples include smart phones, laptop computers, thumb drives and other devices.
Employee-owned devices are sometimes sanctioned by employers and allowed to be used alongside company technology, but there are compliance issues and risks associated with BYOD.
Employee-owned hardware and software pose security risks to companies, including concerns about breaches, fraud, privacy concerns and issues with data retention policies. To minimize BYOD risk, many businesses are implementing BYOD policies.
Do we really know what our employees are saying? Hugh Bigwood and Trevor Wiles provide an overview of the rising ...
An internal investigation can feel like a high-stakes game of needle-in-the-haystack, and current world challenges set that haystack on fire. ...
IT security researchers say 81 percent of CIOs and CISOs defer security-relevant critical updates or patches due to concerns about ...
VPN for secure, private web access? From a data protection, privacy and compliance perspective, you may want to think again. ...
Key Considerations to Facilitate Smooth M&As As the list of cybersecurity breaches grows daily and headlines grow more shocking – ...
A Compliance Officer’s Role in Mitigating This Risk Mobile computing presents a unique set of challenges to compliance officers. Our devices ...
Over time, other rules may ensnare unwary businesses, notes LeClair Ryan Attorney Janine Anthony Bowen in blog Atlanta, Ga. (October ...
Employees are stepping up their interest in using their own personal social media apps, accounts and established networks of contacts ...
© 2019 Corporate Compliance Insights