netchex.com
Open in
urlscan Pro
2606:4700:20::681a:843
Public Scan
Submitted URL: https://info.netchex.com/e3t/Ctc/T7+113/csp7404/VVzMV18wKK5vW2XgmRF762yJPW8GDvjX4VZ18MN1PJbvk3q3phV1-WJV7CgFT7N25xCJy91-7...
Effective URL: https://netchex.com/hr-data-security-safeguarding-sensitive-employee-information/?utm_campaign=Content%20Newsletter&...
Submission: On January 19 via api from US — Scanned from DE
Effective URL: https://netchex.com/hr-data-security-safeguarding-sensitive-employee-information/?utm_campaign=Content%20Newsletter&...
Submission: On January 19 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST /hr-data-security-safeguarding-sensitive-employee-information/
<form method="post" enctype="multipart/form-data" id="gform_31" action="/hr-data-security-safeguarding-sensitive-employee-information/">
<div class="gform_body gform-body">
<ul id="gform_fields_31" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_31_1" class="gfield field_sublabel_hidden_label field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_31_1"><label class="gfield_label gfield_label_before_complex">Name</label>
<div class="ginput_complex ginput_container no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name" id="input_31_1">
<span id="input_31_1_3_container" class="name_first">
<input type="text" name="input_1.3" id="input_31_1_3" value="" aria-required="false" placeholder="First Name">
<label for="input_31_1_3" class="hidden_sub_label screen-reader-text">First</label>
</span>
<span id="input_31_1_6_container" class="name_last">
<input type="text" name="input_1.6" id="input_31_1_6" value="" aria-required="false" placeholder="Last Name">
<label for="input_31_1_6" class="hidden_sub_label screen-reader-text">Last</label>
</span>
</div>
</li>
<li id="field_31_3" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_31_3"><label class="gfield_label" for="input_31_3">Email<span
class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_3" id="input_31_3" type="text" value="" class="large" placeholder="Email Address" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_31_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_4">
<div class="ginput_container ginput_container_text"><input name="input_4" id="input_31_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_5" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_5">
<div class="ginput_container ginput_container_text"><input name="input_5" id="input_31_5" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_6" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_6">
<div class="ginput_container ginput_container_text"><input name="input_6" id="input_31_6" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_7" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_7">
<div class="ginput_container ginput_container_text"><input name="input_7" id="input_31_7" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_8" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_8">
<div class="ginput_container ginput_container_text"><input name="input_8" id="input_31_8" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_9" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_9">
<div class="ginput_container ginput_container_text"><input name="input_9" id="input_31_9" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_31_10" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_10">
<div class="ginput_container ginput_container_text"><input name="input_10" id="input_31_10" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_31" class="gform_button button" value="SUBSCRIBE"
onclick="if (!window.__cfRLUnblockHandlers) return false; if(window["gf_submitting_31"]){return false;} window["gf_submitting_31"]=true; "
onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window["gf_submitting_31"]){return false;} window["gf_submitting_31"]=true; jQuery("#gform_31").trigger("submit",[true]); }">
<input type="hidden" class="gform_hidden" name="is_submit_31" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="31">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_31" value="WyJbXSIsImY2MjhmOGU5YzM4MTk4MmNhZjdiNjFjYTU4NTY2OGY2Il0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_31" id="gform_target_page_number_31" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_31" id="gform_source_page_number_31" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="1674159503738">
<script type="text/javascript">
document.getElementById("ak_js_2").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
* SolutionsToggle menu * Payroll & Tax * Time & Attendance * Employee Benefits Administration Software * Performance Management Software * Recruiting & Onboarding * Human Resources * Learning Management Software * HR Reporting & Analytics Software * Pricing * ResourcesToggle menu * Product Demos * Content Library * Paycheck Calculators * Blog * Netchex FAQs * Payroll 101 * Case Studies * Integrations * Why Netchex * ContactToggle menu * Request A Quote * Support for Netchex Clients * Login * Request A Quote Request a Quote * * * LOGIN * Solutions * Payroll & Tax * Time & Attendance * Employee Benefits Administration Software * Performance Management Software * Recruiting & Onboarding * Human Resources * Learning Management Software * HR Reporting & Analytics Software * Pricing * Resources * Product Demos * Content Library * Paycheck Calculators * Blog * Netchex FAQs * Payroll 101 * Case Studies * Integrations * Why Netchex * Contact * Request A Quote * Support for Netchex Clients * Login * Request A Quote HR DATA SECURITY: SAFEGUARDING SENSITIVE EMPLOYEE INFORMATION 04 • 26 • 22 * * * * HR data security breaches are bad news for your business in countless ways. Bad PR for your company, big problems for your employees, compliance fines and lawsuits. But HR data security is not just a matter of protecting your company from liability and bad publicity. It’s about doing right by your employees, protecting their personal information from potential misuse. Employees will notice when your company consistently watches out for their best interests. Take care of your HR data security and let your employees keep taking care of business. Protecting your company’s sensitive information must be a top-of-mind concern. HR must have a plan, great communication, proper training, and HR software that guarantees HR data security and remains up-to-date with current cyber threats. WHAT KIND OF HR DATA IS SENSITIVE? Hackers with access to employee information can do a lot of damage with just a few pieces of information, most notably identity theft. Here is some of the employee information that employers must keep protected: * Payroll information, such as bank account numbers * Basic employee information, including Social Security and driver’s license numbers * Employee benefits and healthcare information * Employee medical issues, including FMLA * Compensation data, such as salaries, raises, bonuses, etc. * Performance review and termination records * Workplace complaints and disciplinary actions * Drug and alcohol testing * Workers’ compensation * Confidential company planning, like layoffs,expansion, and restructuring HOW CAN YOU PROTECT SENSITIVE HR DATA? PARTNER WITH IT, LEGAL, AND SECURITY TEAMS Unsurprisingly, this is an area where you’ll need help from experts. Start by talking with your IT staff about network security and basic protections like firewalls. How secure is your computer network and company hardware? Talk to the legal team or obtain outside legal advice about your company’s legal obligations, compliance concerns, and overall liability issues. Additionally, approach this as preparing for the worst case scenario—if a data breach did occur, what steps must be taken. On-site IT and security staff cannot check every USB drive and laptop for unauthorized files, but they watch for suspicious behavior and unauthorized personnel. With the increase in ransomware attacks, it’s important to note that networks are very difficult to protect from anyone with physical access to your computers. ENABLE APPROPRIATE PERMISSIONS Managers and some supervisors will need broader access and permissions on company software than everyday employees. Rather than granting everyone unnecessarily broad access, make sure you’re only granting permissions where needed. SET APPROPRIATE EXPECTATIONS Even with a stellar IT department, your network can be vulnerable if employees make unwise or uninformed choices. Workers without computer security training may not understand the reasons behind certain rules. Work with your IT department to develop clear rules for employees. Be sure to include this information when updating your employee handbook. REQUIRE STRONG PASSWORDS Your employees will need to create complex and secure passwords, but some may attempt to reuse the simplest password accepted by your system. You should require capital and lowercase letters, numbers, and symbols. Your system can also require employees to regularly create a new, unique password, including monthly or quarterly. NO PASSWORD SHARING (NO EXCEPTIONS!) Employees should not be allowed to share or exchange their passwords. Mutually used software and applications should require individual logins, not joint access for multiple people. The motivation for sharing passwords varies widely, from simple convenience to cheating the time clock. But your network is more secure when each employee and workstation only accesses a limited, discrete portion of the system. UTILIZE MULTI-FACTOR AUTHENTICATION Mobile notifications and biometrics can seem extraneous, but they make a big difference with network security. Periodically have your employees use an authenticator app or at least a text message confirmation to confirm their identities, especially when employees work remotely. ENCRYPT SENSITIVE INFORMATION Encryption is essential for protecting your company’s data, like when it’s being transferred through external servers and email. A single excel spreadsheet could contain personal data about hundreds of employees or clients, which is why it’s so critical to protect those files. The general public is increasingly aware of and drawn to encrypted communication tools, which means your employees are too. Help employees feel safe and secure by utilizing encryption throughout the workplace as well. PROPER DATA DESTRUCTION Even printed records and spreadsheets can be vulnerable. Develop protocols for shredding sensitive documents like old tax records and data concerning former employees. Make sure those policies are included in your employee handbook. Digital records also need to be properly destroyed, not just forgotten in the recycle bin. When old laptops and company hard drives are disposed of, work with your IT department to make sure that sensitive data is fully erased. A formatted hard drive might seem to be wiped clean, but files can frequently be recovered with special software. MAKE SURE HR/PAYROLL SOFTWARE IS SAFE AND SECURE Find out whether your payroll software is cyber ready. HR and payroll software has some of the most sensitive data about your employees, including taxes and bank account information. The right HR software can massively improve the efficiency of your in-house paperwork, and it’s worth investing in a secure provider (like Netchex). READ MORE: SAFE AND SECURE: HOW TO FIND A TRUSTWORTHY PAYROLL COMPANY New operating system updates might cause a problem with your company’s proprietary software, and you need regular testing to identify bugs. To minimize incompatibility issues, consider getting all of your HR software from the same company. At Netchex, we just happen to offer a full menu of today’s best software solutions. CONDUCT REGULAR SECURITY AUDITS Most companies conduct audits of some kind or another, particularly with financials. Conducting an audit of your HR policies, procedures, and security is just as valuable. An HR security audit can help you assess the important factors needed for creating a secure company, such as improvement insights, potential oversight, and up-to-date information on threats. ROUTINE DATA SECURITY TRAINING Your employees will need to be trained on password rules and any new data security policies, but you should also make data security an ongoing topic for future training. It’s impossible to guess what threats will be your biggest concern a year or two from now. With additional training, your employees should have better instincts for avoiding phishing emails and future scams. PROPER EMPLOYEE OFFBOARDING Offboarding is just as important as onboarding. Similar to how you grant new hires access to company software, you will need a schedule for blocking the access and permissions of departing employees. Make sure you’ve collected company hardware, physical keys, and ID badges that could give a non-employee access to your building or network. Add these steps to your employee offboarding checklist. INDUSTRY NEWS & TIPS SENT STRAIGHT TO YOUR INBOX! Enter your email below to subscribe to industry news, product updates, and tips. * Name First Last * Email* * * * * * * * Δ FOR MORE INFORMATION ON HR TOPICS, READ OUR HR BLOG AND FOLLOW NETCHEX ON SOCIAL MEDIA—FACEBOOK, LINKEDIN, AND TWITTER. * * * * SOLUTIONS Payroll & Tax Time & Attendance Benefits Administration Performance Management Recruiting & Onboarding Human Resources Learning Management Reporting & Analytics COMPARE Kronos Patriot Software Paychex Paycom Paycor Paylocity Netchex Alternatives RESOURCES Product Demos Content Library Paycheck Calculators Partners Payroll 101 Netchex FAQs Blog Case Studies Careers Training Videos Integrations Sponsorships INDUSTRIES Automotive Banking Education Healthcare Hotels Manufacturing Non-Profits Restaurant Retail Wholesale HEADQUARTERS 1155 Hwy 190 E Service Rd #2 Covington, LA 70433 (985) 220-1410 Request a Quote Contact * * * Copyright © 2022 Netchex. All Rights Reserved. NMLS 1862611 Complaints * Privacy Notice * Conditions of Use * Agreements and Terms * Security CFO + HR Toolkit - How CFOs Can Enable Growth with HR Technology Get the Free eBook X word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 Notifications