netchex.com Open in urlscan Pro
2606:4700:20::681a:843  Public Scan

Submitted URL: https://info.netchex.com/e3t/Ctc/T7+113/csp7404/VVzMV18wKK5vW2XgmRF762yJPW8GDvjX4VZ18MN1PJbvk3q3phV1-WJV7CgFT7N25xCJy91-7...
Effective URL: https://netchex.com/hr-data-security-safeguarding-sensitive-employee-information/?utm_campaign=Content%20Newsletter&...
Submission: On January 19 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST /hr-data-security-safeguarding-sensitive-employee-information/

<form method="post" enctype="multipart/form-data" id="gform_31" action="/hr-data-security-safeguarding-sensitive-employee-information/">
  <div class="gform_body gform-body">
    <ul id="gform_fields_31" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_31_1" class="gfield field_sublabel_hidden_label field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_31_1"><label class="gfield_label gfield_label_before_complex">Name</label>
        <div class="ginput_complex ginput_container no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name" id="input_31_1">
          <span id="input_31_1_3_container" class="name_first">
            <input type="text" name="input_1.3" id="input_31_1_3" value="" aria-required="false" placeholder="First Name">
            <label for="input_31_1_3" class="hidden_sub_label screen-reader-text">First</label>
          </span>
          <span id="input_31_1_6_container" class="name_last">
            <input type="text" name="input_1.6" id="input_31_1_6" value="" aria-required="false" placeholder="Last Name">
            <label for="input_31_1_6" class="hidden_sub_label screen-reader-text">Last</label>
          </span>
        </div>
      </li>
      <li id="field_31_3" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_31_3"><label class="gfield_label" for="input_31_3">Email<span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_3" id="input_31_3" type="text" value="" class="large" placeholder="Email Address" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_31_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_4">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_31_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_5" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_5">
        <div class="ginput_container ginput_container_text"><input name="input_5" id="input_31_5" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_6" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_6">
        <div class="ginput_container ginput_container_text"><input name="input_6" id="input_31_6" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_7" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_7">
        <div class="ginput_container ginput_container_text"><input name="input_7" id="input_31_7" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_8" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_8">
        <div class="ginput_container ginput_container_text"><input name="input_8" id="input_31_8" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_9" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_9">
        <div class="ginput_container ginput_container_text"><input name="input_9" id="input_31_9" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_31_10" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_31_10">
        <div class="ginput_container ginput_container_text"><input name="input_10" id="input_31_10" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_31" class="gform_button button" value="SUBSCRIBE"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_31&quot;]){return false;}  window[&quot;gf_submitting_31&quot;]=true;  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_31&quot;]){return false;} window[&quot;gf_submitting_31&quot;]=true;  jQuery(&quot;#gform_31&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_31" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="31">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_31" value="WyJbXSIsImY2MjhmOGU5YzM4MTk4MmNhZjdiNjFjYTU4NTY2OGY2Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_31" id="gform_target_page_number_31" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_31" id="gform_source_page_number_31" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="1674159503738">
    <script type="text/javascript">
      document.getElementById("ak_js_2").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

 * SolutionsToggle menu
   * Payroll & Tax
   * Time & Attendance
   * Employee Benefits Administration Software
   * Performance Management Software
   * Recruiting & Onboarding
   * Human Resources
   * Learning Management Software
   * HR Reporting & Analytics Software
 * Pricing
 * ResourcesToggle menu
   * Product Demos
   * Content Library
   * Paycheck Calculators
   * Blog
   * Netchex FAQs
   * Payroll 101
   * Case Studies
   * Integrations
 * Why Netchex
 * ContactToggle menu
   * Request A Quote
   * Support for Netchex Clients
 * Login
 * Request A Quote

Request a Quote
 * 
 * 
 * 


LOGIN
 * Solutions
   * Payroll & Tax
   * Time & Attendance
   * Employee Benefits Administration Software
   * Performance Management Software
   * Recruiting & Onboarding
   * Human Resources
   * Learning Management Software
   * HR Reporting & Analytics Software
 * Pricing
 * Resources
   * Product Demos
   * Content Library
   * Paycheck Calculators
   * Blog
   * Netchex FAQs
   * Payroll 101
   * Case Studies
   * Integrations
 * Why Netchex
 * Contact
   * Request A Quote
   * Support for Netchex Clients
 * Login
 * Request A Quote


HR DATA SECURITY: SAFEGUARDING SENSITIVE EMPLOYEE INFORMATION

04 • 26 • 22


 * 
 * 
 * 
 * 

HR data security breaches are bad news for your business in countless ways. Bad
PR for your company, big problems for your employees, compliance fines and
lawsuits.

But HR data security is not just a matter of protecting your company from
liability and bad publicity. It’s about doing right by your employees,
protecting their personal information from potential misuse.

Employees will notice when your company consistently watches out for their best
interests. Take care of your HR data security and let your employees keep taking
care of business.

Protecting your company’s sensitive information must be a top-of-mind concern.
HR must have a plan, great communication, proper training, and HR software that
guarantees HR data security and remains up-to-date with current cyber threats.


WHAT KIND OF HR DATA IS SENSITIVE?

Hackers with access to employee information can do a lot of damage with just a
few pieces of information, most notably identity theft. Here is some of the
employee information that employers must keep protected:

 * Payroll information, such as bank account numbers 
 * Basic employee information, including Social Security and driver’s license
   numbers
 * Employee benefits and healthcare information
 * Employee medical issues, including FMLA
 * Compensation data, such as salaries, raises, bonuses, etc.
 * Performance review and termination records
 * Workplace complaints and disciplinary actions
 * Drug and alcohol testing 
 * Workers’ compensation
 * Confidential company planning, like layoffs,expansion, and restructuring 


HOW CAN YOU PROTECT SENSITIVE HR DATA?

PARTNER WITH IT, LEGAL, AND SECURITY TEAMS

Unsurprisingly, this is an area where you’ll need help from experts. Start by
talking with your IT staff about network security and basic protections like
firewalls. How secure is your computer network and company hardware?

Talk to the legal team or obtain outside legal advice about your company’s legal
obligations, compliance concerns, and overall liability issues. Additionally,
approach this as preparing for the worst case scenario—if a data breach did
occur, what steps must be taken.  

On-site IT and security staff cannot check every USB drive and laptop for
unauthorized files, but they watch for suspicious behavior and unauthorized
personnel. With the increase in ransomware attacks, it’s important to note that
networks are very difficult to protect from anyone with physical access to your
computers.

ENABLE APPROPRIATE PERMISSIONS

Managers and some supervisors will need broader access and permissions on
company software than everyday employees. Rather than granting everyone
unnecessarily broad access, make sure you’re only granting permissions where
needed.

SET APPROPRIATE EXPECTATIONS

Even with a stellar IT department, your network can be vulnerable if employees
make unwise or uninformed choices. Workers without computer security training
may not understand the reasons behind certain rules. Work with your IT
department to develop clear rules for employees. Be sure to include this
information when updating your employee handbook. 

REQUIRE STRONG PASSWORDS

Your employees will need to create complex and secure passwords, but some may
attempt to reuse the simplest password accepted by your system. You should
require capital and lowercase letters, numbers, and symbols. Your system can
also require employees to regularly create a new, unique password, including
monthly or quarterly.

NO PASSWORD SHARING (NO EXCEPTIONS!)

Employees should not be allowed to share or exchange their passwords. Mutually
used software and applications should require individual logins, not joint
access for multiple people. 

The motivation for sharing passwords varies widely, from simple convenience to
cheating the time clock. But your network is more secure when each employee and
workstation only accesses a limited, discrete portion of the system.

UTILIZE MULTI-FACTOR AUTHENTICATION

Mobile notifications and biometrics can seem extraneous, but they make a big
difference with network security. Periodically have your employees use an
authenticator app or at least a text message confirmation to confirm their
identities, especially when employees work remotely.

ENCRYPT SENSITIVE INFORMATION

Encryption is essential for protecting your company’s data, like when it’s being
transferred through external servers and email. A single excel spreadsheet could
contain personal data about hundreds of employees or clients, which is why it’s
so critical to protect those files.

The general public is increasingly aware of and drawn to encrypted communication
tools, which means your employees are too. Help employees feel safe and secure
by utilizing encryption throughout the workplace as well. 

PROPER DATA DESTRUCTION

Even printed records and spreadsheets can be vulnerable. Develop protocols for
shredding sensitive documents like old tax records and data concerning former
employees. Make sure those policies are included in your employee handbook.

Digital records also need to be properly destroyed, not just forgotten in the
recycle bin. When old laptops and company hard drives are disposed of, work with
your IT department to make sure that sensitive data is fully erased. A formatted
hard drive might seem to be wiped clean, but files can frequently be recovered
with special software.

MAKE SURE HR/PAYROLL SOFTWARE IS SAFE AND SECURE

Find out whether your payroll software is cyber ready. HR and payroll software
has some of the most sensitive data about your employees, including taxes and
bank account information. The right HR software can massively improve the
efficiency of your in-house paperwork, and it’s worth investing in a secure
provider (like Netchex).

READ MORE: SAFE AND SECURE: HOW TO FIND A TRUSTWORTHY PAYROLL COMPANY

New operating system updates might cause a problem with your company’s
proprietary software, and you need regular testing to identify bugs. To minimize
incompatibility issues, consider getting all of your HR software from the same
company. At Netchex, we just happen to offer a full menu of today’s best
software solutions.

CONDUCT REGULAR SECURITY AUDITS

Most companies conduct audits of some kind or another, particularly with
financials. Conducting an audit of your HR policies, procedures, and security is
just as valuable. An HR security audit can help you assess the important factors
needed for creating a secure company, such as improvement insights, potential
oversight, and up-to-date information on threats.

ROUTINE DATA SECURITY TRAINING

Your employees will need to be trained on password rules and any new data
security policies, but you should also make data security an ongoing topic for
future training. It’s impossible to guess what threats will be your biggest
concern a year or two from now. With additional training, your employees should
have better instincts for avoiding phishing emails and future scams.

PROPER EMPLOYEE OFFBOARDING

Offboarding is just as important as onboarding. Similar to how you grant new
hires access to company software, you will need a schedule for blocking the
access and permissions of departing employees. 

Make sure you’ve collected company hardware, physical keys, and ID badges that
could give a non-employee access to your building or network. Add these steps to
your employee offboarding checklist.


INDUSTRY NEWS & TIPS SENT STRAIGHT TO YOUR INBOX!

Enter your email below to subscribe to industry news, product updates, and tips.


 

 * Name
   First Last
 * Email*
   
 * 
 * 
 * 
 * 
 * 
 * 
 * 



Δ



FOR MORE INFORMATION ON HR TOPICS, READ OUR HR BLOG AND FOLLOW NETCHEX ON SOCIAL
MEDIA—FACEBOOK, LINKEDIN, AND TWITTER.

 * 
 * 
 * 
 * 

SOLUTIONS

Payroll & Tax
Time & Attendance
Benefits Administration
Performance Management
Recruiting & Onboarding
Human Resources
Learning Management
Reporting & Analytics


COMPARE

Kronos
Patriot Software
Paychex
Paycom
Paycor
Paylocity
Netchex Alternatives


RESOURCES

Product Demos
Content Library
Paycheck Calculators
Partners
Payroll 101
Netchex FAQs
Blog
Case Studies
Careers
Training Videos
Integrations
Sponsorships


INDUSTRIES

Automotive
Banking
Education
Healthcare
Hotels
Manufacturing
Non-Profits
Restaurant
Retail
Wholesale


HEADQUARTERS

1155 Hwy 190 E Service Rd #2
Covington, LA 70433
(985) 220-1410

Request a Quote Contact

 * 
 * 
 * 

Copyright © 2022 Netchex. All Rights Reserved. NMLS 1862611 Complaints
 * Privacy Notice
 * Conditions of Use
 * Agreements and Terms
 * Security

CFO + HR Toolkit - How CFOs Can Enable Growth with HR Technology

Get the Free eBook
X


word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1


Notifications