Measures to protect data when an employee leaves
Credit to Author: Stan Kaminsky| Date: Tue, 22 Aug 2023 16:30:08 +0000
What systems do departing employees most often retain access to, and how to protect them from data leaks?
Read moreCredit to Author: Stan Kaminsky| Date: Tue, 22 Aug 2023 16:30:08 +0000
What systems do departing employees most often retain access to, and how to protect them from data leaks?
Read moreCredit to Author: Bobby Cain| Date: Tue, 01 Aug 2023 08:14:39 +0000
Trust is at the heart of what we do at Schneider Electric. It is the backbone of our customer and partner relationships and further emphasized by our ‘Customer First’ core value. However, the key to our success lies in our ability to also treat employees…
The post Operationalizing the role of IT to create a loveable employee experience appeared first on Schneider Electric Blog.
Read moreCredit to Author: Hugh Aver| Date: Tue, 27 Sep 2022 17:03:53 +0000
Are you sure your former colleagues don’t have access to corporate data or systems?
Read moreCredit to Author: Anastasia Starikova| Date: Tue, 14 Jun 2022 22:38:21 +0000
How organizations can minimize cybersecurity risks when they take on young, inexperienced interns and involve them in the organization’s business processes.
Read moreCredit to Author: Enoch Root| Date: Fri, 04 Feb 2022 21:32:54 +0000
Cybersecurity advice for companies who frequently work with freelancers or subcontractors.
Read moreCredit to Author: Sergey Soldatov| Date: Fri, 25 Jan 2019 15:43:27 +0000
Burnout caused by routine is a problem not only for employees, but for the entire company.
Read moreCredit to Author: Employee Voices| Date: Tue, 08 May 2018 12:30:25 +0000
Written by Guest Blogger, Mariana C. Gonzalez On Saturday April 7th, I attended a Human Resources Shared Services (HRSS) teambuilding event at the Holiday Inn Parque Fundidora, in Monterrey, NL Mexico…. Read more »
The post Creating and Sustaining a High-Performing Team: An HRSS Teambuilding Event appeared first on Schneider Electric Blog.
Read moreCredit to Author: Nikolay Pankov| Date: Mon, 10 Jul 2017 11:01:10 +0000
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
Read more