employee

Results 1 - 25 of 2658Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
At MessageLabs, we understand that deploying best practices in security means working with the people around you - and we'd like to help! Download this free pack of resources to help educate your employees about the latest threats and best practices around email and web security.
Tags : threats, threat, email security, web security, internet security, messagelabs, security, best practices
     MessageLabs Australia
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night and we know because we asked you.
Tags : 
     Cisco EMEA
By: HERE Technologies     Published Date: May 24, 2019
How secure is your companys network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your companys network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. Theyre in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. Thats the modern reality of business lifeits happening everywhere at once. Not only that, its happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are its no longer 9 til 5. Mobile employees, contract workers, fr
Tags : 
     Cisco EMEA
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no ones data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
     Rubrik EMEA
By: Instructure     Published Date: May 30, 2019
The Future of Work: 10 Essentials for Winning Employee Development Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. Thats four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everythingfrom recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do ex
Tags : 
     Instructure
By: Instructure     Published Date: Jun 11, 2019
Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. Thats four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everythingfrom recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do exactly that seamlessly motivate and develop employees of all types, age
Tags : 
     Instructure
By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: Automatic call distributors (ACDs) Outbound dialers Multi-channel routing platforms Back-office employee desktops Download today to learn more.
Tags : 
     Nice Systems
By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers dont lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your companys bottom line before your drivers even hit the road. In our free white paper, Lowering Commercial Automotive Fleet Insurance Costs, well show you: The many ways vehicle crashes affect the bottom line A deeper look at the risks of employer- and employee-owned vehicles How negligent entrustment suits can snare companies in any industry How to mitigate risk and take control of insurance
Tags : 
     SambaSaftey
By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Lets begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, I think so, or maybe, no. Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no drivers license at all should be cause enough for concern. But combining this with the facts that: most organizations budgets are at best flat P&C insurance rates are rising 14% every 2 years 90% of crashes are due to human error there are fewer qualified drivers available today the number of lawsuits around negligence are skyrocketing and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
     SambaSaftey
By: SambaSaftey     Published Date: Mar 15, 2019
Today, its commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. Thats considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper its written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Heres how.
Tags : 
     SambaSaftey
By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they cant rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely theyve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrusts annual Privileged Acces
Tags : 
     BeyondTrust
By: PGi     Published Date: May 03, 2019
As businesses give employees more power to work wherever and whenever they want, IT and business leaders are tasked with creating connected, collaborative work environments that are optimized for all devices. Rather than investing in point solutions that employees may or may not use, many organizations are investing in Unified Communications (UC) more specifically, UC as a Service (UCaaS) or UC services delivered through the cloud.
Tags : 
     PGi
By: HotSchedules     Published Date: Mar 28, 2019
Lets just say it inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isnt just source of pain for your employees it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, were going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
     HotSchedules
By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldnt it be your companys? Learn more in this report.
Tags : 
     PwC
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere.
Tags : 
     Cisco Umbrella EMEA
By: Group M_IBM Q2'19     Published Date: May 28, 2019
The Ohio State University Health Plan manages healthcare insurance benefits and wellness resources for the universitys 29,000 employees, as well as their spouses and dependents. The Ohio State University is one of the nations top 20 public universities, and its Wexner Medical Center ranked #3 among 104 academic medical centers that were included in the 2014 University Health System Consortium Quality and Accountability Study. The health plan, medical center and university work together to help deliver safe, efficient, patient centered care to its members.
Tags : 
     Group M_IBM Q2'19
By: Canon Solutions America     Published Date: May 24, 2019
According to a recent study, a web-to-print solution can potentially deliver a 100% payback in six months based on the workload of 2.5 employees. If youre still on the fence about deploying web to print in your business, this guide is a must-read.
Tags : 
     Canon Solutions America
By: Oracle     Published Date: Jun 10, 2019
In our recent report, we look into the reasons why HR feel less than confident in their ability to manage the volume of data securely and ethically. From extracting the right type of insights to improving employee productivity and engagement to managing the skills pipeline. We look forwards to how HR can improve their systems by using automated technologies such as artificial intelligence and machine learning. Read the survey today to see how your organisation compares to your peers.
Tags : 
     Oracle
By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategysuccess depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: Latest data-breach trends Assessing DLP vendors Nine-step framework Best practices to ensure success
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud appsoften in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employees ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific users risk and the sensitivity or value of the data. An organizations data protection program must consider the human point the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Todays employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, theyve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? A Guide to Achieving SaaS Security and Compliance deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
     Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.