23.03.2018 Views

Strayer HRM 520 Week 11 Discussion

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Strayer</strong> <strong>HRM</strong> <strong>520</strong> <strong>Week</strong> <strong>11</strong><br />

<strong>Discussion</strong><br />

BUY HERE⬊<br />

https://www.homeworkmade.com/stray<br />

er-hrm-<strong>520</strong>-week-<strong>11</strong>-discussion/<br />

<strong>Strayer</strong> <strong>HRM</strong> <strong>520</strong> <strong>Week</strong> <strong>11</strong> <strong>Discussion</strong><br />

<strong>HRM</strong> <strong>520</strong> WEEK <strong>11</strong> DISCUSSION "Security Threats to Employee Information"<br />

Cybersecurity threats have been on the rise over the last few decades. With more advanced technology, hackers have<br />

found ways to break through security defenses and haul away employee information. The headlines are filled with news<br />

on security breaches on very well-known organizations.<br />

Describe two (2) ways a hacker can gain access to employee information.<br />

Recommend the steps an organization could take to address these security breaches after the fact. Then, outline a plan for<br />

preventing these breaches from occurring, and specify the legal requirements you would structure around information<br />

security in an HRIS.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!