HR TechTip - Protecting Your Employees' Private Information - The Blytheco Blog
HR TechTip – Protecting Your Employees’ Private Information

HR TechTip – Protecting Your Employees’ Private Information

HR Tech Tip

Working in HR and payroll puts you in a position of protecting your coworkers’ valuable personal information.  What steps are you taking to ensure that trust is not misplaced? Here are 5 easy

Safe Records

Keep your employee’s records safe

steps to help you secure the data you are trusted with.

  1. Watch for phishing and social engineering. Don’t forget this can take the form of a phone call, it isn’t always online.
    • Emails may contain links to web pages with real company names and a similar look to the actual company’s website, so instead of clicking a link type in the actual url for the webs site.
    • When in doubt ask your IT staff if available.
    • Go to for more information
  1. Don’t click on links or attachments in an email unless you are certain it is from a trusted source. Contact the person before opening if you have any doubts – anyone’s email account can be hacked and used to compromise your system.
  2. Use secure passwords that include a mixture of upper and lower case letters, special characters and/or numbers – and don’t post your password on your monitor or under your keyboard.
    • To create a difficult to guess but easy to remember password use a phrase and substitute numbers and characters for some of the letters.
      • My dog’s name is Spot = MyD0gsN@m3iSspot!
      • The trees on the beach are leafless = Th3Tree$OnTheBeechRLeaf1es$
  1. Lock your computer when you walk away, even if you are just going to get a cup of coffee.
  2. Make sure you are saving your important documents in a place IT is backing up. They may be backing up your user folder on the network, but not directly on your workstation.
    • If a virus is contracted, the backup of these documents can be critical to continuing business as usual.

Be Vigilant for Viruses

There are currently Cyber Viruses infecting computers by opening various types of files, including .txt, .doc, .exe and other files that can run an automatic script. These are ransom-ware viruses, and the goal is to gain monetary value in return for an unlock code to open your documents. In other words, the documents are being held for ransom. Historically many individuals have paid the ransom, yet still receive no code.  So beware!  Read further about the ‘Locky Virus’ and how to protect you and your company in one of our other recent blog articles.

Share This Post