<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security protocols &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/security-protocols/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 29 Aug 2020 01:35:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>security protocols &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How, and when, to divvy consequences to employees for breaching security policy</title>
		<link>https://risk-academy.ru/how-and-when-to-divvy-consequences-to-employees-for-breaching-security-policy/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 29 Aug 2020 01:35:40 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Labor]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[security protocols]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[technical director , CTO team]]></category>
		<category><![CDATA[Uber]]></category>
		<category><![CDATA[Tim Wade]]></category>
		<category><![CDATA[Cycling in Chicago]]></category>
		<category><![CDATA[Divvy]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-and-when-to-divvy-consequences-to-employees-for-breaching-security-policy/</guid>

					<description><![CDATA[A recent study out of the U.K. suggests that organizations, fueled in part by security challenges during the pandemic, are beginning to impose harsher consequences on employees who breach security [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>A recent study out of the U.K. suggests that organizations, fueled in part by security challenges during the pandemic, are beginning to impose harsher consequences on employees who breach security policy.</p>
<p>Nearly 40 percent of respondents said they had dismissed employees for such transgressions, according to the report from Centrify.</p>
<p>While security leaders often pay with their jobs for lapses that lead to breaches at their companies (think Target and Uber), organizations long have struggled with how to handle everyday employees who step outside the bounds of security protocols either deliberately or inadvertently.</p>
<p>“Handling employees that run afoul of company security policies requires walking the line between promoting accountability and enforcing standards on one hand, while also cultivating honesty and openness about activities that may present risk,” said Tim Wade, technical director, CTO team, at Vectra. Clear ramifications also “incentivizes timely self-reporting to give the security team the lead time they may need to take action before any resulting damage may be done.”</p>
<p>Companies typically have been hesitant to impose more severe punishment,&#8230;</p>
</div>
<p><a href="https://www.scmagazine.com/home/security-news/how-and-when-to-divvy-consequences-to-employees-for-breaching-security-policy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Use Risk Management Techniques to Improve Remote Work</title>
		<link>https://risk-academy.ru/how-to-use-risk-management-techniques-to-improve-remote-work/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 30 May 2020 17:08:01 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[Academic disciplines]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Project management]]></category>
		<category><![CDATA[security protocols]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-to-use-risk-management-techniques-to-improve-remote-work/</guid>

					<description><![CDATA[Companies around the world quickly transitioned into remote work after coronavirus started spreading. Thanks to advanced technology, it’s possible to work from home and connect with colleagues. However, the use [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Companies around the world quickly transitioned into remote work after coronavirus started spreading. Thanks to advanced technology, it’s possible to work from home and connect with colleagues. However, the use of technology comes with its set of challenges, especially in cybersecurity. For companies that adjusted suddenly without formal planning, performing thorough risk assessments, and identifying risk management techniques is now more critical than ever. By understanding the security risks associated with remote work, you can choose to either avoid, mitigate, transfer, or accept the risks.</p>
<h2>Performing a Risk Assessment</h2>
<p>A risk assessment helps you identify all company devices, data, threats, and impacts of risks. The assessment includes identifying, analyzing, and prioritizing the cyber risks of remote working.</p>
<h2>Conduct an IT Audit</h2>
<p>The purpose of an IT audit is to help you gather information about your network, your security protocols, and your vulnerabilities. The audit should target all aspects of your IT environment, including the staff. You can either perform the audit with your internal IT team or outsource it.</p>
<ul>
<li>Even if everyone is home, confirm the&#8230;</li>
</ul>
</div>
<p><a href="https://techspective.net/2020/05/30/how-to-use-risk-management-techniques-to-improve-remote-work/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
