O'Reilly logo

Background Screening and Investigations by W. Barry Nixon, Kim Kerr

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix I How to Create a Culture of Security Consciousness

Wanda Hackett, Ph.D.

The Importance of Security Consciousness

What’s at risk?

• Statistical data

• Examples of employee behaviors that put companies at risk

Scenario

The following describes the transformation of an organization fraught with potential security nightmares into one that is well on its way to becoming more security conscious and much safer.

Company A

Security Unconscious—An Organization at Risk

• Inaccurate background data;

• Cursory research to identify sound background check data services;

• Use of a less comprehensive/inexpensive Web-based data base service;

• Database fraught with data entry errors;

• Employees unaware of the relationship between their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required