Information Systems Security: A Good Defense is a Good Offense

Security – whether online or offline – is extremely important.

According to Identity Theft Resource Center, the number of data breach notices issued in 2024, was 1,350,835,988 (and those are just the ones that were officially reported!).

Every day, we entrust our information to others, hoping that they will keep it safe. But what steps are they really taking? And, are they following through? Just one mistake on the company’s part can leave thousands of individuals primed for an attack.

It’s an epidemic.

That’s why it’s imperative that companies focus on physical, infrastructure, and operational security. As they say, a good defense is a good offense! There are a variety of ways companies can strategically approach security. But to be truly effective, more than one measure should be taken and used in conjunction with the others.

Cyber Security is a top priority for WHR Global and we have always taken proactive measures to secure confidential data for clients and their transferring employees.

Information Handling

    • The way your organization chooses to manage your electronic information is the foundation of a strong security plan. Data encryption translates your data into concealed code, which greatly reduces the vulnerability of attacks from hackers and data thieves. Utilizing a Transport Layer Security (TLS) certificate on your website encrypts any data communicated over the internet.

Secure Infrastructure

    • To keep pace in the ever-changing security landscape, it’s important to have measures in place to protect infrastructure. Firewalls, guest networks, and endpoint protection are additional critical components. Coupled with encrypted backups and off-site storage of information assets, you’re looking even better.

Security Best Practices

    • Organization-level security is important, but a culture of security is also crucial. Best practices surrounding password creation should be relayed to your teams. With the number of online tools available, it is highly likely that your employees are creating their own passwords. Instruct them not to use easily found information (i.e., birthdays, anniversaries, pet names, etc.). You should also host an annual security training to remind your staff of your protocols.

Audit

    • Another way to ensure data is continually protected within your organization is to complete frequent internal and third-party audits. At WHR, we undergo an annual
      SOC® (SSAE18 Type II) audit. A third-party organization extensively evaluates our systems design, operating effectiveness, and internal controls. We elect to participate in this audit to uphold our client commitments to data integrity.

Following Security Regulations

    • Beyond what a company can choose to do, there are many things that companies must do. There are a plethora of security regulations depending on the industry and the type of work completed. The most recent regulation buzzword is “GDPR” – the data protection rules set forth by the EU. Other regulations across many industries include the Federal Information Security Management Act (FISMA), the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), the Payment Card Industry Data Security Standard (PCI-DSS), the Gramm Leach Bliley Act (GLBA), and so many others.
WHR Global Security Icon

Data Security – A Top Priority at WHR Global

The fact is, data security must be a top business priority and become part of the corporate culture.

It’s something that we take very seriously at WHR Global. We ensure that our employees are up-to-date on information security best practices, not only for our company, but for their personal safety as well.

We understand that we possess sensitive and confidential data relating to our clients and their transferring employees. We have always taken proactive measures to secure information against accidental or unauthorized access, disclosure, modification, or destruction and to assure everyone involved of the availability, confidentiality, and integrity of our data.

A Security Tip from Jeff Beyer,
WHR’s IT Director

Everyone loves online shopping!

It’s important to remember that you’re exposing yourself to threats each and every time you enter your credit card online.

Many sites offer two factor authentication, and I strongly recommend you enable that when possible.

It definitely doesn’t eliminate attacks, but it can help protect you when there is one.

Our Custom Technology Solutions and on-site IT Team are
available to cater to your mobility program’s specific needs:

WHR Group Simplifies Relocation Experience via DocuSign

New Feature Provides End-to-End Document Visibility and Efficiency

MILWAUKEE, Wis., — WHR Group Inc. (WHR), a 25-year leader in the global mobility industry, today announced a strategic technology advancement with DocuSign, provider of the world’s #1 e-signature solution as part of its broader System of Agreement Platform. This powerful new feature changes the game for transferring employees.

Perfect for relocation, the addition of e-signature capabilities allows the ability to create all necessary relocation forms in a secure, efficient, and convenient environment. WHR’s ability to provide 24/7 access to the forms combined with the convenience of eliminating wet signature requirements, greatly increases the relocating employees’ overall experience. Within 30 days of the DocuSign implementation, the average completed document return time has decreased from 72 hours to just 15 hours, an improvement of 78%.

“One clear impact from e-signatures is our ability to better service the transferring employee,” said WHR’s President Paul De Boer. “At the end of the day, we all want the same thing: employees who are ready to work in their new location. We know relocation is a difficult, stressful time. We cannot change the mechanics of the process, but we can change the delivery.”

“We are proud to choose DocuSign as their secure platform is trusted by organizations everywhere,” said Jeff Beyer, WHR’s IT Director. “It is clear that DocuSign shares our desire for the highest level of convenience and compliance.”

The implementation of e-signatures is a marked improvement from the prior technology, which required transferring employees to print documents, manually complete them, and scan or fax the documents back to WHR. The newly developed, fully integrated information collection and documentation approval process allows transferring employees to sign and complete their documents completely online.

 ###

 About WHR Group Inc.

WHR Group offers white-glove global relocation services to companies and government agencies regardless of industry, size, or location. WHR is a privately held company founded on the industry need to offer cost-effective relocation benefits without compromising empathy, ethics, or service. This belief forms the basis of their “high-tech, human-touch” business model, blending modern relocation technology with a highly trained, dedicated team of relocation experts who are driven by quality. More information can be found at www.whrg.com or follow @WHRGroup on Twitter, LinkedIn, and Facebook.

It’s no secret we take data security seriously. See how our technology can offer solutions for your relocation program today.

Keeping Relocation Data Safe

Data security has always been a top concern for businesses, but with the increasing amount of online transactions and exchanges of personal information, data security means more today than it did years or even months ago.

The relocation industry in particular needs to hold data security in the highest regard. The online portals, mobile apps, and self-serve technology that today’s clients and transferees demand mean a person’s entire life (ID, banking information, home address) is potentially accessible to hackers.

What should you and your relocation provider do to ensure the integrity of such important information? Here are two important items we recommend as crucial to protecting your employees and their relocation data.

Keeping Relocation Data Safe

1. Conduct a SOC audit

Since 2008, we have participated in an annual SOC 1® (SSAE 16, formerly SAS 70) audit by an independent, CPA-licensed firm. The audit tests our system design, operating effectiveness, and internal controls.

According to Schneider Downs, SOC reports are the “de facto standard” for using the work of a third-party firm as “a substitute for performing first-hand testing in conjunction with financial statement audits or Sarbanes-Oxley compliance.”

Specifically, the auditor checks for:

  1. The existence and description of internal controls
  2. That these controls are operating with sufficient effectiveness to achieve security goals

2. Try to get “hacked!”

Annually, we also contract with a third-party IT security firm to perform an external vulnerability and penetration test against our network and websites.

If your provider completes similar tests, the report’s firm will break down the Critical Items, Areas of Concern, and Potential Problems to ensure the framework for protecting data meets the necessary standards.

The bottom line is that you should never overlook the importance of third-party and unbiased audits. If your current provider does not undergo any third-party and unbiased audits, be sure to ask how the provider is ensuring proper controls through other means.

It’s easy to connect with experts to help test data security, so make sure it’s not just as easy for your provider—and your data—to be compromised.