Administrators who use MyEnroll.com’s online enrollment system may find the Notes Program useful. Through the Notes module, administrators can document conversations and information specific to each employee.
According to the Internal Revenue Service, last week was National Tax Security Awareness Week. During this time, the IRS released a tip outlining 5 steps data breach victims can take to protect their financial accounts, identities, and tax returns.
Google teamed up with the University of California, Berkeley, to research how electronic hijackers take over Internet accounts. According to Google, more than 15% of Internet users reported the takeover of an email or social networking account (“hijacking”). The research with Berkeley involved analyzing black markets to see how hijackers steal passwords and other sensitive data.
MyEnroll.com includes a user settings program to allow for personalization and account tracking.
An employer with a separate enrollment system and payroll system can use MyEnroll to synchronize data. Planned data interchanges can assure consistency of data across different employer platforms.
Girl Scouts of the USA (“Girl Scouts”) will be offering 18 cybersecurity badges for girls in kindergarten through twelfth grade. Girl Scout badges are earned by participants for demonstrating mastery of a particular topic and are worn as a patch on the Girl Scout uniform.
The first 5-digits of an employee’s Social Security Number (SSN) are masked when an employee is logged into MyEnroll.com. An employee may confirm their complete SSN in MyEnroll.com by clicking the “Reveal” link associated with the SSN on the screen. The reveal link will initiate a pop up window in which the employee will be prompted to enter their complete SSN. If the SSN they enter matches the SSN in MyEnroll.com, they will be presented with a message confirming the match.
Cobra Control Services Administrator training sessions are held twice a week.
The Department of Homeland Security published a tip card offering suggestions on rules and regulations an organization can implement to address cyber threats. The document can be accessed by clicking here.