Credit: Thinkstock With college graduations now behind students, many young people might already have secured jobs even before they crossed the stage with their degrees in hand. With these fresh-faced employees on the payroll, now businesses must make sure their security habits are in line with today’s policies.New graduates aren’t just bringing their skills and experience to the workplace – they’re also bringing poor cybersecurity habits. Recent studies have shown Millennials are generally indifferent about data security.With many new grads choosing to use applications and devices that have not been approved by corporate IT, there is no easy way to monitor usage to ensure data remains secure.Here are seven tips from David Meyer of OneLogin, an identity access management company, to help companies to be aware of when hiring new employees. 1. Mindful social media sharingNew graduates are entering the workforce with a public approach to sharing information. Whether it’s sharing exclusive information or clicking on malicious links and ads, it’s crucial that new hires understand how their social media habits can affect their professional reputation and the reputation of the company as a whole. 2. Guard against phishing and vishing scamsOne of the most popular ways for cybercriminals to steal data is through phishing and vishing scams. Hackers will send emails or make phone calls impersonating the CEO or coworker of an employee in order to gain access to usernames, passwords and credit card information. Employees should beware of opening suspicious emails and accepting phone calls from unknown numbers. The best way to educate new graduates on phishing and vishing scams is to help them understand how their CEO and colleagues typically communicate, whether it’s by phone, email or messaging apps.3. Keep track of company devicesCompany data is often stolen from lost or misplaced hardware. Human resource and IT executives must train employees on how to protect company laptops, mobile devices and other hardware. Whether employees are hopping in a taxi or working from a coffee shop, they need to know how to keep track of company hardware in public spaces.4. Understand “shadow IT”Many recent college graduates will not only be bringing their new skills to the workforce, they will also be bringing their own preferred private messaging apps, digital notebooks and file sharing services. Shadow IT, or using apps unauthorized by the IT department, can weaken internal network security. The IT department should educate new hires on which apps are approved to ensure compliance. 5. Understand risks of open office spacesThe traditional closed, cubicle office space has been long forgotten by the modern enterprise. While new, open floor plans allow for seamless communication, they lack privacy. With clients and visitors frequently coming into the office, employees need to learn how to maintain privacy in an open work environment. Employers should teach new hires to use privacy screens and close their devices when they walk away from their desks.6. Collaboration of HR and ITCybersecurity training should be the responsibility of HR and IT executives. By giving security responsibilities to both HR and IT, employers can be assured that recent graduates are getting the training they need to keep company data safe. 7. Cybersecurity training beyond onboardingSecurity training isn’t just a one and done deal. Employers should implement a second round of cybersecurity training 30 days after on-boarding. This second training session should review best practices and discuss any concerns that have come up in the first 30 days of employment. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe