{"id":8218,"date":"2015-11-24T11:11:59","date_gmt":"2015-11-24T11:11:59","guid":{"rendered":"https:\/\/tsisupport.com\/?p=640"},"modified":"2020-05-27T10:00:59","modified_gmt":"2020-05-27T10:00:59","slug":"hillary-clintons-email-misstep","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=8218","title":{"rendered":"Avoiding Human Error &#8211; A Look At Hillary Clinton&#8217;s Email Misstep"},"content":{"rendered":"<p>One of the most discussed pieces of technology news of the last several months has been surrounding Hilary Clinton\u2019s private email server, which she used to conduct government business while acting as Secretary of State. It was revealed that Clinton had been sending emails containing classified information through her personal account which was being managed and administered by a civilian without security clearances. Undeniably, the national security implications associated with these types of incidents are profound and alarming, not just within the government sector but to SMBs who are now forced to ask \u2013 <em>how do we ensure that all company communications are being sent and received via secure resources?<\/em><\/p>\n<p>As the personal technology space continues to grow and evolve, many employers are now faced with the problem of deciding what \u2013 if any \u2013 limits to implement regarding employees use of their personal equipment (smartphones, laptops) to conduct company business. Many organizations have adopted <a href=\"http:\/\/bit.ly\/1LZNtpb\" target=\"_blank\" rel=\"noopener noreferrer\">Bring Your Own Device policies<\/a>, which allow employees to use their personal devices to conduct business, provided that they meet minimum security requirements.<\/p>\n<p>However, despite these precautions, there is still the possibility that employees will use their personal devices to conduct business in a manner that is not consistent with the policies and procedures in place. For example, what happens when you get into the murky waters of text messages? It\u2019s entirely possible, and not at all unheard of, that clients and prospects might reach out to company employees via text message to try to get a speedy reply to a question, or that employees may send a quick a text to a client to alert them they are running late to a meeting. For organizations that work with state or local governments, the military, or within industries with strict compliance standards, such as HIPPA, CMR, or PCI, maintaining records of all text messages and phone calls may be necessary to meet minimum security or compliance requirements.<\/p>\n<p>For businesses where security and or compliance are critical, there are ways to monitor these communications \u2013 including text messages and calls \u2013 by installing third-party applications on employee mobile devices. This does, however, mean that employees\u2019 private text messages and call logs would also be archived, which may not sit well with all employees. After all, these are their private, personally owned devices and their private communications with friends, family, doctors, etc. They could, of course, elect not to use the devices to conduct business, but in today\u2019s landscape that would be highly inconvenient to everyone involved.<\/p>\n<p>As an IT provider, we understand that every business is unique and possesses varying levels of needs that can only be understood with a consultative, partner driven approach. While we are advocates of Bring Your Own Devices policies where it makes sense, there are circumstances that may benefit from a more traditional and conservative approach to ensuring the security of their data. In instances where security, confidentiality, and compliance are non-negotiable, it may make more sense for organizations to provide their employees with company issued laptops, smartphones, and tablets.<\/p>\n<p>By doing this, organizations will be able to set clear distinctions and guidelines for their employees; any correspondence sent through the device, website viewed, calls made, etc., may be subject to being reviewed by the organization. If employees are concerned with their personal privacy, they will be able to make the informed decision to use their own personal devices for personal matters, rather than the company provided device. It may be more cumbersome for the employee \u2013 and even for the employer \u2013 but this will allow the employer to have full access and control over all business-related communications and operations in the event that such precautions are needed.<\/p>\n<p style=\"text-align: center;\"><em><strong>To discuss what the best approach may be for your organization, and to learn more about various security options and protocols, call TSI today at (508) 543-6979 or <a href=\"http:\/\/bit.ly\/1QB2jo4\" target=\"_blank\" rel=\"noopener noreferrer\">click here<\/a> to request a call from one of our representatives.<\/strong><\/em><\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>One of the most discussed pieces of technology news of the last several months has been surrounding Hilary Clinton\u2019s private email server, which she used to conduct government business while acting as Secretary of State. It was revealed that Clinton had been sending emails containing classified information through her personal account which was being managed&hellip;<\/p>\n","protected":false},"author":8,"featured_media":4402,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13],"tags":[87,131,140],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support<\/title>\n<meta name=\"description\" content=\"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=8218\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-24T11:11:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T10:00:59+00:00\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218\",\"name\":\"Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2015-11-24T11:11:59+00:00\",\"dateModified\":\"2020-05-27T10:00:59+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"description\":\"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=8218\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8218#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoiding Human Error &#8211; A Look At Hillary Clinton&#8217;s Email Misstep\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support","description":"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support","og_description":"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=8218","og_site_name":"TSI Support","article_published_time":"2015-11-24T11:11:59+00:00","article_modified_time":"2020-05-27T10:00:59+00:00","author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218","url":"https:\/\/tsisupport.com\/tsistaging\/?p=8218","name":"Avoiding Human Error \u2013 A Look At Hillary Clinton\u2019s Email Misstep - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage"},"thumbnailUrl":"","datePublished":"2015-11-24T11:11:59+00:00","dateModified":"2020-05-27T10:00:59+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"description":"Learning from Hillary Clinton\u2019s private email server mistake to ensure that all company communications are being sent and received via secure resources.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=8218"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8218#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Avoiding Human Error &#8211; A Look At Hillary Clinton&#8217;s Email Misstep"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8218"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8218"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}