Have you ever felt that panic when you realize that you may have some important information that is exposed? That is exactly what has happened to Workday a popular software utilized by companies for Human Resources and payroll. They have confirmed a data breach that potentially compromised customer information and case files. To be completely honest, this news made me double-check all of my accounts!
Workday delivers enterprise cloud applications for finance, Human Resources (HR), and payroll, helping organizations effectively manage their business. They operate globally across the United States, Europe, Asia, and Australia.
What could have been accessed?
How Workday is responding
Workday appears to give appropriate attention to the issue. They've:
Workday delivers enterprise cloud applications for finance, Human Resources (HR), and payroll, helping organizations effectively manage their business. They operate globally across the United States, Europe, Asia, and Australia.
What Happened?
Here is the deal: some idiot or group accessed Workday’s system without authorization. So you understand this better, that means they accessed data they were not entitled to. It is not just names or emails; the data accessed could include case details and client or sensitive information. Think about your own payroll or HR files being compromised…uh, YIKES!What could have been accessed?
- Employee data
- Customer account information
- Case Management files
Why This Matters
Even if you don't engage with Workday, it is the primary (or secondary) provider of HR and payroll solutions for a number of companies. A breach like this can result in a number of things:- Identity theft
- Compromised confidential business information
- Legal issues to companies
How Workday is responding
Workday appears to give appropriate attention to the issue. They've:
- Identified affected systems
- Stopped access
- Communicated compromised clients
- Started an investigation
Safety Tips
Why do hacks happen? There is no system that is 100% safe. What can you do?- Make strong and unique passwords
- Use multi-factor authentication
- Look for unusual account activity