GFG imzdvSdage

Contact Us

HomeinterviewsWhy HR Must Evolve into a Cybersecurity Stakeholder in 2025

Why HR Must Evolve into a Cybersecurity Stakeholder in 2025

In 2025, the Philippines is experiencing a surge in increasingly sophisticated cyberattacks. One of the most vulnerable yet underestimated targets in this landscape is the Human Resources department. Managing large volumes of sensitive employee data, HR teams are now on the front lines of cybersecurity defense. As cyber threats grow more advanced, HR must evolve from data custodian to active security stakeholder.

Understanding the Threat Landscape

1. Rise in Sophisticated Cyber Threats

  • Cybercriminals are exploiting:

    • Geopolitical instability

    • Rapid digital adoption

    • Expanded digital attack surfaces

  • Common attack types in the Philippines:

    • Malware

    • Phishing

    • Social engineering

    • Deepfake-driven impersonations

2. Underground Cybercrime Markets

  • Telegram-based marketplaces tied to Philippine actors have doubled in activity year-on-year.

  • These platforms trade:

    • Full PII data sets

    • Exploitation kits

    • Forged documents

3. Persistent Ransomware Risks

  • Although slightly reduced in 2024, the Philippines still ranks 12th in Asia-Pacific for ransomware attacks.

  • Double extortion tactics threaten both data access and confidentiality—particularly HR-managed records.

Why HR Is a High-Value Cyber Target

4. HR as a Data Goldmine

  • Stores extensive personally identifiable information (PII), including:

    • Tax IDs, bank details, health records, and performance reviews

  • Relies on:

    • Email

    • Cloud-based HRIS platforms

    • Recruitment portals—common vectors for social engineering

5. Weakest Link in Access Control

  • HR handles onboarding and offboarding, making it a gatekeeper of system access.

  • Lapses in process security or awareness can lead to major breaches.

6. Real-World Impact: The PhilHealth Breach

  • 2023 attack exposed millions of records due to poor data control.

  • Led to legal violations under the Data Privacy Act of 2012 and reputational damage.

7. Insider Threats on the Rise

  • Insiders—whether careless or malicious—have direct access to systems.

  • Difficult to detect without structured monitoring and risk management.

Bridging the Cybersecurity Knowledge Gap

8. HR Must Upskill in Cyber Awareness

HR does not need to become highly technical but must understand foundational concepts such as:

  • Phishing Detection

    • Spot suspicious sender information, urgency, and unexpected attachments.

  • Data Privacy Compliance (DPA)

    • Practice transparency and purpose-driven, proportional data collection.

  • Access Control

    • Apply role-based permissions and multi-factor authentication.

  • Secure Data Handling

    • Encrypt, retain, and dispose of data responsibly.

  • Insider Threat Mitigation

    • Implement clear policies and regular employee awareness programs.

9. Practical Learning Resources

  • Government-led training via:

    • National Privacy Commission

    • Department of Information and Communications Technology (DICT)

  • Beginner-friendly courses available on:

    • LinkedIn Learning

    • Coursera

From Vulnerability to Strategic Asset

10. Four Ways HR Can Strengthen Cyber Resilience

a) Smarter Personnel Risk Management

  • Embed cybersecurity into hiring, onboarding, and offboarding.

b) Policy Enforcement

  • Co-develop and uphold data usage, remote work, and acceptable use policies.

c) Driving Security Awareness

  • Use HR’s training capabilities to lead engaging, department-tailored awareness campaigns.

d) Supporting Incident Response

  • Help manage breach communications, staff coordination, and compliance recovery procedures.

HR’s New Mandate in Cybersecurity

The Philippines faces one of Southeast Asia’s most aggressive cyber threat environments. HR departments, often seen solely as administrative units, now play a pivotal role in organizational defense. As custodians of critical data and access, HR must transform into active cybersecurity participants. By developing cyber literacy, enforcing smart policies, and embedding security into HR practices, they can help their organizations become more resilient, compliant, and trusted.
Source – People Matters Global