Now Available: A web based interactive map in WPS! The map generates a complete overview of all permit requests, work permits and isolations (LOTO). Go to https://www.workpermitsystem.com/functionalities/interactive-map for more information.…Continue
Added by Age Jellema on June 6, 2017 at 12:11pm — No Comments
SANS has recently published its annual security awareness report (click on the link for a copy). Key is the concept of ‘security awareness’, which when combined with their Security Awareness Maturity Model provides a pathway to improved cyber security by managing the organizations cyber security culture.
Sound familiar? It should as that has been my message for years and is integral to my approach and courses. All…Continue
Added by Douglas Nagan on June 5, 2017 at 6:00pm — No Comments
Here's Why Compliance Solutions Are Inadequate for Managing Regulatory Changes
Regulatory compliance is mandatory, but it’s not the end goal; it’s the minimum operating standard. For strong companies, compliance is a mere byproduct of performing well and managing uncertainty. Compliance solutions can…Continue
Added by Steven Minsky on June 2, 2017 at 8:00pm — No Comments
Onboarding is an extremely important function for an organization. It is the first step towards creating an impression about the organization in the mind of the new hire. Not getting the onboarding process right puts a stumbling block in the employee’s first step into the organization at…Continue
Added by TrainHR on June 2, 2017 at 12:12pm — No Comments
All these positions –the mentor, the coach and the manager –carry their own importance to organizations. To someone in a non-management position, these three roles may appear to be synonymous with each other, but there is an element of difference between each of these.
An organization needs all these three roles if it has to facilitate team engagement and lead it to higher results. A mentor, coach and a manager have their own unique and designated roles to perform and bring…Continue
Added by TrainHR on June 1, 2017 at 1:26pm — No Comments
An often overlooked aspect of a business is the stakeholders. Many organizations have a problem in identifying their real stakeholders. Many stakeholders are pretty obvious since they are visible. But many businesses have a problem in getting to understand who the real stakeholders are because there are the invisible ones who are difficult to identify.
Internal and external stakeholders make up a strong and potent force that has the ability to either make or break an organization.…Continue
Added by TrainHR on May 31, 2017 at 9:08am — No Comments
I have facilitated countless workshops for executive teams. Sometimes we kick goals because the exec team have done their homework and really know their business and the challenges they face. They have done enough of the hard-smart work to know what they need to tackle and now they are working through the options and determining the best path forward.
Then there are the ones that have not done their homework. The formation of strategy appears based on hope or…Continue
Added by Bryan Whitefield on May 31, 2017 at 2:12am — No Comments
You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game.
Ethical hackers are called “white hat hackers” and are legal hackers, that help businesses find security problems in their networks. Developer and security teams, who build out codes, should have a white hat hacker on their side. This way, they will know from the start if the code is vulnerable. This is also known…Continue
Added by Robert Siciliano on May 30, 2017 at 4:32pm — No Comments
Communication is the most important means by which a person or organization express themselves. Communicative ability is difficult to suppress. At the individual level, there are talented communicators, and there are the effective communicators. A talented…Continue
Added by TrainHR on May 30, 2017 at 1:48pm — No Comments
Symantec recently released its latest Internet Security Threat Report (ISTR). If you are not familiar with this report it provides a global snapshot of the state of internet threats. It examines Targeted Attacks; Email: Malware, spam & phishing; Web attacks, toolkits, & exploiting vulnerabilities online; Cyber Crime and the underground economy; Ransomware: extorting businesses & consumers; New frontiers: Internet of Things, mobile, & cloud threats.
If you want to get…Continue
Added by Douglas Nagan on May 29, 2017 at 7:30pm — No Comments
That substance abuse is a serious issue and menace at the US workplace needs no iteration, if one takes a look at these disturbing statistics compiled by the National Drug Free Workplace Alliance (NDWA) for five years from 2008 suggest:
- Close to nine percent of the workforce in the…Continue
Added by TrainHR on May 29, 2017 at 1:20pm — No Comments
A lesson many businesses learn the hard way is that in today's ever-changing and complex regulatory and political environment operational risks appear to be increasingly exponentially. In order to take control of Operational Risk leaders of the company and risk managers need to have the answers to many questions. Can I profitably grow my business? How do…Continue
Added by fahad_factors on May 24, 2017 at 10:54pm — No Comments
Last week, news broke of a global ransomware attack that has struck individuals and companies around the world. In the wake of the attack, which has affected computers in 150 countries, many companies…Continue
Added by Steven Minsky on May 24, 2017 at 4:30pm — No Comments
If you use Gmail, pay attention! Security experts have announced that there is a very effective phishing scam out there, and you are a target. This scam, which has only been growing over the past couple of months, is also hitting other email providers, too. However, it’s quite difficult to detect.
According to researchers at WordFence, who make a security tool for WordPress, this is a pretty serious…Continue
Added by Robert Siciliano on May 24, 2017 at 2:19pm — No Comments
Payroll fraud is a matter of serious concern to the people affected by it, the organization in which it happens, and to the economy overall. It is estimated that payroll fraud is involved in around an eighth of all workplace frauds and makes up about a twelfth of all occupational frauds worldwide. On…Continue
Added by TrainHR on May 24, 2017 at 1:54pm — No Comments
I have always been fascinated by the old question, “Which came first, the chicken or the egg?” According to…Continue
Added by Bryan Whitefield on May 24, 2017 at 2:57am — No Comments
The importance of onboarding can be understood from the fact that it starts with the induction of the new hires and acclimatizes them with all the important aspects of the new organization, such as the culture, environment, people, and the business. In the light of the important elements that go into onboarding; it is a fallacy and a misconception to assume that it is yet another ritual that HR has to perform…Continue
Added by TrainHR on May 23, 2017 at 12:59pm — No Comments
Diligence and a high degree of scrutiny are crucial for a person who is writing investigative reports in an organization. In the first place, an investigation has to be objective and not be vindictive. It should avoid targeting an employee personally; it should be thorough and proper from a legal perspective. When all the legal procedures are followed in an investigation, the case of the employer becomes strong and…Continue
Added by TrainHR on May 19, 2017 at 1:47pm — No Comments
Believe it or not, you just can’t shred too much. If you aren’t destroying your sensitive data, my best advice is for you to start now. There are people out there who make a living diving into dumpsters in search of credit card info, bank account number, mortgage statements, and medical bills; all things they can use to steal your identity.
Here are 12 tips that you can use to help you destroy your sensitive data:
Added by Robert Siciliano on May 18, 2017 at 2:11pm — No Comments