All Blog Posts (1,903)

Status map work permit system (safety management software)

Now Available: A web based interactive map in WPS! The map generates a complete overview of all permit requests, work permits and isolations (LOTO).  Go to https://www.workpermitsystem.com/functionalities/interactive-map for more information.…

Continue

Added by Age Jellema on June 6, 2017 at 12:11pm — No Comments

SANS 2017 Security Awareness Report - Some Thoughts

SANS has recently published its annual security awareness report (click on the link for a copy). Key is the concept of ‘security awareness’, which when combined with their Security Awareness Maturity Model provides a pathway to improved cyber security by managing the organizations cyber security culture.

Sound familiar? It should as that has been my message for years and is integral to my approach and courses. All…

Continue

Added by Douglas Nagan on June 5, 2017 at 6:00pm — No Comments

Managing Regulatory Changes and Political Risk with Enterprise Risk Management (Part 2)

Here's Why Compliance Solutions Are Inadequate for Managing Regulatory Changes

Regulatory compliance is mandatory, but it’s not the end goal; it’s the minimum operating standard. For strong companies, compliance is a mere byproduct of performing well and managing uncertainty. Compliance solutions can…

Continue

Added by Steven Minsky on June 2, 2017 at 8:00pm — No Comments

Getting the Onboarding Right helps Organizations to keep Good Employees

Onboarding is an extremely important function for an organization. It is the first step towards creating an impression about the organization in the mind of the new hire. Not getting the onboarding process right puts a stumbling block in the employee’s first step into the organization at…

Continue

Added by TrainHR on June 2, 2017 at 12:12pm — No Comments

The Roles of Mentor, Coach and Manager

All these positions –the mentor, the coach and the manager –carry their own importance to organizations. To someone in a non-management position, these three roles may appear to be synonymous with each other, but there is an element of difference between each of these.

An organization needs all these three roles if it has to facilitate team engagement and lead it to higher results. A mentor, coach and a manager have their own unique and designated roles to perform and bring…

Continue

Added by TrainHR on June 1, 2017 at 1:26pm — No Comments

Identifying and retaining all the stakeholders in a business

An often overlooked aspect of a business is the stakeholders. Many organizations have a problem in identifying their real stakeholders. Many stakeholders are pretty obvious since they are visible. But many businesses have a problem in getting to understand who the real stakeholders are because there are the invisible ones who are difficult to identify.

Internal and external stakeholders make up a strong and potent force that has the ability to either make or break an organization.…

Continue

Added by TrainHR on May 31, 2017 at 9:08am — No Comments

A strategy is but a hypothesis

I have facilitated countless workshops for executive teams. Sometimes we kick goals because the exec team have done their homework and really know their business and the challenges they face. They have done enough of the hard-smart work to know what they need to tackle and now they are working through the options and determining the best path forward.

Then there are the ones that have not done their homework. The formation of strategy appears based on hope or…

Continue

Added by Bryan Whitefield on May 31, 2017 at 2:12am — No Comments

Hire an Ethical Hacker NOW!

You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game.

Ethical hackers are called “white hat hackers” and are legal hackers, that help businesses find security problems in their networks. Developer and security teams, who build out codes, should have a white hat hacker on their side. This way, they will know from the start if the code is vulnerable. This is also known…

Continue

Added by Robert Siciliano on May 30, 2017 at 4:32pm — No Comments

Want to lead? Learn to communicate effectively

Communication is the most important means by which a person or organization express themselves. Communicative ability is difficult to suppress. At the individual level, there are talented communicators, and there are the effective communicators. A talented…

Continue

Added by TrainHR on May 30, 2017 at 1:48pm — No Comments

Symantec ISTR 2017

Symantec recently released its latest Internet Security Threat Report (ISTR). If you are not familiar with this report it provides a global snapshot of the state of internet threats. It examines Targeted Attacks; Email: Malware, spam & phishing; Web attacks, toolkits, & exploiting vulnerabilities online; Cyber Crime and the underground economy; Ransomware: extorting businesses & consumers; New frontiers: Internet of Things, mobile, & cloud threats.

If you want to get…

Continue

Added by Douglas Nagan on May 29, 2017 at 7:30pm — No Comments

Dealing with substance abuse at the workplace

That substance abuse is a serious issue and menace at the US workplace needs no iteration, if one takes a look at these disturbing statistics compiled by the National Drug Free Workplace Alliance (NDWA) for five years from 2008 suggest:

-        Close to nine percent of the workforce in the…

Continue

Added by TrainHR on May 29, 2017 at 1:20pm — No Comments

7 Steps To Take Control Of Operational Risk

A lesson many businesses learn the hard way is that in today's ever-changing and complex regulatory and political environment operational risks appear to be increasingly exponentially. In order to take control of Operational Risk leaders of the company and risk managers need to have the answers to many questions. Can I profitably grow my business? How do…

Continue

Added by Boris Agranovich on May 27, 2017 at 10:00am — 2 Comments

Reactive vs. Proactive Compliance

Whether we are talking about broader HSSE or more narrowly focused CIP, NERC, ISO, Dodd-Frank, etc. compliance,  there are two general approaches to implementing a compliance plan within an organization:  proactive and reactive.

Reactive – Many companies have used a reactive compliance process for many years.  I hesitate to call a reactive approach a plan because it really isn’t a plan beyond the mechanics of…
Continue

Added by fahad_factors on May 24, 2017 at 10:54pm — No Comments

8 Ways to Protect Against Ransomware Attacks

Last week, news broke of a global ransomware attack that has struck individuals and companies around the world. In the wake of the attack, which has affected computers in 150 countries, many companies…

Continue

Added by Steven Minsky on May 24, 2017 at 4:30pm — No Comments

The Best Gmail Phishing Scam Ever!

If you use Gmail, pay attention! Security experts have announced that there is a very effective phishing scam out there, and you are a target. This scam, which has only been growing over the past couple of months, is also hitting other email providers, too. However, it’s quite difficult to detect.

According to researchers at WordFence, who make a security tool for WordPress, this is a pretty serious…

Continue

Added by Robert Siciliano on May 24, 2017 at 2:19pm — No Comments

Understanding payroll fraud and preventing it

Payroll fraud is a matter of serious concern to the people affected by it, the organization in which it happens, and to the economy overall. It is estimated that payroll fraud is involved in around an eighth of all workplace frauds and makes up about a twelfth of all occupational frauds worldwide. On…

Continue

Added by TrainHR on May 24, 2017 at 1:54pm — No Comments

Invite a chicken to lunch

I have always been fascinated by the old question, “Which came first, the chicken or the egg?” According to…

Continue

Added by Bryan Whitefield on May 24, 2017 at 2:57am — No Comments

The importance of onboarding

The importance of onboarding can be understood from the fact that it starts with the induction of the new hires and acclimatizes them with all the important aspects of the new organization, such as the culture, environment, people, and the business. In the light of the important elements that go into onboarding; it is a fallacy and a misconception to assume that it is yet another ritual that HR has to perform…

Continue

Added by TrainHR on May 23, 2017 at 12:59pm — No Comments

Diligence and scrutiny are important for writing investigative reports

Diligence and a high degree of scrutiny are crucial for a person who is writing investigative reports in an organization. In the first place, an investigation has to be objective and not be vindictive. It should avoid targeting an employee personally; it should be thorough and proper from a legal perspective. When all the legal procedures are followed in an investigation, the case of the employer becomes strong and…

Continue

Added by TrainHR on May 19, 2017 at 1:47pm — No Comments

Top 12 Tips to Destroy Your Sensitive Data

Believe it or not, you just can’t shred too much. If you aren’t destroying your sensitive data, my best advice is for you to start now. There are people out there who make a living diving into dumpsters in search of credit card info, bank account number, mortgage statements, and medical bills; all things they can use to steal your identity.

Here are 12 tips that you can use to help you destroy your sensitive data:

  1. Buy a shredder. That said, I don’t own a…
Continue

Added by Robert Siciliano on May 18, 2017 at 2:11pm — No Comments

Monthly Archives

2017

2016

2015

2014

2013

2012

2011

2010

1999

Our Sponsors

Would you like to reach over 22,000 + Risk Professionals? 

REQUEST OUR MEDIA KIT

 

Advance Your Career - Take the Global Risk Academy Courses Below

Business Exchange

If your organization delivers products and services that bring value to our members, you are welcome to join our partnership program.

Companies are welcome to setup a business profile page in our Multimedia Business Directory. You will get full control of the page and can include cutting edge possibilities – videos, adverts, presentations, white papers, job offers, Press Releases, product information, company blog, news feeds and more.

CLICK HERE TO APPLY

Our Knowledge Partners

Request our MEDIA KIT

Badge

Loading…

Our Twitter feed

© 2017   Created by Boris Agranovich.   Powered by

Badges  |  Report an Issue  |  Terms of Service