Diligence and a high degree of scrutiny are crucial for a person who is writing investigative reports in an organization. In the first place, an investigation has to be objective and not be vindictive. It should avoid targeting an employee personally; it should be thorough and proper from a legal perspective. When all the legal procedures are followed in an investigation, the case of the employer becomes strong and…Continue
Added by TrainHR on May 19, 2017 at 1:47pm — No Comments
Believe it or not, you just can’t shred too much. If you aren’t destroying your sensitive data, my best advice is for you to start now. There are people out there who make a living diving into dumpsters in search of credit card info, bank account number, mortgage statements, and medical bills; all things they can use to steal your identity.
Here are 12 tips that you can use to help you destroy your sensitive data:
Added by Robert Siciliano on May 18, 2017 at 2:11pm — No Comments
Many organizations make the mistake of basing the suitability of candidates purely on their skills and the knowledge they bring. This measure goes only half the way, and is incomplete, because many organizations fail to take into consideration the fact that…Continue
Added by TrainHR on May 18, 2017 at 1:09pm — No Comments
There is no gainsaying the fact that bullying at the workplace is a very harsh and wicked way of degrading a colleague. It is a very uncivilized form of harassment at the workplace and is a serious deterrent to a healthy relationship at the professional level. Workplace bullying is very…Continue
Added by TrainHR on May 17, 2017 at 1:25pm — No Comments
For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe.
The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to security experts, the malware was specifically designed to attack this industrial equipment, but what it does is not totally known. It is only described as a type of “crimeware.”
The malware was first hinted…Continue
Added by Robert Siciliano on May 16, 2017 at 2:16pm — No Comments
A role change is many times inevitable for individuals in many positions. Change, as we all know, is the only constant in a business. When this much is said about businesses, it is but natural that employees in various positions need to be prepared for a change in their role. In the current…Continue
Added by TrainHR on May 16, 2017 at 1:03pm — No Comments
Strategic planning can be understood as the means by which organizations conceptualize and visualize their long term plans and the way by which they plan to go about achieving them. To implement strategy, organizations need to implement…Continue
Added by TrainHR on May 15, 2017 at 2:21pm — No Comments
On Friday, as most of you know, there was a massive global cyber attack that took the form of ransomware. The cost of which is still be calculated.
When you read the articles and analysis several things stand out, which I have been advising you about for some time. The attacks exploited non technical issues. Specifically the all too human behavior that clicks on emails or links that are not secure and not doing updates to key software in a timely manner. All the security technology is…Continue
Added by Douglas Nagan on May 13, 2017 at 3:00pm — No Comments
A payroll manager is essentially responsible for managing the payroll for the employees. The payroll manager has to ensure that the employees are paid on time, in accordance with their pay scale, and also in a legally…Continue
Added by TrainHR on May 12, 2017 at 1:24pm — No Comments
On company’s risk dashboard, the signal for operational risk should be flashing red. Over the past ten years, losses from operational risk have soared. Companies that want to achieve a sustainable and profitable business need to focus on building a framework to manage operational risk.
What Is Operational Risk?
Operational risk summarizes the risks a company…Continue
Added by Boris Agranovich on May 12, 2017 at 8:30am — No Comments
A stay interview is a potent tool for gauging employee moods and attitudes towards her work and the organization. It helps to understand employee thinking about her role and future in the organization. It is a powerful pointer to what an employee…Continue
Added by TrainHR on May 11, 2017 at 2:00pm — No Comments
A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand market had personal information left on them. These include tablets, mobile phones, and hard drives.
The market for second hand items is large, and it’s a good way to find a decent mobile device or computer for a good price. However, many times, people don’t take the time to make…Continue
Added by Robert Siciliano on May 10, 2017 at 2:20pm — No Comments
The Oil and Gas industry is growing but at the same time increases in Oil and Gas activity correlate with an increase in the rate of fatal occupational injuries, particularly when inexperienced workers are not sufficiently trained in safety and precautionary measures.
In addition, Oil and Gas companies also face unprecedented regulatory pressures –organizations are faced with the challenge of effectively managing their OSHA, BSEE, USCG, DOT, EPA,…Continue
Added by fahad_factors on May 10, 2017 at 2:00pm — No Comments
Employees have to be fresh in the mind, motivated and energetic if they have to be productive. Employees whose talents are recognized by the organization are more fired up about their job. They are likely to be more innovative, more creative and more loyal.
On the other hand, pressurizing the…Continue
Added by TrainHR on May 10, 2017 at 11:36am — No Comments
Added by Bryan Whitefield on May 10, 2017 at 1:16am — No Comments
The debate about the differences between leadership and managerial ability is perhaps as old as the time these two qualities came to be identified. There is a lot of discussion about what leadership and management are, which of these is more suited for organizations, whether one of these is born and the other made, and so on.
Managers carry out the task assigned to them in an efficient, methodical manner. They go by the set processes and rules. A leader, on the other hand, leads by…Continue
Added by TrainHR on May 9, 2017 at 11:23am — No Comments
Storm of Content
The Affordable Care Act. HIPAA. OSHA. If there is one thing hospitals aren’t short of these days, it’s new rules and regulations. And for every fresh law or regulation that gets passed, new or updated policies follow. Add in new technology adoption by the way of Electronic Health Records (EHRs) or mobile health and you’ve got a storm of seemingly countless—and constantly changing—policies and procedures that overworked…Continue
Added by fahad_factors on May 8, 2017 at 6:00pm — No Comments
If the idea of hacking as a career excites you, you’ll benefit greatly from completing this training. You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them.
"The control of information is something the elite always does … Information, knowledge, is power.”
– Tom Clancy
No longer will money have dominion over our ability to learn. Penetration testing and ethical…
Added by Boris Agranovich on May 6, 2017 at 2:30pm — No Comments
A shocking study by the National Associated for Information Destruction has revealed some terrifying information: 40% of electronic devices found on the second-hand market contains personal information. This information includes usernames and passwords, personal information, credit card numbers, and even tax information. Tablets were the most affected, with 50% of them containing this sensitive information, while 44% of hard drives contained the info.
What does this…Continue
Added by Robert Siciliano on May 3, 2017 at 2:00pm — No Comments
If you are like most of us, you have undoubtedly received an email that has asked you to click on a link. Did you click it? If you did, you are like 99% of internet users because clicking links in normal. But in some situations you may have found that the link took you to a new or maybe spoofed website where you might be asked to log in. If you ever did this, you may have been the victim of a likely phishing attack, and these attacks are getting fishier all of the time.…
Added by Robert Siciliano on May 2, 2017 at 2:18pm — No Comments