Five tips for maintaining your mental health when working from home

InfoGoTo

As you’re transitioning and getting used to working from home, here are five tips to help you take care of your mental health. For example, you can: set a time to wake up and stick to it. Training & Awareness covid19 mental health work from home

Paper 75

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 71

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 71

5 tips to keep your data safe and secure

IT Governance

For example, such messages might claim that your account has been hacked, that you need to confirm a card payment quickly or ‘something bad’ will happen, or that your bank account has been frozen. You can find out more about these tips, and find more like them, in ISO 27001.

Learn more about web archiving with Archive-It Advanced Training

Archive-It

There are lots of ongoing training opportunities for web archivists of all experience levels. You can always check out the highlights from our past trainings here in the Archive-It Help Center and register for the next upcoming webinars.

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. Quick Tips for Selling Your Data Science Model. This tip may not apply to you; however, it is imperative.

RIM Month Fun: Emoji Records Management

The Texas Record

At some point in the introduction to records management training courses for both local governments and state agencies we discuss what the different retention codes on the retention schedules mean. Examples of Disposition Holds – Emoji-fied. Emoji Records Retention Schedule.

FAQ: Who is the custodian of this record?

The Texas Record

What examples come to mind for times when there might be more than one custodian for the same record? The Definition of a Record, a Record Copy, and Examples of Non-Records (PDF) Download. Tips Local Governments records custodian State Agencies

The Personnel File: Retention & Best Practices

The Texas Record

We create and use personnel records to hire, re-hire, train, evaluate, compensate, address grievances, and provide verifications for all employees. This is a great example (one of many!) Every state agency and local government creates and maintains employee records.

8 Tips for a Secure Cybersecurity Awareness Month

MediaPro

Here are eight tips touching on eight key cyber risks to share with employees and colleagues. We’ve also included advice for awareness managers for building content focus on these risks into their training initiatives.

Machine Learning in HR Can Be Transformative — Be Sure Your Data Is Ready

InfoGoTo

The story is a good example of how the HR function is being transformed by AI technology. For example, if an organization has had difficulty retaining talent in the past, relying strictly upon historical records to train the algorithm could backfire.

How to start your career in cyber security

IT Governance

In this blog, we provide tips for getting your cyber security career started no matter your background. Account executives and junior penetration testers, for example, tend to have little work experience, and can learn while on the job. Cyber Security ISO 27001 ISO 27001 training

Building the Relationship Between RM and IT

The Texas Record

” AO : “ Before I joined the OOG in April 2015, Computer Services had been responsible for training the agency on using Archie, our records retention and classification tool. Training staff on Archie meant that IT was often asked “How should I classify….”

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 1

Synergis Software

Stay tuned for Part 2, where we’ll cover the final 6 tips for a successful implementation. Cutting back on implementation onsite training days to “save money”. One of the recurring problems our Applications Consultants see onsite are customers not taking full advantage of their implementation training days. Often, companies who cut back on training need more assistance earlier in the adoption process.

How to start your career in cyber security

IT Governance

Forbes recommends that people “get involved in meetups, attend conferences [and] ask for tips over coffee with current security professionals of local tech companies”. For example, if you want to be an information security manager, a relevant ISO 27001 qualification is a must.

What are the best qualifications for a career in cyber security?

IT Governance

I have quickly moved up the management ladder and can truly describe your training as ISO 27001 management rocket fuel.”. Training and HR managers will often ask the question, “Do you want a technical job or a career in management?”

To Bucket or Not to Bucket…?

The Texas Record

Example. Here’s an example of big bucketing using record series listed on the Texas State Records Retention Schedule for property and inventory records. With fewer record series, it becomes easier to train staff on how to understand and use the retention schedule. Using the example above, would Property Appraisals be a record series to include within this big bucket? There is a term in records management circles you might have heard of called “big buckets.”

7 Ways to Keep Employees Safe from the Scariest Cyber Threats

MediaPro

Here are seven tips on using training to help your employees recognize and avoid unsafe behaviors. Training Tip #1. Use training to connect the value found in the PII your company handles to the tangible, real-world consequences the compromise of such data would create.

5 essential controls to include in your cyber security checklist

IT Governance

Staff awareness training. Training courses show staff how security threats affect them and help them apply best-practice advice to real-world situations. Take phishing , for example. Achieving effective cyber security doesn’t have to be a long and expensive process.

Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi

IT Governance

As an example: if you or family member falls victim to a phishing attack or downloads malware, having a separate network will limit the criminals’ access or the spread of the infection across both personal and corporate devices. “It IT Governance employee tips on working from home.

Europe: Agile working across Europe – new arrangements come with increased cyber security risk

DLA Piper Privacy Matters

Top tips. Check and update policies and training to ensure that workers will: follow applicable policies around the use of email; use work email accounts rather than personal ones for work-related emails; ensure they are sending emails to the correct recipient. David Cook, John Magee.

#ourcovid19story

Preservica

The aim was to do our small part by supporting our user community - who are actively capturing, documenting and preserving the unfolding story of the pandemic for future generations - by donating free storage and providing additional training and support.

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

IT Governance employee tips for working from home. For example, when we caught up with our Head of Marketing James Warren, we learned that he’d noticed a problem arising from his new work set-up.

In the Workplace, Safety Is Sexy. And It All Starts With Your HR Department

Adam Levin

training session, the work that happens in those conference rooms at least in theory translates to profits. Notwithstanding the Google example, it would be a stretch–and possibly an actionable H.R. to train them into submission, thus minimizing the exposure.

The COVID Pandemic

Adam Shostack

There are a huge number of tips on how to stay safe, how to work from home, etc. I’m a fan of discipline in lists, and so I’ll share only one: “ I Spent a Year in Space, and I Have Tips on Isolation to Share.” I do a lot of training work, and that’s all postponed indefinitely. For example, read What Does It Really Cost to Run a Restaurant?

5 causes of data breaches that everybody should recognise

IT Governance

In this blog, we break down five common causes of data breaches, along with tips for staying safe. Find out what makes a good password >> Another important tip is to make sure nobody steals your credentials. Malware is a perfect example of just how simple cyber crime can be.

The Best Conferences for Records Managers

AIIM

There are many ways to learn beyond the traditional training course. Tips to Finding Other Events. For example, if you’re in the nuclear energy sector, the Nuclear Information and Records Management Association (NIRMA) annual conference might be a good one to look into.

How To Protect Yourself From Hackers

Cyber Info Veritas

Their intent is to find technological exploits that allow them to access private and confidential data and information so that they can then use this information for personal gains—blackmailing you for money is an apt example of personal gain.

Here's Why Your Static Website Needs HTTPS

Troy Hunt

Even the government has been pushing to drive adoption of HTTPS for all sites, for example in this post by the National Cyber Security Centre in the UK : all websites should use HTTPS, even if they don't include private content, sign-in pages, or credit card details.

This is the old ChiefTech blog.: The original, and still the best: YourTime

ChiefTech

Tuesday, 13 February 2007 The original, and still the best: YourTime It was nice to see a few comments in response to my last post about RSS and information overload: RSS addict ;-) Luis Suarez provided us with tips for working effectively with RSS, including a recommendation to " Walk away, whenever you can, from e-mail. Awareness Training on predefined, organization-wide Management Expectations. This is the old ChiefTech blog. Nice of you to drop in and visit.

Online File Sharing and Storage — 5 Best Practices to Know When Working from Home

OneHub

Take a look at our five top tips and best practices for using an integrated system like Onehub. For example, having employees login through a VPN can leave several holes in your security. Train your users.

The Top Ways to Handle Confidential Waste

Archive Document Data Storage

In this blog, we offer the tips for handling your confidential waste. Offer regular, hands-on training sessions that allow your staff to see firsthand how documents and data should be discarded. For example, your information destruction policy should require documents to be shredded promptly at the end of their retention lifecycle. Every business generates confidential waste. The key is making sure yours is disposed of thoroughly and securely.

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

We sought to train our students – tomorrow’s business leaders – to embrace the “Big Data MBA” concepts in creating digital transformation-based business models. To support this training, we created a methodology that guided the students through a digital transformation exercise. For example, digital renders distribution intermediaries obsolete (with limitless choice and price transparency). Let’s walk through an example.

#ModernDataMasters: Nicola Askham, The Data Governance Coach

Reltio

Nicola Askham is the leading data governance training provider in the UK with over 16 years of experience and research in the field. She delivers training and consulting to major organisations to help them implement full data governance frameworks. Kate Tickner, Reltio.

ISO 27001 management review: a practical guide

IT Governance

For example, you might have requested statistical analysis related to certain practices, or decided to adjust a process. Here are some tips to help you get started: Keep attendees to a minimum. Discover what risk management entails with our Certified ISO 27005 ISMS Risk Management Training Course.

Risk 53

The Relationship Between AI And Cybersecurity

Cyber Info Veritas

For instance, by collecting this behavioral data, Facebook, Amazon, and Google can offer their users tips and strategies on how to keep their data safe. A great example of this is Google. A great example of this is Google.

Travelex says it won’t pay ransom to crooks as currency chaos continues

IT Governance

For example, there’s the possibility that the cyber criminals will up the ransom demand if you try to negotiate, or that they won’t keep their word once you’ve paid. 7 tips for preventing ransomware attacks. However, as the majority of infections are the result of malicious attachments in phishing emails, you can eradicate your biggest threat by training employees to spot suspicious messages.

Secure Together: is your organisation prepared for the end of lockdown?

IT Governance

For example, Darktrace noted that some cyber criminals have compromised corporate messaging systems and contacted employees to try to get them to hand over sensitive information. Tips for working from home.

The 5 biggest ransomware pay-outs of all time

IT Governance

Although experts warn organisations about the long-term effects of negotiating ransoms (you become a target for future attacks, for example), refusing to pay up will cost a lot in the short-term and halt productivity until systems are restored. A simple tip for preventing ransomware.

3 Steps to Take Care of Before Migrating to a Cloud-Based Document Management System

OneHub

Here are a few tips. For example: Payroll records for nonexempt employees need to be kept for three years. Train and adapt Some team members and clients may feel apprehensive about the data move. You’ll need to train and reassure everyone affected.