How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 71

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 71

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. The ability to sell your model is as crucial as the aforementioned skills. Drive management to choose the next step.

Learn more about web archiving with Archive-It Advanced Training

Archive-It

There are lots of ongoing training opportunities for web archivists of all experience levels. You can always check out the highlights from our past trainings here in the Archive-It Help Center and register for the next upcoming webinars. Interested in boosting access to your own?

Zoom, Microsoft & NTT Data Leaders Share Work-from-Home Security Tips

Dark Reading

Tech leaders encourage organizations to maintain security awareness training and offer advice on how to protect their information

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How much experience do you need?

How to Prepare for the Brazil Data Protection Law

InfoGoTo

With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready. Tips for Compliance.

B2B 56

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. As with most industries, you’re much more likely to get ahead in cyber security if you have experience.

Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi

IT Governance

As we enter the third week of the UK’s lockdown (yes, it has only been that long), things are starting to take their toll. As a reminder of that, we’re back with more of our experiences and advice on how to manage through the pandemic.

Tips for Succeeding in a Project Management Training Program

Cllax

Anyone who is getting project management training should definitely know how to manage their education effectively to ensure the best learning possible. Although you may have resources offered to you, you have.

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

GDPR 74

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

GDPR 74

Some tips and ideas for digital archivists working from home

Preservica

In light of the impacts of COVID-19 many archivists and information professionals, Preservica staff included, are having to quickly adapt to staying productive while working remotely. Your directors also need to know you can meet the needs of the public or business you serve.

Making it Stick: Records Management Training Approaches

The Schedule

Several weeks ago the University Archivist and I conducted our bi-annual University Archives and Records Management training session, part of our Office of Human Resources Faculty and Staff Development Program. So how to improve participation in records management training (RM)?

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

Folks are taking advantage of virtual meeting software like GoToMeeting and Zoom to video chat with friends, host virtual dinner parties, and even play board games! In our work lives, companies are piecing together Digital Workplace strategies to allow their employees to work from home.

Small Breaches Can Make Big News: How to Protect Your Organization

Adam Levin

Significant mistake, I’m not minimizing that, but it was just an honest mistake,” said Tim Lynch the associate vice president for Strategic Communications to a campus newspaper. And that’s saying nothing about the damage caused by a breach or compromise to an organization’s reputation.

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

With 200+ attendees, multi-level training sessions, two education-packed days, networking, an Ask the Expert desk open throughout the conference, panel discussions and one-on-one time with valued sponsors such as Objectif Lune, ancora Software, Inc.,

How to create documentation to comply with the DSP Toolkit

IT Governance

The deadline for completing the DSP Toolkit is 31 March 2019, although larger organisations are requested to complete their submissions by October 2018. Data Security Standard 3: Training. Data Security Standard 6: Responding to Incidents.

Working Internationally for Libraries: How to write effective grant proposals

CILIP

Working Internationally for Libraries: How to write effective grant proposals. How did it all start? When she mentioned that various organisations offer bursaries to attend IFLA WLIC I set my mind to keep a careful eye for potential calls for applications.

How to Step up Data Security in Your Business

Archive Document Data Storage

To say “data breaches are on the rise” is an understatement. Two weeks later, the US credit agency Equifax reported a cyberattack incident thought to reveal the personal information of 400,000 UK citizens as well as over half of all US citizens. Now is the time to step up data security in your business. In this blog, we offer tips for doing so. Use an off-site file storage service to keep your inactive files safe. Train Your Staff.

Strategies to Protect your Records from Ransomware

The Texas Record

Once the criminals gain access to the system, they plant a virus, causing problems when trying to retrieve records from these systems. Ransomware is a major issue because cyber criminals can bring your operations to an immediate halt.

Practical Tips for Creating and Managing New Information Technology Products

Lenny Zeltser

To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Determine what to build, not how to build it. Envision the future pertaining to product domain. Align product roadmap to business strategy.

Sales 62

eRecords 2018: Panel Discussions on Preservation and Protecting the Bits

The Texas Record

At the eRecords Conference, a diverse group of RMOs and records managers from the State Agency Coordinating Committee (SACC) Records Management Subcommittee joined up to have a conversation about how they are tackling records management issues and preservation in their respective agencies. Then the group dug in to the discussion by having Ms. They closed the panel by encouraging the audience to find their champions in their agency and use them to build the program.

8 Tips for a Secure Cybersecurity Awareness Month

MediaPro

National Cybersecurity Awareness Month is the perfect time to think holistically about security awareness. Here are eight tips touching on eight key cyber risks to share with employees and colleagues. Looking for more ideas to promote NCSAM? How to Take Action?

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We are excited to launch a new blog series featuring records management personnel in Texas sharing their experiences in the field. Let us know if you would like to share your words of wisdom (or humor!) How did you get involved with Records Management?

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 1

Synergis Software

While there’s no be-all, end-all method to implementation, setting up enterprise software does require several layers of planning and cross-communication. To better understand the do’s and don’ts of implementing your engineering document management system, we asked our Applications Consultants to compile a list of the top 11 mistakes they see companies make during Adept implementations—as well as suggestions on how to prevent these errors.

New Video Course for State Agencies

The Texas Record

Are you new to state records management or need a refresher? We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page.

Reader favorites February 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to reduce offsite box storage expenses, how to protect your most valuable documents, and how to deliver a world-class RIM training program.

What are the best qualifications for a career in cyber security?

IT Governance

In common with all IT professionals, information security specialists are very aware of the importance of qualifications in demonstrating competence to their current and future employers. It goes without saying that specialist training and qualifications will be required for these careers.

To Bucket or Not to Bucket…?

The Texas Record

which stands for “fear of missing out” that comes to mind. For those unfamiliar with the term “big buckets”, or “bucketing” as it regards to the records management world, National Archives and Records Administration (NARA) describes it as “ a big bucket (large aggregation) schedule that consists of items covering multiple related series of records and/or records in electronic systems. This will help you gauge how long the process will take.

[Podcast] The Intelligent Approach to SharePoint and Office 365

AIIM

How do you make SharePoint and Office 365 deliver value as an intelligent information management platform? That's what we sought to find out when we first contacted SharePoint expert, Rob Bogue. Rob basically eats, breathes, and sleeps SharePoint, so we knew he'd be the perfect one to work with. Over the following months, we worked with Rob to develop an online course designed to teach you about Implementing Intelligent Information Management on SharePoint and Office 365.

5 ways to become a successful distance learning student

IT Governance

Distance learning has opened doors for people who want to gain new skills but for whatever reason are unable to take traditional, classroom-based courses. But there’s much less to fear than you might think. The important thing is that you create a schedule and stick to it.

Risk 56

7 Ways to Keep Employees Safe from the Scariest Cyber Threats

MediaPro

The world of cybercriminals, phishing, and malware is scary enough without risky employee behaviors contributing to the frights. Even the best-intentioned employees can sometimes do scary things that expose your organization to security risk. Training Tip #1.

SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email

The Last Watchdog

It comes as no surprise that top cyber crime rings immediately pounced on the Coronavirus outbreak to spread a potent strain of malware via malicious email and web links. I had the chance to visit with Votiro CEO and founder Aviv Grafi at RSA 2020.

Risk 158

5 essential controls to include in your cyber security checklist

IT Governance

Achieving effective cyber security doesn’t have to be a long and expensive process. There are many simple controls you can implement to boost your defences. Staff awareness training. Access controls ensure that staff can only view information that’s relevant to their job.

Spotlight: Saving Time with “A Step Saving Kitchen”

Unwritten Record

Since many of us have been spending more time in our kitchens cooking lately, we thought this would be a good time to highlight the film A Step Saving Kitchen (16-P-1783).

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

As we enter the fourth week of the lockdown, you’ve hopefully begun to find a routine in your new work arrangement. Perhaps you’re able to get out of bed and shower before logging on instead of lying in bed until 8:55 am and crawling to your desk.

How Much Does it Cost to Become a Certified Information Professional?

AIIM

Do you want to earn your seat at the table for your organization’s important strategic discussions? Maybe you’re going for that next promotion and looking to round out your skillset. You might even just want to prove to yourself that you have what it takes to be among the industry’s elite. No matter the reason, one thing you’ll want to know is how much it costs to get certified. How to Determine If You’re Ready to take the CIP.

IT 55

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

The “slap” as Ayatollah Ali Khamenei described it was a ballistic missile attack on a target that had three hours to get out of harm’s way. Despite assurances to the contrary, it’s a fair assumption there is more to come, according to national security experts.