How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 82

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 82

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. The ability to sell your model is as crucial as the aforementioned skills. Drive management to choose the next step.

How to Prepare for the Brazil Data Protection Law

InfoGoTo

With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready. Tips for Compliance.

B2B 56

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How much experience do you need?

Tips for Succeeding in a Project Management Training Program

Cllax

Anyone who is getting project management training should definitely know how to manage their education effectively to ensure the best learning possible. Although you may have resources offered to you, you have.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

GDPR 84

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

GDPR 84

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

Making it Stick: Records Management Training Approaches

The Schedule

Several weeks ago the University Archivist and I conducted our bi-annual University Archives and Records Management training session, part of our Office of Human Resources Faculty and Staff Development Program. So how to improve participation in records management training (RM)?

Small Breaches Can Make Big News: How to Protect Your Organization

Adam Levin

Significant mistake, I’m not minimizing that, but it was just an honest mistake,” said Tim Lynch the associate vice president for Strategic Communications to a campus newspaper. And that’s saying nothing about the damage caused by a breach or compromise to an organization’s reputation.

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

With 200+ attendees, multi-level training sessions, two education-packed days, networking, an Ask the Expert desk open throughout the conference, panel discussions and one-on-one time with valued sponsors such as Objectif Lune, ancora Software, Inc.,

How to create documentation to comply with the DSP Toolkit

IT Governance

The deadline for completing the DSP Toolkit is 31 March 2019, although larger organisations are requested to complete their submissions by October 2018. Data Security Standard 3: Training. Data Security Standard 6: Responding to Incidents.

8 Tips for a Secure Cybersecurity Awareness Month

MediaPro

National Cybersecurity Awareness Month is the perfect time to think holistically about security awareness. Here are eight tips touching on eight key cyber risks to share with employees and colleagues. Looking for more ideas to promote NCSAM? How to Take Action?

How to Step up Data Security in Your Business

Archive Document Data Storage

To say “data breaches are on the rise” is an understatement. Two weeks later, the US credit agency Equifax reported a cyberattack incident thought to reveal the personal information of 400,000 UK citizens as well as over half of all US citizens. Now is the time to step up data security in your business. In this blog, we offer tips for doing so. Use an off-site file storage service to keep your inactive files safe. Train Your Staff.

Strategies to Protect your Records from Ransomware

The Texas Record

Once the criminals gain access to the system, they plant a virus, causing problems when trying to retrieve records from these systems. Ransomware is a major issue because cyber criminals can bring your operations to an immediate halt.

Practical Tips for Creating and Managing New Information Technology Products

Lenny Zeltser

To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Determine what to build, not how to build it. Envision the future pertaining to product domain. Align product roadmap to business strategy.

Sales 58

eRecords 2018: Panel Discussions on Preservation and Protecting the Bits

The Texas Record

At the eRecords Conference, a diverse group of RMOs and records managers from the State Agency Coordinating Committee (SACC) Records Management Subcommittee joined up to have a conversation about how they are tackling records management issues and preservation in their respective agencies. Then the group dug in to the discussion by having Ms. They closed the panel by encouraging the audience to find their champions in their agency and use them to build the program.

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 1

Synergis Software

While there’s no be-all, end-all method to implementation, setting up enterprise software does require several layers of planning and cross-communication. To better understand the do’s and don’ts of implementing your engineering document management system, we asked our Applications Consultants to compile a list of the top 11 mistakes they see companies make during Adept implementations—as well as suggestions on how to prevent these errors.

What are the best qualifications for a career in cyber security?

IT Governance

In common with all IT professionals, information security specialists are very aware of the importance of qualifications in demonstrating competence to their current and future employers. It goes without saying that specialist training and qualifications will be required for these careers.

Reader favorites February 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to reduce offsite box storage expenses, how to protect your most valuable documents, and how to deliver a world-class RIM training program.

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We are excited to launch a new blog series featuring records management personnel in Texas sharing their experiences in the field. Let us know if you would like to share your words of wisdom (or humor!) How did you get involved with Records Management?

[Podcast] The Intelligent Approach to SharePoint and Office 365

AIIM

How do you make SharePoint and Office 365 deliver value as an intelligent information management platform? That's what we sought to find out when we first contacted SharePoint expert, Rob Bogue. Rob basically eats, breathes, and sleeps SharePoint, so we knew he'd be the perfect one to work with. Over the following months, we worked with Rob to develop an online course designed to teach you about Implementing Intelligent Information Management on SharePoint and Office 365.

5 ways to become a successful distance learning student

IT Governance

Distance learning has opened doors for people who want to gain new skills but for whatever reason are unable to take traditional, classroom-based courses. But there’s much less to fear than you might think. The important thing is that you create a schedule and stick to it.

Risk 65

7 Ways to Keep Employees Safe from the Scariest Cyber Threats

MediaPro

The world of cybercriminals, phishing, and malware is scary enough without risky employee behaviors contributing to the frights. Even the best-intentioned employees can sometimes do scary things that expose your organization to security risk. Training Tip #1.

New Video Course for State Agencies

The Texas Record

Are you new to state records management or need a refresher? We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page.

To Bucket or Not to Bucket…?

The Texas Record

which stands for “fear of missing out” that comes to mind. For those unfamiliar with the term “big buckets”, or “bucketing” as it regards to the records management world, National Archives and Records Administration (NARA) describes it as “ a big bucket (large aggregation) schedule that consists of items covering multiple related series of records and/or records in electronic systems. This will help you gauge how long the process will take.

NCSAM 2018 Week 4: Safeguarding the Nation’s Critical Infrastructure

MediaPro

A disruption to the critical infrastructure of our nation would bring significant, and even catastrophic, consequences. Most of the population takes for granted, or is unaware, that we’re entirely dependent on the functionality and efficiency of our nation’s infrastructure, in our day-to-day lives. Bots & Botnet Facts tip sheet from STOP. MediaPRO is proud to work with STOP.

5 essential controls to include in your cyber security checklist

IT Governance

Achieving effective cyber security doesn’t have to be a long and expensive process. There are many simple controls you can implement to boost your defences. Staff awareness training. Access controls ensure that staff can only view information that’s relevant to their job.

Payroll Provider Gives Extortionists a Payday

Krebs on Security

Faced with the threat of an extended outage, Apex chose to pay the ransom demand and begin the process of restoring service to customers. The company quickly took all of its systems offline, and began notifying customers that it was trying to remediate a security threat.

What did you do for European Cyber Security Month?

IT Governance

The campaign may be drawing to a close, but there is still plenty you can do to boost your awareness of cyber security risks. Let’s take a look at some of the biggest lessons we’ve learned in the past month, and what you can do to stay secure at home and in the workplace.

Thursday’s ILTACON 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Today’s the last day to check out the show at the Walt Disney World Swan and Dolphin Resort in sunny Orlando area with a number of sessions available and as many as 191 exhibitors providing information on their products and services. A handout of the tips presented in the session.

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives. Related: Using ‘gamification’ for security training. One program, for instance, puts on workshops for Congressional staffers and other federal employees on how to recognize and avoid nation-state backed hackers looking to interfere in elections.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor. But the truth of the matter is, companies of all sizes and in all sectors remain acutely vulnerable to attack vectors laid open by third-party contractors. And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. Third-party cyber risks are likely to persist at the current scale for a while longer.

Risk 125

Digitalizing your content - How do you change employee behavior?

AIIM

You have led the pack in creating a digital transformation strategy but how do you get your employees to engage and help your organization realize its goals? In this article, we look at 5 ways to change your employees behavior and drive digital transformation in your organization.

3 Steps to Take Care of Before Migrating to a Cloud-Based Document Management System

OneHub

When you need to have a contract signed by a client or you’re handling internal files like marketing budgets and payroll, transferring files through email isn’t always the best option. Here are three steps to take before migrating your business data to the cloud.

The Relationship Between AI And Cybersecurity

Cyber Info Veritas

On the other hand, machine learning is the process through which these machines/computers learn new information and how to apply it to solve problems. With deep learning, cybersecurity analysts do not have to worry about the magnitude of their data.