Five tips for maintaining your mental health when working from home

InfoGoTo

As you’re transitioning and getting used to working from home, here are five tips to help you take care of your mental health. Video conferencing for meetings can make you feel like you’re still part of your team at work.

Paper 75

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 71

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 71

3 GDPR compliance tips for small businesses

IT Governance

Managers should get expert training. Depending on how well versed they are in the Regulation’s requirements, managers might benefit from taking a foundation training course that provides a practical demonstration of the implications and legal requirements of the GDPR for organisations.

GDPR 80

Some tips and ideas for digital archivists working from home

Preservica

Here are a few tips and ideas from Preservica users and the digital preservation community on how to stay productive no matter where you might need to work from. Your directors also need to know you can meet the needs of the public or business you serve.

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

Folks are taking advantage of virtual meeting software like GoToMeeting and Zoom to video chat with friends, host virtual dinner parties, and even play board games! So, we thought we’d gather our best WFH tips for those newly remote workers.

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. Quick Tips for Selling Your Data Science Model. This tip may not apply to you; however, it is imperative.

4 tips for achieving better ISO 27001 audit results

IT Governance

An ISO 27001-compliant ISMS requires ongoing maintenance and review to meet the Standard’s requirements in clauses 8 and 9. The internal audit is an essential element of this process that must be carried out as described in clause 9.2 of ISO 27001, and should be conducted at planned intervals.

RIM Month Fun: Emoji Records Management

The Texas Record

At some point in the introduction to records management training courses for both local governments and state agencies we discuss what the different retention codes on the retention schedules mean. Emoji Records Retention Schedule.

FAQ: Who is the custodian of this record?

The Texas Record

For emails, there can be more than two record custodians, and meeting the following criteria will assign more than one person as the custodian of the record: The message qualifies as a record. Tips Local Governments records custodian State Agencies

Building the Relationship Between RM and IT

The Texas Record

The meeting was instructive, not only because of the technical help IT afforded, but also because it truly revealed a whole set of concerns and consideration IT faced that had an impact on RM decisions. Training staff on Archie meant that IT was often asked “How should I classify….”

How to start your career in cyber security

IT Governance

In this blog, we provide tips for getting your cyber security career started no matter your background. You should also consider following industry professionals on Twitter, as many of them provide useful tips, engage in debates and answer questions.

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We have trained Records Coordinators in each division. And we have regular live training classes in records management. We also have plans to develop short videos for Records Management training, as well as continue with our live training.

Machine Learning in HR Can Be Transformative — Be Sure Your Data Is Ready

InfoGoTo

While nearly half of the HR professionals surveyed give their departments high marks at meeting the current needs of the organization, only 36% said their group was prepared to thrive over the next three to five years.

How to start your career in cyber security

IT Governance

Meeting people and making connections is sometimes essential for getting your foot in the door. Networking websites such as LinkedIn can also be helpful, but face-to-face meetings are much more effective. There has never been a better time to get into cyber security.

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 1

Synergis Software

Stay tuned for Part 2, where we’ll cover the final 6 tips for a successful implementation. In order to determine the right amount of user licenses, we recommend scheduling a focused meeting with an Adept expert to thoroughly review the different types of users you have, the level of access each type requires, and the frequency of access needed. Cutting back on implementation onsite training days to “save money”.

To Bucket or Not to Bucket…?

The Texas Record

My first experience with bucketing was a few years ago during a presentation by Susan Cisco (from the Gimmal Group) at our local chapter ARMA meeting. With fewer record series, it becomes easier to train staff on how to understand and use the retention schedule. Tips big buckets Information Governance Local Governments records management officer Retention retention schedule development RMO State Agencies

How to Keep Your WFH Employees Safe From new Cybersecurity Attacks

InfoGoTo

” Double Down on User Training. Schedule half hour video training sessions or record an instructional video that covers best practices to keep them safe from malicious messages. The security at tips don’t apply just to pandemic-related lockdowns.

Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi

IT Governance

IT Governance employee tips on working from home. Consider the number of casual conversations you have with colleagues when you’re in the office, or how regularly you leave the office at lunchtime, or the number of meetings you normally attend.

Europe: Agile working across Europe – new arrangements come with increased cyber security risk

DLA Piper Privacy Matters

Top tips. Check and update policies and training to ensure that workers will: follow applicable policies around the use of email; use work email accounts rather than personal ones for work-related emails; ensure they are sending emails to the correct recipient. David Cook, John Magee.

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

With 200+ attendees, multi-level training sessions, two education-packed days, networking, an Ask the Expert desk open throughout the conference, panel discussions and one-on-one time with valued sponsors such as Objectif Lune, ancora Software, Inc.,

ISO 27001 management review: a practical guide

IT Governance

However, we suggest holding meetings more regularly than this, because you’ll have a lot to cover and will find that information security issues evolve quickly. How frequently you hold meetings is up to you – but we think quarterly or monthly get-togethers are more suitable. Here are some tips to help you get started: Keep attendees to a minimum. Keep management reviews and management meetings separate. This isn’t simply to prove that you’ve been holding meetings.

Risk 53

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

It doesn’t quite meet the standard of extreme revenge that the Supreme Leader has called for, and which has been echoed by several Middle East players in response to the U.S. Tip: Pause before you click on a link in an email or open an attachment.

#ourcovid19story

Preservica

At our recent online global user group meeting we announced the #ourcovid19story initiative. You might also be interested in our blog Some tips and ideas for digital archivists working from home.

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

IT Governance employee tips for working from home. I’ve noticed in the last week that I’m spending more time looking at my screen that usual, due to [having so many] online meetings […] and therefore have been suffering more than usual.”.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Mike Jordan, senior director of the Shared Assessments Program, a Santa Fe, NM-based intel-sharing and training consortium focused on third-party risks, points out that at least one of the banks that had data exposed in this latest huge data leak wasn’t even a customer of the allegedly culpable contractor. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Risk 126

The COVID Pandemic

Adam Shostack

There are a huge number of tips on how to stay safe, how to work from home, etc. I’m a fan of discipline in lists, and so I’ll share only one: “ I Spent a Year in Space, and I Have Tips on Isolation to Share.” I do a lot of training work, and that’s all postponed indefinitely.

How to create documentation to comply with the DSP Toolkit

IT Governance

Data Security Standard 3: Training. Top tips for producing DSP Toolkit documentation. Blank meeting templates.

The Best Conferences for Records Managers

AIIM

There are many ways to learn beyond the traditional training course. Tips to Finding Other Events. It’s also a fantastic opportunity to meet with other customers using the same tool and share lessons learned, best practices, and so forth.

The 5 biggest ransomware pay-outs of all time

IT Governance

US local government has fast become one of the most popular targets for ransomware attacks, because they’ve proved more than willing to meet cyber criminals’ demands. After sitting on infected devices for three weeks, the Riviera Beach City Council agreedto meet the criminals’ demands.

Reflections on international collaboration: enthusiasm, commitment, resilience. It is all about dive

CILIP

In another one of my experiences I was delivering training in Mozambique and I learnt that professional meetings were an area requiring development. Despite lively debates, meetings did not always lead to agreed ways forward. Top-tips and best practices.

Archive-It Partner News, March 2018

Archive-It

Save the Date: Archive-It’s Annual Partner Meeting. Internet Archive staff, Archive-It partners, and friends will meet at ARCHIVES*RECORDS 2018 , the joint annual meeting of CoSA, NAGARA, and SAA in Washington, DC. Tech and Training. Advanced training.

3 Steps to Take Care of Before Migrating to a Cloud-Based Document Management System

OneHub

There’s a service out there that’s sure to meet your needs. Here are a few tips. And when it comes to property deeds, meeting minutes, budgets, financial statements, and audit reports, these should be kept indefinitely. You’ll need to train and reassure everyone affected.

Archive-It Partner News, January 2018

Archive-It

To catch up on the web archiving discussions at meetings and conferences from coast to coast, check out the summary blog post: Notes from the field: Fall/Winter 2017. Tech and Training. Have your say: Web archiving training needs. Recorded and upcoming advanced training.

Treating cybersecurity like workplace safety

CGI

When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Heaven help the person whose power cord was stretched across the pathway where someone could trip and fall in one of those meetings.

Travelex says it won’t pay ransom to crooks as currency chaos continues

IT Governance

However, experts generally urge organisations not to negotiate, because payments help fuel the cyber crime industry and there’s no guarantee that meeting the criminals’ demands will put the infected organisation in a better position. 7 tips for preventing ransomware attacks. However, as the majority of infections are the result of malicious attachments in phishing emails, you can eradicate your biggest threat by training employees to spot suspicious messages.

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Atos hope to be email-free internally by the end of 2013 and may start to target other issues, like unproductive meetings and the mis-use of PowerPoint. I'm also reminded of the 70-20-10 workplace learning model , with Atos describing the typical working day of an Atos employee as being "divided between training, working creatively and collaboratively.". Hat tip Paul Wallbank Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email.

IT 63

The Relationship Between AI And Cybersecurity

Cyber Info Veritas

For instance, by collecting this behavioral data, Facebook, Amazon, and Google can offer their users tips and strategies on how to keep their data safe. As our use of computers and the internet increases, cyber threats also increase.

#ModernDataMasters: Nicola Askham, The Data Governance Coach

Reltio

Nicola Askham is the leading data governance training provider in the UK with over 16 years of experience and research in the field. She delivers training and consulting to major organisations to help them implement full data governance frameworks. Kate Tickner, Reltio.

Treating cybersecurity like workplace safety

CGI

When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Heaven help the person whose power cord was stretched across the pathway where someone could trip and fall in one of those meetings. Tips to prioritize cybersecurity. Treating cybersecurity like workplace safety. pallavi.m@cgi.com. Tue, 05/15/2018 - 04:16.