Remove Compliance Remove Cyber Security Remove Magazine Remove Training
article thumbnail

The Evolution of L&D Tracking

Everwise

Adopting them was the next logical step for HR and L&D professionals needing to track the employee training experience of formal e-learning more effectively and document compliance. These range from online courses in SEO or cyber-security to MOOC (series of small videos)and even interactive content.

article thumbnail

Revamped I-9 – July 2016

Workbright

New Administrator Training Recording. We had a great turnout for last month’s New Administrator Training! We hope to provide these live trainings on a regular schedule but if you didn’t get to join us and feel like you could benefit from some training, check out the recording of the event here: .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Test your Disaster Recovery Plan”, With Jason Remillard and Richard Greenberg

Thrive Global

As a part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing Richard Greenberg, CISSP, a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker. Can you tell us a bit about how you grew up?

article thumbnail

“Keep Learning”, With Douglas Brown and Heather Stratford of Drip7

Thrive Global

I trained the new owners, handed over the reins, and watched a very successful company dissolve within months. Decreasing cybersecurity risk and preventing breaches through empowering employees with skills and knowledge in cyber security and other compliance areas. What they lack is support, training, and confidence.

article thumbnail

“It starts with the attitude”, With Jason Remillard and Tunio Zafer

Thrive Global

Review your internal policies, write down a security guide for employees and make the effort to enforce it and regularly monitor and update it. Write down a security and backup policy. If you don’t know where to start, consult a cyber security company. The traditional approach to security just can’t keep up.