Whitepaper

Protecting Corporate Data in a Hacker’s World

protecting-data
It seems as if every day brings a new worry for your cyber security. Were those home goods worth my credit card information being stolen? How much do I love being able to Photoshop® funny cats into all of my holiday photos? Enough to have my personal information compromised? Is this new drill purchased from the hardware store worth the potential hassle? As they seem to be getting more and more frequent, data breaches can certainly turn anyone into a hacking hypochondriac, all with good reason. All of these stories vary in detail, but nearly every one is summarized with a line that is depressingly familiar: “one of the largest… Read More
Dislike (0)

Introduction: Six Steps for Building a Robust Physical Security Practice

introduction
Business owners are often concerned over the protection of their networks, data, employees, visitors, and, of course, their assets. Ensuring a safe and secure workplace is an important responsibility, not something they would just hand off to anyone. They look to those they trust, those who also have the necessary skills to support their physical security systems and strategies. This is a prime opportunity for capable and knowledgeable solution providers. Physical security is that often-hidden, somewhat forgotten, yet crucial part of the business infrastructure. Like many of today’s solutions, the assessment and planning processes that occur beforehand are as important… Read More
Dislike (0)

CompTIA’s Strategy for the Changing IT Landscape

comptia-strat-06-11
As corporations and governments adjusted to and matured with the use of personal computers in the workplace, the need for Information Technology (IT) professionals certified in hardware, operating systems, networking, and IT security (among other fundamental IT skills) increased exponentially. As a result, commercial training organizations involved in IT training have traditionally had large success promoting CompTIA A+ certification classes in their local markets. However, over recent years, IT departments have had to adjust to different, untraditional trends. Download this whitepaper to learn: The industry trends that are reflected in the new CompTIA A+ certification. How CompTIA is adjusting to… Read More
Dislike (0)

How to Bridge the Gap from Traditional Training Delivery to the Virtual Classroom

how-to-bridge-the-gap-from
The virtual classroom provides flexibility, as well as potential savings in training costs. However, making the transition to teaching in an environment that uses these technologies does require some adjustment in the design and delivery of training. Organizations that have long provided instructor-led training in a traditional classroom training environment have found that traditional methods and resources adapt well to the virtual classroom. Download this whitepaper to learn: How to effectively adapt traditional training delivery methods to the virtual classroom. A sound methodology for translating delivery in the virtual classroom. Key delivery approaches that you can start using today. Read More
Dislike (0)

The BYOD Revolution: Key to Improved Employee Learning, Engagement, and Collaboration

byod
Many learning leaders don’t fully appreciate the emotional connection employees today have with their personal devices. They’re joined at the hip with them, both literally and figuratively, and they put enormous value on the availability of 24/7 connectivity. Want more productivity from your knowledge workers? Join the BYOD (Bring Your Own Device) revolution, AKA “the consumerization of IT.” Download this whitepaper to learn why to: Do let employees access the company’s resources through their personal devices rather than via company-issued products while at work. Do let them be productive at home or on the road by using their devices to… Read More
Dislike (0)

IT Certifications – Are They Worth it?

protecting_your_training_investment
Information technology certifications show no sign of decreasing in relevance. In fact, look for numerous new certifications to appear this year. Job seekers continue to develop relevant job skills and gain a competitive edge by pursuing credentials such as PMP, CISSP, and MCSE. But are a few extra letters on one’s business card really worth the cost in time, effort, and dollars when there is such a demand for IT professionals in the workplace? It seems so, based on information provided by those who track job placements and salaries. Download this whitepaper to learn: The value of IT certifications Trends… Read More
Dislike (0)

Protecting your Training Investment with Training Reinforcement

protecting_your_training_investment
If you’re involved in training (or even if you’ve ever had training), you have heard of the learning curve. But you may not know that the concept is nearly as old as experimental psychology itself. The learning curve was discovered by psychologist Hermann Ebbinghaus in 1885. However, as soon as Ebbinghaus discovered the learning curve, which describes how quickly you learn information, he discovered the forgetting curve, which describes how quickly you forget newly learned information. The good news is that lost learning is an opportunity to improve the effectiveness of training, which is another way of saying to improve… Read More
Dislike (0)

Protecting Corporate Data in a Hacker’s World

cfr_white_paper_cover
It seems as if every day brings a new worry for your cyber security. Were those home goods worth my credit card information being stolen? How much do I love being able to Photoshop® funny cats into all of my holiday photos? Enough to have my personal information compromised? Is this new drill purchased from the hardware store worth the potential hassle? As they seem to be getting more and more frequent, data breaches can certainly turn anyone into a hacking hypochondriac, all with good reason. All of these stories vary in detail, but nearly every one is summarized with a line that is depressingly familiar: “one of the largest… Read More
Dislike (0)