Go Daddy Tackles Security Issues with elearning Solutions

Size: px
Start display at page:

Download "Go Daddy Tackles Security Issues with elearning Solutions"

Transcription

1 Go Daddy Tackles Security Issues with elearning Solutions When an employee of an Atlanta-based company unwittingly sold the personal information of 145,000 individuals to a group of criminals, not only did the stock price of the company drop nearly 10 percent in one day, but it also resulted in a $15 million fine - and irreparable damage to the organization s reputation. They aren t the first company to suffer damage due to security breaches, and unfortunately they won t be the last. The real shame, though, is that these types of devastating fiascos could be prevented with appropriate employee training. Today s realities Go Daddy, the world s largest domain register and hostname provider, takes potential threats to its customer information base very seriously. In addition to physical security and constant network monitoring, Go Daddy mandates that each and every one of its 1,800 employees receive up-to-date training on information security and data retention procedures. However, with offices in five locations throughout Arizona as well as Colorado, Iowa and Washington, D.C., the logistics of providing quality, consistent levels of training in an economically feasible manner was a bit of a challenge. Until, that is, they discovered Inspired elearning s web-based, interactive tools. About 99 percent of our employees have access to some sort of security-sensitive information, so it is imperative that they be educated properly, says Kimberly Cilke, Vice President of Human Resources. When the company had only 50 to 100 employees, it was easy to deliver through onsite classroom programs. But with the tremendous growth we ve experience over the last five years, this method was just too cumbersome. 1

2 Neil Warner, the company CIO and Vice President of Technical Operations was responsible for bringing Inspired elearning into Go Daddy. He says, Due to the nature of our business, most of our employees live on the computer and respond well to information distributed this way. I saw Inspired elearning s tools used very effectively at another company with 23 sites worldwide and knew it would be a good solution for Go Daddy. Making learning come alive Security can be a complex topic, particularly in the technology industry. And as Kimberly points out, also a rather dry subject that has a tendency to cause some folks in the back of the classroom to doze off. Inspired elearning, on the other hand, uses plain English to convey complicated messages so even new Go Daddy employees with no database or technical experience grasp its meaning. Their courses are also designed to meet individual learning styles and allow users to choose either a narrated learning module or the same course in a reading format. Graphics, animation and entertaining humor are all incorporated into the slides to keep the learner s attention. Go Daddy currently uses two Inspired elearning products. The first is a program they refer to as Security 101. This off-the-shelf solution takes only one hour to complete and has been tweaked over the last few years to include life-like simulations that directly relate to Go Daddy s business wherever possible. Specifically, the program teaches employees how to create strong passwords, protect user identities, and avoid viruses, worms and phishers. Most recently, recognizing and dealing with devious attempts at social engineering have been added to the curriculum. The second is a customized electronic adaptation of Go Daddy s data retention policies and procedures, a long document employees had difficulty plowing through. Moreover, Go Daddy could never measure how much information their employees actually understood and retained. Inspired elearning created vibrant screens and interactive module assessments to keep employees engaged while guiding them through the different classes of information and how each should be stored and/or destroyed. 2

3 How it really works Rich Van Meter, a customer care and personnel manager of 200 employees, adds, Inspired elearning tailored the programs to be more applicable to Go Daddy s environment. The courses explain why it s important to be a human firewall and why customer data must be handled in certain ways. Generic training programs run the risk of leaving an employee scratching his head wondering how it applies to them. Also, because the course can be done during work hours when there s a free moment, customers are not inconvenienced by having an employee taken away from their regular responsibilities. After signing into a learning module, the overall course objectives and subject(s) covered are clearly stated so each participant knows exactly what is expected of them. Photographs and graphs slide onto the screen and the show begins, delivering key information and knowledge in a highly engaging format. If the learner needs to interrupt the session, the program bookmarks the location and they can return to the same spot or review earlier pages when they return. At the end of each lesson, drag-and-drop or point-and-click questions ensure the user was indeed absorbing the necessary information. Users are told immediately if they answer the questions correctly and are not allowed to proceed to the next lesson until they have. The questions are not overly difficult, but Go Daddy employees are not permitted to handle any data until they have successfully passed the final test. Extra bennies Inspired elearning s programs provide a number of handy management tools as well. In addition to generating reports, it tracks employees who have not taken any required courses and sends them automatic reminder s reducing the administrative burden typically borne by HR. After successful completion of a course, each participant is also sent a personal certificate. 3

4 Inspired elearning is immensely useful in getting company messages to employees even those who work remotely or from a satellite office - in a timely fashion. We are responsible for educating our employees, but also for protecting our 4.4 million customers and the company s integrity, and Inspired elearning plays a key role in this mission, notes Kimberly. They also send a monthly e-newsletter that includes relevant news events and lessons learned to help maintain awareness at all times. Each year, Go Daddy s security committee also identifies new risks and other materials that should be included in an Inspired elearning refresher course. With these goals defined and information obtained from interviews with subject matter experts and feedback from informal surveys, Inspired elearning then creates a storyboard. Once agreed upon, Inspired elearning inserts the fun stuff and s the new training program to Go Daddy for review. We usually have about a dozen enthusiastic employees who volunteer to test market the new programs. There have been very few problems, and Inspired elearning has always been quick to work through them, Kimberly adds. She says that because Inspired elearning so effectively covers security and data retention, Go Daddy has been able to better utilize onsite classroom time to develop leadership programs and specialized training for their highly skilled software developers. The high level of employee training helps in recruiting top talent and in meeting Go Daddy s well publicized security policies too. Beyond the virtual classroom Many industries are now subject to mandatory security-related regulation. HIPAA laws, for example, protect patient privacy in the healthcare industry. Sarbanes Oxley (SOX) holds upper management of public companies responsible for their financial statements. All of this is dependent on the company s data being properly protected so there is a high comfort level that it is accurate, adds Martin Rico, founder and CEO of Inspired elearning. Inspired elearning helps companies meet their security objectives. 4

5 For Go Daddy, Inspired elearning solutions also satisfy their Payment Card Industry (PCI) employee audit requirements for web-certification. This worldwide data security standard was established by the major credit card companies as a guideline to help organizations that process payments prevent credit card fraud, hacking and various other security issues. GoDaddy deals with a lot of personal information and is needs to make sure the data is well protected. Hackers are out there all the time trying to obtain passwords, plant all sorts of nasty software, and make it look like it was done by someone else, concludes Neil. We have to be on the cutting edge to adequately fight these attempts. User response to Inspired elearning programs has been very positive, and we continue to evaluate other subjects that might be suitable for this venue. Go Daddy prides itself as being an inexpensive, easy-to-use one-stop shop for businesses and individuals wanting to establish, maintain and evolve an online presence. But affordability doesn t mean it goes cheap on quality. Go Daddy is an industry leader in the fight against spam, phishing, fraud and other abuses that threaten the online experience. Inspired elearning contributes to Go Daddy s success, which currently equates to about 40 percent of the domain market share - and still counting. Sidebar: About Go Daddy Founded by Bob Parsons in 1997, The Go Daddy Group has grown to include more than 23.5 million domains under management. Go Daddy offers a complete product line, including comprehensive hosting solutions, Web site creation tools, Secure SSL certificates, personalized with spam and anti-phishing filtering, e-commerce tools and more. The company is widely recognized for its success and has having been ranked #8 on the 2004 Inc. 500 list of the nation's fastest-growing privately held companies, and #20 on the 5

6 2005 Deloitte Technology Fast 500 (growing 8,274 percent!). Go Daddy also won the CNET Editor's Choice award in 2001; the Name Intelligence Largest Net Gain Award in 2002, 2003 and 2005; the Name Intelligence Users' Choice Award in 2005; the #1 Best Overall Registrar in 2003; and the Arizona Corporate Excellence Award for fastest growing privately-held company in 2003 and Most Innovative Large Company in Sidebar: About Inspired elearning Founded in 2003 by Martin Rico, Inspired elearning offers both affordable off-the-shelf and custom created web-based training solutions. Their high quality interactive off-theshelf compliance training programs are used by some of the largest and most respected companies in the world. These selections include Code of Conduct and Ethics Training, HIPAA Training, Physical Security and Workplace Violence Training, and Security Awareness Training. Inspired elearning also works with corporate, government and nonprofit organizations to develop cost-effective custom course content and education strategies that will build a well informed and trained workforce that is more attuned to business policies and procedures and therefore better able to meet critical business objectives. 6

SecurityMetrics. history products expertise team awards

SecurityMetrics. history products expertise team awards SecurityMetrics history products expertise team awards Our company [history] Who we are and where we came from Proud moments in SecurityMetrics History 2000 - Founded by Brad Caldwell 2001 - First bank

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Understanding PCI Compliance

Understanding PCI Compliance Understanding PCI Compliance www.cognoscape.com Understanding PCI Compliance What is PCI Compliance? What exactly is PCI compliance? PCI stands for Payment Card Industry, and the compliance component ensures

More information

INFORMATION SECURITY: NURTURING A SECURITY CONSCIOUS WORKFORCE

INFORMATION SECURITY: NURTURING A SECURITY CONSCIOUS WORKFORCE INFORMATION SECURITY: NURTURING A SECURITY CONSCIOUS WORKFORCE A Knowledge Platform White Paper April 2005 By Kanags Surendran Director- Products and Solutions Knowledge Platform Knowledge Platform 19

More information

Character-Based Simulations: What Works TM

Character-Based Simulations: What Works TM Character-Based Simulations: What Works TM The Use of Character-Based Simulations in E-Learning Jennifer De Vries Bersin & Associates March 2004 Bersin & Associates Table of Contents Table of Contents...

More information

Training and Awareness

Training and Awareness Training and Awareness Services Overview JANUS Associates, Inc. 1055 Washington Boulevard Stamford, CT 06901 203-251-0200 matthewl@janusassociates.com Providing your employees with information technology

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

STUDENT SATISFACTION. Computer Networks and Distributed Systems

STUDENT SATISFACTION. Computer Networks and Distributed Systems STUDENT SATISFACTION Below are sample student comments from the module feedback questionnaires, in response to the question: Please describe what you liked most about the module and why. The complete set

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS I want you to take home four points Understand Educate Collaborate Prepare It s a great

More information

Logging the Pillar of Compliance

Logging the Pillar of Compliance WHITEPAPER Logging the Pillar of Compliance Copyright 2000-2011 BalaBit IT Security All rights reserved. www.balabit.com 1 Table of Content Introduction 3 Open-eyed management 4 ISO 27001 5 PCI DSS 5 Sarbanes

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

The Change Management Community of Practice:

The Change Management Community of Practice: By Bill Wilder, Director, Life Cycle Institute Life Cycle Engineering 2013 www.lce.com Success at last! The new employee self-service module has finally been implemented - on the third try. The promised

More information

How To Improve Information Security

How To Improve Information Security Information risk management Information security survey Six important signals Advisory Information security survey Introduction For many years now, information security has been an important topic for

More information

Guided HIPAA Compliance

Guided HIPAA Compliance Guided HIPAA Compliance HIPAA Solutions for Office Managers and Practitioners SecurityMetrics We protect business Since its founding in 2000, privately-held SecurityMetrics has grown from a small security

More information

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services... Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com

More information

Executive Management of Information Security

Executive Management of Information Security WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without

More information

Building an Effective elearning Experience with Drupal. Ray Saltini of Blink Reaction

Building an Effective elearning Experience with Drupal. Ray Saltini of Blink Reaction Building an Effective elearning Experience with Drupal Ray Saltini of Blink Reaction Building an Effective elearning Experience with Drupal Table of Contents Introduction.... 3 Project Management Best

More information

Are You A Sitting Duck?

Are You A Sitting Duck? The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers

More information

Ecommerce Guide to PCI DSS 3.0

Ecommerce Guide to PCI DSS 3.0 Ecommerce Guide to PCI DSS 3.0 The technology, the risk, and the potential change in compliance validation Traditionally, many merchants have been told that ecommerce technology will reduce risk and streamline

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

8 Tips for creating a savvy Social Media Policy

8 Tips for creating a savvy Social Media Policy 8 Tips for creating a savvy Social Media Policy Introduction In today s modern world, the number of people using social media continues to rise on a daily basis. Whether or not you re using social channels

More information

SIZE DOESN T MATTER IN CYBERSECURITY

SIZE DOESN T MATTER IN CYBERSECURITY SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE TABLE OF CONTENTS SIZE DOESN T MATTER IN CYBERSPACE 03 SUMMARY 05 TOP REASONS WHY SMBS

More information

The PCI Dilemma. COPYRIGHT 2009. TecForte

The PCI Dilemma. COPYRIGHT 2009. TecForte The PCI Dilemma Today, all service providers and retailers that process, store or transmit cardholder data have a legislated responsibility to protect that data. As such, they must comply with a diverse

More information

www.webanywhere.co.uk steps to a better school website A Webanywhere Free Guide

www.webanywhere.co.uk steps to a better school website A Webanywhere Free Guide 5 steps to a better school website A Webanywhere Free Guide In the last five years, there has been a big change in the way schools are run. Now, more than ever, schools are essentially businesses, with

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide 1 P a g e Contents Module Objectives... 3 Training Materials / Resources... 3 2 P a g e Module Outcomes After completing these

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

How To Manage Log Management

How To Manage Log Management : Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll

More information

Business Opportunity Enablement through Information Security Compliance

Business Opportunity Enablement through Information Security Compliance Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement

More information

EFFECTIVE WAYS TO LINK REALITY TO TEACHING IN FINANCE IN THE CLASSROOM

EFFECTIVE WAYS TO LINK REALITY TO TEACHING IN FINANCE IN THE CLASSROOM EFFECTIVE WAYS TO LINK REALITY TO TEACHING IN FINANCE IN THE CLASSROOM Zhang Weina Department of Finance, NUS Business School Introduction Many students in NUS Business School take finance courses to prepare

More information

Avid Training Services: What you want, when you want it.

Avid Training Services: What you want, when you want it. Avid Training Services: What you want, when you want it. The quality of the classes was impressive. The instructors were knowledgeable, the time was well spent and there was just the right mix of explanations

More information

New! For Association Executives Certificate in Programming Online

New! For Association Executives Certificate in Programming Online New! For Association Executives Certificate in Programming Online Online programming is growing and will become 50% of association professional development. But Gen Y and future generations of association

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

Seven Things Employees Want Most From Their Training

Seven Things Employees Want Most From Their Training RESEARCH REPORT Seven Things Employees Want Most From Their Training Executive Summary In 2013 we set out to discover what 1,001 office workers really think about training. Commissioning Opinion Matters,

More information

Benefits and risks of cloud computing

Benefits and risks of cloud computing Benefits and risks of cloud computing Stephen Turner Known-Quantity.com and Holy Family University ABSTRACT Cloud computing vendors maintain data away from the facilities of their customers. This is compelling

More information

WCA WEBINAR SERIES: The Case for Cyber Security Training

WCA WEBINAR SERIES: The Case for Cyber Security Training WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference

More information

Energy Recruitment Technology Increase Your Hiring Performance with the Ultimate Checklist

Energy Recruitment Technology Increase Your Hiring Performance with the Ultimate Checklist Energy Recruitment Technology Increase Your Hiring Performance with the Ultimate Checklist Energy recruiters and Human Resources professionals require unique strategies to meet their hiring needs. As demands

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Managed Security Monitoring: Network Security for the 21st Century

Managed Security Monitoring: Network Security for the 21st Century Managed Security Monitoring: Network Security for the 21st Century Introduction The importance of Security The Internet is critical to business. Companies have no choice but to connect their internal networks

More information

Finally, An Easy Way To Never Have To Deal with Computer Problems Again!

Finally, An Easy Way To Never Have To Deal with Computer Problems Again! Finally, An Easy Way To Never Have To Deal with Computer Problems Again! Finally, An Easy Way To Keep Your Computers Running Faster, Cleaner, And Problem Free Without The Expense Of A Full-Time IT Staff

More information

Your BYOD Strategy Checklist

Your BYOD Strategy Checklist Your BYOD Strategy Checklist A 5-STEP GUIDE TO CREATE A BRING YOUR OWN DEVICE STRATEGY FOR YOUR ORGANIZATION SALES@SHOWPAD.COM @SHOWPAD WWW.SHOWPAD.COM Pieterjan Bouten is an IT entrepreneur and Co-Founder/CEO

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

Small Business Technology Challenge

Small Business Technology Challenge Small Business Technology Challenge The National Small Business Association s recent Small Business Technology Survey found that 98 percent of small business owners agree that it s important to keep up

More information

State of the Web 2015: Vulnerability Report. March 2015. 2015 Menlo Security Alright Reserved

State of the Web 2015: Vulnerability Report. March 2015. 2015 Menlo Security Alright Reserved State of the Web 2015: Vulnerability Report March 2015 Motivation In February 2015, security researchers http://www.isightpartners.com/2015/02/codoso/ reported that Forbes.com had been hacked. The duration

More information

WHO WE ARE CORE VALUES OUR VISION OUR MISSION

WHO WE ARE CORE VALUES OUR VISION OUR MISSION CORPORATE PROFILE WHO WE ARE Matrix Media was founded by a team of enthusiastic and talented entrepreneurs, developers and designers with years of collaborative experience. Together, we strive to provide

More information

TABLE OF CONTENTS. How Students Choose an Animation School. What Advice Would You Give to New Animators?...

TABLE OF CONTENTS. How Students Choose an Animation School. What Advice Would You Give to New Animators?... INDUSTRY SURVEY What future animators say about what they are looking for in a school, and what professional animators say are the most important things to look for. Quotes throughout are from professional

More information

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss Commissioned Study SURVEY: Web Threats Expose Businesses to Data Loss Introduction Web-borne attacks are on the rise as cybercriminals and others who do harm to computer systems for profit or malice prey

More information

Learning Management Systems: What you need to know before choosing a Learning Management System.

Learning Management Systems: What you need to know before choosing a Learning Management System. Learning Management Systems: What you need to know before choosing a Learning Management System. By Don Weobong, MBA, ICSA Telania eleap www.eleapsoftware.com Phone: (502) 291 4650 Fax: (502) 585 2345

More information

Building a Business Case: The ROI of Using an Online Compliance Training Program. Courtesy of:

Building a Business Case: The ROI of Using an Online Compliance Training Program. Courtesy of: Building a Business Case: The ROI of Using an Online Compliance Training Program Courtesy of: Page 2 The Importance and Necessity of Compliance Training The financial services industry has become over

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com Whitepaper Best Practices for Securing Your Backup Data BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com DATA PROTECTION CHALLENGE Encryption, the process of scrambling information

More information

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS Hill Country Protect Your Practice with a Security Risk Assessment Hill Country Protect Your Practice with a Security Risk Assessment Cyber Security in Healthcare is a Growing Problem With more healthcare

More information

Concealing the Medicine: Information Security Education through Game Play Thomas Monk, Johan van Niekerk and Rossouw von Solms

Concealing the Medicine: Information Security Education through Game Play Thomas Monk, Johan van Niekerk and Rossouw von Solms Concealing the Medicine: Information Security Education through Game Play Thomas Monk, Johan van Niekerk and Rossouw von Solms Institute for ICT Advancement, Nelson Mandela Metropolitan University s20520515@nmmu.ac.za,

More information

The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS

The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS Copyright 2014 Published by Art & Logic All rights reserved. Except as permitted under U.S. Copyright Act of 1976, no part of this publication may

More information

Managed Security Services

Managed Security Services Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s

More information

Welcome to the HFMA Online Academy

Welcome to the HFMA Online Academy Welcome to the HFMA Online Academy Making the best use of NHS resources for patients on a limited budget is challenging. So ensuring NHS money is managed effectively is more important than ever. Here at

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES

More information

PARCOM WEB SITE BUILDER

PARCOM WEB SITE BUILDER Choosing a Site Creation Tool to Develop a Web Presence PARCOM WEB SITE BUILDER Parcom Internet Services, Inc. Copyright 2004 Parcom Internet Services, Inc. All rights reserved worldwide. Revision 2 Introduction

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Leadership and Team Development for Organizational Success

Leadership and Team Development for Organizational Success HealthcareSource EXCLUSIVE DATASHEET Leadership and Team Development for Organizational Success Customized Learning for Advanced Leadership Development As healthcare organizations pursue strategic priorities

More information

Newsletters & Email Blasts USER GUIDE

Newsletters & Email Blasts USER GUIDE Newsletters & Email Blasts USER GUIDE Table of Contents INTRODUCTION... 3 INPUTS, TOOLS & TECHNIQUES, OUTPUTS (ITTO)... 5 NEWSLETTERS... 6 STATISTICS... 11 QUEUE... 13 TEMPLATES... 14 2 Introduction The

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

WHICH PLATFORM For My Website

WHICH PLATFORM For My Website WHICH PLATFORM For My Website CONTENTS INTRODUCTION 1. 3. 4. 5 9. 10. 11. 13. 14. Introduction Your domain name Why choose a CMS platform? Choose the right Content Management System Add features Do you

More information

How to write effective e-newsletters that get read

How to write effective e-newsletters that get read How to write effective e-newsletters that get read by Redina Kolaneci McConkey Johnston international UK Everybody is doing e-newsletters these days. You are probably receiving them from companies you

More information

Conquering PCI DSS Compliance

Conquering PCI DSS Compliance Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,

More information

Credit card acceptance and software security: Vetting your provider. Jude Augusta and Dan Rowe

Credit card acceptance and software security: Vetting your provider. Jude Augusta and Dan Rowe Credit card acceptance and software security: Vetting your provider Jude Augusta and Dan Rowe The threat to small business is real Nat l Cyber Crime Alliance Of small businesses are victims of cybercrime

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

7 Biggest Mistakes in Web Design 1

7 Biggest Mistakes in Web Design 1 7 Biggest Mistakes in Web Design 1 7 Biggest Mistakes in Web Design 2 Written by Senka Pupacic This is not a free e-book! Printing out more than one copy - or distributing it electronically is prohibited

More information

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Improve Phishing Knowledge and Reduce Susceptibility to Attack Do you already have some form of

More information

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES 2 On June 3, 2009, Plante & Moran attended the Midwest Technology Leaders (MTL) Conference, an event that brings together

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

10 ways to ensure successful implementation and user adoption of a new CRM How one firm did it and saw tangible ROI immediately

10 ways to ensure successful implementation and user adoption of a new CRM How one firm did it and saw tangible ROI immediately 10 ways to ensure successful implementation and user adoption of a new CRM How one firm did it and saw tangible ROI immediately A case study on Ferguson Wellman and UNAPEN s client relationship management

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

on Data and Identity Theft*

on Data and Identity Theft* on Data and Identity Theft* What you need to know about emerging topics essential to your business. Brought to you by PricewaterhouseCoopers. October 2008 A collaborative business world s Achilles heel

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Bridging the Gap between Mobile Product Development and Customer Experience: Seven Imperatives for IT Organizations

Bridging the Gap between Mobile Product Development and Customer Experience: Seven Imperatives for IT Organizations Bridging the Gap between Mobile Product Development and Customer Experience: Seven Imperatives for IT Organizations Published: 10 November 2014 Author: Bob Egan, Chief Analyst Organizations must bridge

More information

Top HR Interview Question and Answers

Top HR Interview Question and Answers 1. Tell us something about yourself. Top HR Interview Question and Answers This is the first question, you can expect during any interview you face. This usually is a question to start the communication

More information

HOW TO USE VIDEO TO MOTIVATE LEARNING

HOW TO USE VIDEO TO MOTIVATE LEARNING HOW TO USE VIDEO TO MOTIVATE LEARNING Catherine de Salvo Director, Scott Bradbury Ltd. trainingzone How do you use video to motivate learning? If you are considering using video as part of your online

More information

SPAM-What To Do SUMMERSET COMPUTER CLUB

SPAM-What To Do SUMMERSET COMPUTER CLUB Slide 1 SPAM-What To Do SUMMERSET COMPUTER CLUB Jeff Hensel JANUARY 22, 2015 Slide 2 According to Wikipedia Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic

More information

How to Justify Your Security Assessment Budget

How to Justify Your Security Assessment Budget 2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice

More information

Roger s Cyber Security and Compliance Mini-Guide

Roger s Cyber Security and Compliance Mini-Guide Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements and utilizing the PAI Secure Program. Letter From the CEO Welcome to PAI Secure. As you

More information

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

CONSIDERATIONS BEFORE MOVING TO THE CLOUD CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits

More information

The Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core

The Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core The Risk-Cost Retention Model: A New Approach to Records Retention Bringing all stakeholders to the table to discuss the risk and cost involved in retention decisions allows a company to create the best

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

Global Manufacturing Company Reduces Malware Infections by 46%

Global Manufacturing Company Reduces Malware Infections by 46% Global Manufacturing Company Reduces Malware Infections by 46% Wombat s Security Education Platform is changing behaviors, reducing infections, and lowering remediation costs The Challenge A large international

More information

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson Solutions Brief PC Encryption Regulatory Compliance Meeting Statutes for Personal Information Privacy Gerald Hopkins Cam Roberson March, 2013 Personal Information at Risk Legislating the threat Since the

More information

12 Security Camera System Best Practices - Cyber Safe

12 Security Camera System Best Practices - Cyber Safe 12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction

More information

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it) 5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda Importance of Secure End User Behavior 5 Reasons Your Program isn t Working 10 Learning

More information

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure IBM Global Small and Medium Business Keep Your IT Infrastructure and Assets Secure Contents 2 Executive overview 4 Monitor IT infrastructure to prevent malicious threats 5 Protect IT assets and information

More information

AUDIT TAX SYSTEMS ADVISORY

AUDIT TAX SYSTEMS ADVISORY AUDIT TAX SYSTEMS ADVISORY Presented by: Jim Rumph Introduction JIM RUMPH, CISA Systems Manager Jim is a graduate of the University of Georgia with a Bachelor of Business Administration in Accounting and

More information

Common email security headaches. Common email security headaches and how to avoid them. PineApp.com

Common email security headaches. Common email security headaches and how to avoid them. PineApp.com Common email security headaches and how to avoid them PineApp.com i Contents The problem 3 The solution 4 Common security challenges and solutions 5 Scenario one 5 How it works now How it should work Scenario

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure. Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security

More information

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise WHITE PAPER: BUSINESS CONTINUITY AND BREACH PROTECTION White Paper Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise Business Continuity and Breach

More information

About Your Email Policy Kit

About Your Email Policy Kit Email Policy Kit About Your Email Policy Kit About Your Email Policy Kit... 2 Email Policy 101... 3 Designing an Email Policy: Key Sections... 4 Sample Records Retention Policy for Electronic Mail... 11

More information