Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2. As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Beam up to ProProfs Enterprise – Centralized management simplified for the entire organization


Say yes to the Enterprise edition by ProProfs! What is ProProfs Enterprise? But with the ProProfs Enterprise, you can add colleagues or ‘Instructors’ to join this group who can manage their individual content easily within it. ProProfs Enterprise – Bring Individual users to a centrally managed system! Key points: What can you do with ProProfs Enterprise? Easy Billing – With the ProProfs Enterprise, you get one single, consolidated bill too.

Is Enterprise search the answer to L&D’s interruption problem?

From the Coleface

They will gain benefits such as faster time to market, improved customer service and reduced reinvention of the wheel, whilst maintaining business confidentiality and security. So what should L&D be doing to drive this step-change in Enterprise search rather than react to other departments’ agendas? Plug-ins: Enterprise search solutions often allow for defined search terms to be displayed at the top of the search listings.

Search 126

Why every company should consider training the extended enterprise


All these stakeholders come together under the umbrella commonly known as the extended enterprise. What exactly is the extended enterprise? The extended enterprise is for any business organization what the village is for any child that needs to be raised. So it is in the interest of any parent/CEO to be part of a wise and knowledgeable village/extended enterprise. Training the extended enterprise. How can you train your extended enterprise?

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage. I would see no difficulty in sharing ideas with your contact, while maintaining client confidentiality.

Don't panic - security breaches


There are three areas in cybersecurity, commonly called the CIA: Confidentiality, Integrity and Availability. Confidentiality. These include: patient records, human resources records, and financial documents, which until publicly released, are all confidential. After listing all business assets within your company, start organizing assets by confidentially importance and outlining special measures needed to protect them. .

What is an LMS?


Safe and secure – Data safety and confidentiality is a major concern for everyone these days. Since hosted LMS are time-consuming and expensive to manage, many businesses have switched their enterprise applications to the cloud variant. A learning management system (LMS) is a software platform which allows any business to document, administer, track and report training or educational courses.


Moving from an open-source to a commercial LMS – the story of Transactel


TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. At that point Transactel decided to move to eFront’s commercial solution – the eFront Enterprise edition – to meet the new needs of the company and for the commercial edition’s skill management and organization structure.

3 Signs You Need A New LMS


In order to receive honest feedback, communicate to employees that all responses will be confidential. To encourage mobile engagement, 36% of enterprises in the United States now allow employees to BYOD (bring your own device), a number that is expected to increase to about 50% of the market by the end of 2017. Several unmistakable signs indicate it might be time to reevaluate your current learning management system (LMS).

Docebo powered by AWS: keeping you secure while you learn anywhere


With AWS, you can improve your ability to meet core security and compliance requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.

Docebo 130

Top 8 Cloud Security Best Practices

Hurix Digital

Technology today has come a long way with an increased reliance on cloud computing in an enterprise setup. Although there are numerous advantages of adopting the cloud, security remains one of the primary areas of concern for enterprises.

How I Learned to Stop Worrying and Love an Agile Work Environment


Career mobility has become an increasingly critical component of a healthy enterprise talent strategy; it’s cheaper than sourcing external talent, and it drives employee engagement and unforeseen innovation. Most enterprises begin with engagement surveys, and these are great places to start.

Agile 52

10 Key Benefits of Adopting Cloud Computing for Businesses

Hurix Digital

Acting as a catalyst for growth, the cloud approach has completely revolutionized the way enterprises operate their businesses. Acting as a catalyst for growth, the cloud approach has completely revolutionized the way enterprises operate their businesses.

Why Should You Use Cloud Computing For E-Learning?

Origin Learning

Moreover, training may include confidential enterprise data that can be vulnerable to theft. What is cloud computing? Cloud computing is the technology which uses the internet and central remote servers to maintain applications and data. It allows end-users and businesses to use applications without installation and access their personal files via any computer that has an internet access.

Laura Overton: Are today’s L&D leaders sticking to the familiar?

Sponge UK

Each year we provide an opportunity for L&D leaders to confidentially compare their approach to delivering learning and supporting performance with their peers. Everyone taking part gets confidential personal feedback in early September. The programme has been extended to 14 th August and you can take part confidentially and for free.

BYOD: Revisited

Training Industry

In other words, BYOD has the potential to transform the enterprise. Not to mention that companies risk becoming liable for things beyond their control (confidential data getting mixed up with your compromising photos, for instance). It sure seems like everyone continues talking about the Bring Your Own Device (BYOD) practice, these days. And why shouldn’t they?

Partner training 101: How to get started


Partner training is a type of extended enterprise training. While extended enterprise includes both your customers and business partners, partner training refers only to the second group. Take a glimpse into the top benefits of extended enterprise training for business partners: 1.

5 Secrets for Successful HRIS Implementation

CommLab India

Allocation of adequate time and money is vital to the successful implementation of an HRIS (or for that matter, any enterprise software). You need to deal with personal and confidential data, when you implement an HRIS. In recent years, the demand for Human Resource Information Systems (HRISs) has been increasing at a steady pace. A recent report published by Market Analysis shows that the market for HRISs will record a compound annual growth rate (CAGR) of 2.4%

Office 365 Video: Your Corporate YouTube

TechSmith Camtasia

It’s not so great if the videos you’re sharing have confidential information, trade secrets, or information that would give outside hackers an insight into the inner workings of your company. Office 365 Video feels simple in comparison to more mature video offerings like YouTube, yet it’s privacy and security features are likely to be more important for companies trying to keep their video content confidential.

Top 5 Cloud Management Challenges And Tips to Overcome Them

Hurix Digital

While the cloud offers a lot of advantages, establishing an efficient enterprise cloud management strategy requires not only time and resources but also brings in a host of challenges in cloud computing that comes with the process. .

Key Benefits of Managed IT Services for Business


It is not uncommon for enterprises to have a complex set of applications and platforms running in some combination of a local, multi-cloud, or hybrid IT environment. Managed IT services can keep business information confidential.

Alternatives to Second Life

Kapp Notes

The solutions are designed by Forterra to meet enterprise IT security and privacy needs. Qwaq Forums enable an organization to create a virtual operations center in which sensitive and confidential information is developed, discussed, and used to make decisions and solve problems, create a space to manage projects, facilitate meetings, conduct corporate training or establish a virtual office. Here is a list of alternatives to Second Life. Forterra Systems Inc.

Online Training in the Cloud

Aktiv Mind

Centralized Learning: The Cloud Computing Learning Environment can effectively centralize all organizational learning activities across the enterprise, meeting the needs of employees in multiple locations, as well as third parties. Secure: Training may include confidential enterprise data that can be vulnerable to theft. Online Training in the Cloud. Cloud computing refers to a variety of Internet-based computing services.

Only 14% think that company training is an essential way for them to learn in the workplace

Jane Hart

The new confidential study will investigate different staff perspectives on technology-enabled development opportunities to help organisations better align their offerings for individual and business need. That was one of the findings of my recent anonymous survey on how people learn best in the workplace, and even I was surprised by the results.

Securing Internal Video Content 101

KZO Innovations

Your company likely has video content you’d prefer to keep confidential. Larger companies should look for a secure enterprise video platform with more sophisticated security options. KZO’s Video Suite provides a flexible, secure enterprise video platform. Permission can be granted per individual or group to accommodate many business units within the same enterprise that have video needs.

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

These cloud security management best practices are designed to prevent any unauthorized access to confidential data and keep all information safe from cybersecurity threats. Also Read: How Can Enterprises Benefit from a Successful Cloud Migration.



Gravity Global (Switzerland) saves 90% of your Enterprise Learning cost. decentriq (Switzerland) aims to change how the world accesses data: We enable the use of sensitive data from other organisations while provably guaranteeing the confidentiality and security of these data.

Review: Power-user


This can quickly become an issue, particularly when working on an enterprise level. For example, you can “stamp” slides in your deck with various text including, ‘Confidential’, ‘Draft’ etc.

Four Principles for Effective Training Systems

Interactive Services

The modern large enterprise is more complex, highly regulated, and dependent upon third parties than ever before; it’s also more transparent to outside stakeholders than ever before. As ever more employees and third parties work with companies’ confidential data, cybersecurity has exploded from a concern for the IT department to an enterprise-wide risk of the highest priority. By Matt Kelly – a long-time writer and observer of the corporate compliance and GRC scene.

The 5 courses all NHS staff have to do


From answering a phone call about a patient to encrypting files on a USB stick, Information Governance training aims at setting the bar high for all employees so that every NHS Trust can be trusted with the management of confidential data. Fire Safety In an attempt to reduce the 30,000 false alarms they need to attend annually, London Fire Brigade has started charging households and enterprises a £295 fine (€413/$467) per every false alarm after the first 10 in a year.

A comparison between LMS and CMS


As for CMS products, those are divided into Enterprise and Web oriented offerings. An enterprise CMS, on the other hand, is modeled either on a document library or on a storage cabinet metaphor, and forces you to deal with your content in terms of “folders”, “cabinets”, “libraries”, “documents” and so on.

When social is a taxing problem

Learning Rocks

In this respect we''re quite lucky; with our current performance and learning management suite provider we have access to an advanced, mature enterprise social network (ESN) platform that is integrated with current user profiles. One of the projects I''ve been keen to push on with my current employer is extending our elearning provision beyond the isolated horrors of the self-study elearning "course" to more collaborative social opportunities.

Two Global Brand Digital Retail Transformation Case Studies: Lessons & Challenges


Digital retail transformation can mean anything from “click and collect” curbside pickup to full-blown workplace automation and enterprise artificial intelligence. Details have been anonymized for confidentiality reasons.

Informal Learning Hits Brick Walls

Vignettes Learning

This is a reality for many types of enterprise programs that impacts learning, work and performance. What do we do with critical corporate assets like legal, marketing, security and confidentiality concerns? I nformal Learning Hits Brick Walls There is more than one way to implement informal learning. The approach differs depending on the nature of the organization. Organizations have plenty of formal structures - brick walls or command and control environments.

8 LMS Requirements For Corporate Training


So much, in fact, that eLearning in general and corporate online training, also known as “enterprise online training”, in particular, have become a hundred billion dollar market. Based on our extensive experience dealing with business customers though, we believe that this list is a great starting point for the average enterprise or organization looking into online learning solutions.

ILT 41

A Quest for Success

CLO Magazine

To help with the meta-design options for LQA’s development, Stroud brought in Pete Cuozzo, founder and president of Cuozzo Enterprises, a management consulting firm specializing in leadership development, individual and team coaching, and organization development. “In Senior management decided to adopt the one-week in-residence option with 42 participants per session, along with an action learning component focused on strategic, enterprise-wide business opportunities.”.