Remove Confidentiality Remove Privacy Remove Security Related Topics

Worried About Course Security? Start With Your Website.

LearnDash

Protecting your intellectual property is important, but securing your website should come first. Securing your content on the front end, where learners access it, will do you little good if someone can steal it by breaking into the back end of your site. Install a security plugin.

273
273

Disprz Achieves SOC 2 Type II Security & Compliance Certification

Disprz

Solidifying our commitment to data security and protection! One of our key goals at Disprz is to ensure the security and safety of the client information on our platform. An organization that complies with SOC 2 requirements is one that upholds a high data security standard.

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What Organizations Need to Know about Cyber Security

Hurix Digital

Cyber security or IT security is the protection of computer systems and networks from information disclosure, theft or damage of their hardware, software or electronic data, as well as the disruption or misdirection of the services they provide. . Legal requirement for cyber security .

83

Delivering Online Training Securely

Mindflash

Organizations often are training employees and partners on material that is sensitive or confidential. Moving your training online can dramatically reduce your costs and make training more convenient and enjoyable for your trainees, but it can also introduce concerns about security. At Mindflash we take security extremely seriously and have gone to great lengths to protect all our customers’ content and ensure their training materials are only accessed by their trainees.

63

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

A wide range of regulations and privacy laws make organizations directly responsible for protecting data and other regulated information. The transition to the cloud has, therefore, brought to the forefront the issue of cloud platform security.

52

Winning Combo: Security Awareness Training & Anti-Phishing Training?

OpenSesame

All of these statistics could be decreased with proper security awareness and anti-phishing training. . What is security awareness training? Security awareness training (SAT) is an indisputable need for any company with employees and an online presence.

52

10 Security Awareness Training Topics

Ed App

We’ve selected the most vital security awareness training topics that your employees should be aware of. With the increasing risks of cybercrimes today, it’s no longer enough simply to invest in security software. Password Security. Mobile Security. Payment Security.

52

Born Secure: Vulnerability Risk Factors in API Development

Magic EdTech

Are your applications born secure? These questions are important for software developers and organizations who believe that security is something that an application should be born with. They focus on security only when the application is complete and ready to be used by the end-user.

56

Docebo powered by AWS: keeping you secure while you learn anywhere

Docebo

A cloud LMS stores a ton of data though, and not only do we want you to love the product itself, but we want you to feel secure using it. Is the AWS Cloud secure? AWS allows you to automate manual security tasks so you can shift your focus to scaling and innovating your business.

130
130

A Learning Guide to Data Privacy in the Workplace  

Interactive Services

While you may not think about it often, data privacy can play a bigger role in your day to day life than you realize. Data privacy is mainly about getting a say in who or what gets to view your personal information which can include your telephone number, email address, or other personal tidbits. This privacy should extend to who sees the information, who sells the information, and what they can do with it. How secure is the data? Security, Access, and Accountability.

40

How to Keep Your Cloud-Based LMS Software Protected

Your Training Edge

If you’re not keeping your LMS protected, you’re risking your trainees’ data privacy. So, whether you’re training people internally or externally, LMS security is paramount. If your organization is using cloud computing for online training, you don’t have to worry about data privacy. 2FA creates an additional layer of security around your LMS by requiring all users to identify themselves twice – with a password and some kind of information only they would know.

130
130

6 Data Security Tips For Mobile Learning In Corporate Training

PulseLearning

If your organization has already embraced mobile learning or BYOD, allowing employees to access training materials anywhere, anytime on their personal devices, it is likely that data security has become a hot topic. It is especially important to maintain data security vigilance now that the European Union (EU) is set to enforce the General Data Protection Regulation (GDPR), a regulation that aims to protect all EU citizens from privacy and data breaches, in May 2018.

46

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

But is m-Learning secure? Mobile security is a big issue as companies move toward delivering more and more training and just-in-time learning via mobile devices. Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. The other security threat has to do with how you deliver and manage important company documents and information. Choose a secure m-Learning platform.

65

Why Are Finance Training Programs Important for Employees?

Infopro Learning

Enhanced Control over Security and Privacy. Several firms utilize critical resources for their finance training programs that need to be stored confidentially. It offers them more control over their training resources and enables them to maintain their privacy.

347
347

The benefits of Utilizing a Virtual Data Room

Association eLearning

Virtual info rooms experience replaced physical ones, and the main advantages of using a VDR are immediate supply, security, and ease of use. In mergers and acquisitions, for example , buyers often need to access large volumes of prints of extremely confidential papers. And because these documents need to remain confidential, they must always be stored safely. Using a virtual data space is an effective method to store and share documents with anyone, everywhere, at any time.

100
100

BrainCert is Now A SOC 2 Type II Accredited Company

BrainCert

Now BrainCert is a highly secured platform that ensures the security of client data and its operating functions.

78

BrainCert Is Now a SOC 2 Type 1 Compliant Company

BrainCert

Being an eLearning solutions provider catering to a global clientele, BrainCert has always kept data privacy & information security at the heart of everything the company does and makes compliance with security standards and regulations a high priority.  Security 2.

52

STRIVR is Soc 2 Certified

STRIVR

We already follow globally recognized security best practices, which means you can be certain that all your data—user data, behavioral data and more—is safe and secure. For SaaS companies like us, SOC 2’s role in securing your data is crucial. STRIVR is now certified in the following areas: Security. Your information and data are secure and protected. Confidentiality. We assure that all confidential information is kept that way. Privacy.

40

Is Your Corporate Training Ready for GDPR?

PulseLearning

Today, most organizations are operating entirely paperless corporate training and recordkeeping systems with private and confidential information now being processed and stored electronically. This unavoidable result of technological evolution means that data security is a primary concern for businesses and the people they service. GDPR is a regulation that aims to protect all EU citizens from privacy and data breaches. Privacy by Design.

40

The value of Mobile phone Antivirus

Association eLearning

If you are using an Android equipment, it is important to experience a mobile antivirus security software to protect your device. There are lots of applications that can be downloaded onto your machine and could endanger your privacy. Some apps may also remotely remove confidential information if your product is normally lost. In the end, your choice depends upon your behaviors, the data with your device plus the level of secureness you require.

100
100

Top 5 Cloud Management Challenges And Tips to Overcome Them

Hurix Digital

Security and Privacy . Keeping confidential data safe and secure is among the topmost priorities for businesses. Cloud security essentially refers to a set of robust technologies to safeguard data. . Security configurations. We respect your privacy.

52

Paradiso eLearning Successfully Acquires SOC 2 Type 2 Compliance Certification

PSB

Acquiring the SOC 2 Type 2 compliance certification further strengthens Paradiso as an organization certifying its learning solutions to be secure for clients. Overall, auditors audit to see whether proper safeguards and controls are in place for maintaining data security.

52

Cut the Line on Phishing Scams

Interactive Services

In general, companies will not ask you for information like your Social Security number, account number, or password over email or text. There’s no time more critical than now to train your teams on data security, with a special focus on scams like phishing.

52

Fundamentals of An Impactful Healthcare Compliance Training Program

Infopro Learning

Employees may hesitate to approach the management unless anonymity and confidentiality can be ensured, at least to the degree allowed by the law. It should put mechanisms in place which will not only identify but also address security and privacy pitfalls.

221
221

Arlo has opened a new data center in the US for North American training providers

Arlo Training & Events Software

We have again added to our growing list of secure data storage centers around the world with a new center in the US. How is my data stored and is it secure? AWS is the world’s leading provider of cloud storage and models best-practice data protection and privacy.

80

EthosCE Achieves SOC Type 2 Compliance

EthosCE

Security is the most important thing we do at EthosCE, and we are dedicated to ensuring our customers’ data is secure and confidential,” said Ezra Wolfe, CTO of DLC Solutions, LLC. The SOC Type 2 report focuses on a business’s non-financial reporting controls as they relate to security, availability, processing integrity, confidentiality, and privacy of a system. The EthosCE SOC Type 2 report audited the security and confidentiality of the system.

40

What are the HIPAA Training Requirements?

Ed App

You just expect that all the details you tell them and any future test results will be kept confidential, shared only with others on a “need to know” basis. However, there is also the HIPAA Privacy Rule. Requirement #2: The Privacy Rule. Requirement #3: The Security Rule.

52

How to Implement an LMS in a healthcare organization?

PSB

Does the LMS provide Security and Privacy? Empower Healthcare professionals with LMS. The Healthcare industry is rapidly changing and needs to be updated and upgraded to keep up with patient demands.

52

How Docebo LMS is Compliant With GDPR

Docebo

While there’s a ton of info available about GDPR itself, it’s important as an LMS user to know how your learning activities could be impacted by this unprecedented data privacy regulation. The legislation introduces robust requirements that elevate and harmonize standards for data protection, security, and compliance across the EU. Ongoing confidentiality, integrity, availability, and resilience of processing systems and services. EU-US and Swiss-US Privacy Shield.

100
100

Why Does Your Interpretation Service Matter?

InWhatLanguage

There Is No Guarantee of Confidentiality. HIPAA laws don’t require Google to sign an NDA or a BAA to secure information. Confidentiality is crucial in the business world; breaching this privacy puts both organizations and clients in danger.

52

The 7 GDPR Principles

Ed App

The General Data Protection Regulation (GDPR) is Europe’s data privacy and security law that has requirements that organizations must follow to operate in the European Union. Limiting the ways that you can have your data compromised can be aided by cyber security training.

52

Cool Second Life Happening:UW VIBE Future InfoExpo Recruitment

Kapp Notes

All survey answers are confidential and will be made anonymous and significant efforts will be made to ensure the security and privacy of your answers. Have you ever had trouble sorting your stuff? Would you like to know who in SL might be a good social connection for you? Need to solve a problem, but don’t know how to organize the information?

130
130

How to Get Started with Content Conversion Services

Hurix Digital

Ensure that the service provider offers ample, secure, and confidential cloud storage of digital documents. Privacy and security of digital documents are major concerns for businesses. Today, digital transformation is on the agenda for businesses in every sector. .

52

12 Free Cybersecurity Courses

Ed App

Cybersecurity, Heimdal Security. You’ll learn how to set up a security system and acquire a basic cybersecurity vocabulary. You’ll also learn to identify and eliminate the security holes in your system that make you vulnerable to cyber threats, and discover how cyberattacks work.

83

Allego Powers Virtual Selling with New Digital Sales Rooms

Allego

Allego Digital Sales Rooms offer sales professionals and prospective buyers a secure and collaborative approach to buying and selling. It streamlines communication and secures the important information and assets, which brings us one step closer to a painless buyer’s journey.

79

What You Need to Know: GDPR & xAPI

Watershed

Find out more as we explain everything you need to know about this important set of privacy regulations. The General Data Protection Regulation (GDPR) is a set of regulations designed to accomplish two primary objectives: ensure the privacy and security of European Union (EU) residents and their personal data (any information relating to an identified or identifiable natural person), and. A special focus on security of processing. What about xAPI and data privacy?

48

Host Your Corporate Training Videos on Your LMS – Why & How

CommLab India

They contain confidential information. Ensure the privacy and confidentiality of organizational information. Consider these factors while hosting training videos on an LMS : file size of the videos & compatibility, hosting charges, streaming server, and confidentiality of information. These video hosting providers have their own security and privacy features, so your training videos are hosted in a secure place.

68

Beam up to ProProfs Enterprise – Centralized management simplified for the entire organization

ProProfs

As an author, you can create, edit, change internal settings to ensure security, delete quizzes or any other programs. Data Privacy & Confidentiality: We know that your data can contain highly sensitive and confidential details about your organization. We value the trust you place in us to keep this data private and confidential. With the ProProfs Enterprise, you get the control and security you are looking for.

50

Office 365 Video: Your Corporate YouTube

TechSmith Camtasia

It’s not so great if the videos you’re sharing have confidential information, trade secrets, or information that would give outside hackers an insight into the inner workings of your company. I’ve been a long time fan of Camtasia and doing screencasts, but at work, we lacked a secure way to share these videos. Office 365 Video addresses the gap left by YouTube’s wide open security.

48

How does your company Internet policy stack up?

OpenSesame

While the Internet can be a great tool for getting work done, it can also be a distraction to employees and a danger to security. Security. Poor use of the Internet and failure to follow IT policies can expose your company to significant security risks. Privacy.

52