article thumbnail

Cut the Line on Phishing Scams

Interactive Services

For example, a phishing email might be from yurgent@yahoo.com instead of the real address, customersevice@yahoo-inc.com. During training, reassure your employees that all reports will be confidential and that alerting the company is always better than attempting to resolve the problem alone. A generic greeting.

article thumbnail

Compliance Training: What’s Required & What’s Recommended

eloomi

Data protection & privacy You might think this only applies to companies who collect and store customer or client data. If you offer retirement benefits, you’re collecting confidential information about each enrolled employee. Healthcare Related to data protection and privacy, healthcare training is vital to any business.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Privacy / Confidentiality - Limit the visibility. Barriers I then asked everyone to call out what they saw as their biggest barriers to getting adoption. No problems getting things here. SaaS, but this shouldn't hold you back. IP - Making sure it's clear about ownership of content is definitely an issue. Not sure what else was implied.

Wiki 105