Surprise! Knowledge Guru Summer Release Adds SCORM, Security Features

Knowledge Guru

That means players can access it on a company intranet or behind a firewall, if you’d like. Your Games Just Got More Secure. You can now choose between a Low, Medium and High security setting: Low Security: Players may register on the website without restriction.

Cloud Computing Goes Mainstream Implications for the IT Security Workforce

Training Industry

Addressing this IT cloud security challenge is a two-fold challenge. Changing Roles of IT Professionals First, while cloud computing and SaaS business models can enable IT organizations to lower infrastructure costs and enable more agility to support customers, they are fundamentally changing the roles of many IT and IT security professionals. Not so long ago, IT security staff worked to protect the organization’s IT perimeter.

Trending Sources

Mobile Learning: 3 Security Threats & 7 Ways to Beat Them

CommLab India

However, security and privacy issues in mobile learning may play spoil sport. Malware/viruses, system and data security, users’ privacy, Copyright and Intellectual Property Right (IPR) issues pose challenges in the path of mobile learning. Seven Ways to Beat Security Threats.

Fastest Growing Jobs in America: Information Security Analyst

OpenSesame

With recent security disasters such as the Heartbleed Bug and the Target Security Breach , the need for strong information security has never been more pressing. These cyber heroes are known as information security analysts. Becoming an Information Security Analyst.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

L&D: Learning and Dystopia

Association eLearning

I tried to talk IT into letting you project in but the firewall is the firewall, no exceptions for non-personnel.”. “It’s But if the vaguely-worded debriefing they’d secure-sent me was any indication I wasn’t sure if I wanted see.

Mitigating the Risks of BYOD in corporate learning

G-Cube

However, this trend comes with its own set of challenges and Security is the top concern that most organizations have with the policy of BYOD. Passwords, Firewalls and Encryption: The platform of corporate learning is the enterprise Learning Management System for most organizations.

Virtual Classroom Adoption – The Four Stages of Change

InSync Training

Organizations spend more time worrying about firewalls, security, hardware, and software (important topics all) than they think about adoption and usability. Adopting, and excelling at, the virtual classroom is much more about attitudinal change than it is about implementing technology. Ultimately, people need to BELIEVE that the virtual classroom will work.

70:20:10 and user generated learning: no way!

Challenge to Learn

You can’t use user generated learning for compliance training or security training. With compliance training and security training you have to be able to prove that your employees know the rules. That is not secure! On top of that we added our own security.

Your Team for the Win?

Litmos

We all like to believe that our firewalls are secure, our devices are encrypted, our staff is smart on social media, and are aware of the dangers of phishing emails , but even in a perfect world, something will slip through the cracks. Compliance Healthcare Security

Implementing a Virtual World

Kapp Notes

Private, secure, hosted environments This allowed for a quick implementation and overcame several potential IT department obstacles or road blocks. One concern with virtual worlds or any Internet application is security. Working through corporate firewalls.

7 Challenges to Social Learning

Origin Learning

Security issues. Issues like firewalls and security may be major concerns when you launch an enterprise-wide social learning project. Social Learning is a self-propagating concept, that is- once a social learning culture is achieved in an organization.

Lectora Online V2.0 is Coming

Trivantis

1) Escape the Firewall – You need to be able to work across states, countries and even continents. Working in the cloud lets you access project information securely outside your company’s firewall.

When Does a Cloud-based LMS Make Sense?

Living in Learning

There was something about having my own staff running my own servers behind my own firewall that provided a sense of security and control. To an extent it did, and the IT staff would be the first to man the ramparts to fight off having anything living outside the firewall – much less allowing anyone outside to get into our systems. I feel their concern, and I respect the need to protect the network and data resources behind the firewall.

How to Use Microblogging in Workplace Learning

Upside Learning

As a personal learning tool, Twitter is great but it’s a public platform and what you share on it is available to everyone, some organizations may need tools which can be installed behind their firewalls (Laconica, Yonkly) or that is available as a secure private service (Yammer).

4 Key Emerging Trends in LMS

Upside Learning

Gone are the days when having your own staff running your own servers behind your own firewall provided a sense of security and control. More than 2 years back, I had carried out a SWOT analysis of the LMS to get some understanding on the LMS scenario.

Still More Alternatives to Second Life: More 3D Worlds to Explore

Kapp Notes

The system is secure, data is encrypted and the spaces are private. deploys worlds in the cloud as software as a service and firewalled worlds using our "harmony" deployment system based on Windows Hyper-V with a focus on customer support and custom development.

My first visit to China:The keyword is control

Challenge to Learn

I knew that I would not have access to Facebook, Twitter and Google because they are blocked by the Great Chinese Firewall, but it goes much further than that. This week I was in Beijing for the launch of the Chinese edition of Easygenerator.

Latest #LMS Takeaways Plus Did you know?

eLearning 24-7

That security has become a hot inquiry in the corporate side of the house, and HE for that matter. Security on the business side is now a top “we need to know” item for an LMS. Let’s break down the reality in terms of security and save your IT/IS person and you time to post all those questions: Most LMS vendors host their LMS on hosting sites Amazon S3, Rackspace, Akamai, AWS – all of which are extremely secure, especially Amazon S3.

Online Training: Best Practices for Attending a Live, Online Course

I Came, I Saw, I Learned

Is there anything worse than logging into your online training two minutes before it starts only to find out that your corporate firewall won't let you in at all? It can become a security risk if you leave your email or personal information visible. by AJ Walther. Online classes are here to stay. They're easy, they're environmentally friendly, they're economical, and they're extremely effective.

When Does Your Training Need To Go On A Private Cloud?

eFront

Plus, you get to decide the exact security options , firewall configuration, etc., Few things illustrate the fast pace of change in the IT industry better than the enterprise data center.

Why eLearning in the finance industry is very important

eFront

With internet based eLearning you can deploy your courses in a tightly controlled manner, providing fine-grained access only to the right employees and securing the whole thing behind your company’s firewall or VPN. Banking.

Phish on!

Litmos

Healthcare has worked to create processes for disallowing access by third party contractors, encrypted their devices and strengthened their firewalls, but the hackers are finding the weak link – email. Healthcare Security

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release. As a consequence, I’ve been doing some interviews, some live, some via email.

5 Top IT-enabled business trends that are affecting Corporate Learning

G-Cube

There are some skeptics who question the security of data residing in the Cloud LMS, but modern systems have multi-layered firewalls and advanced network design which ensure that only authorized entries into the Cloud LMS are allowed.

LMS Do and Don’ts – Isn’t it time to do what’s right?

eLearning 24-7

The security info and technical data they will provide comes directly from those individual sites. For the majority of technical questions/requirements I see on RFPs are those whose experience are with systems behind the company’s firewall, or ERP platforms or HRIS systems and so forth. If you have a firewall blocking social media, mention that. Security inquiries. And you can find all the security information you need there.

RFP 73

Employees Avoiding Corporate Barriers

Nick Leffler

If an organization must secure themselves by putting up barriers, before erecting those barriers, other equally effective ways for employees to get their work done should be in place. Even a barrier as small as needing to sign into a firewall is big enough to make an employee avoid security measures. Long before any barriers or security measure can be put into effect, money needs to be invested at providing another solution that’s just as good or better.

Twitter Founder Launches New App - Its a Jelly, eh?

Corporate eLearning Strategies and Development

In order for this to work in the enterprise it would need to be hosted behind a firewall for security to approve it. I have a hard time NOT thinking of this movie whenever I see doughnuts. And I have been known to bribe my kids with them.

LMS Innovation: Where’s the Value?

Talented Learning

Each customer has its own secure location, completely separate from others, in terms of database, awareness and security, but they all share the same central code.

Using Games and Gamification for Employee Screening

Kapp Notes

One example is to gamifiy the process of selection of people to work in the cyber security industry. The applicants compete for a limited number of spots and need to demonstrate knowledge of network software, creative approaches to firewall breaches and time to breach.

The Smart Worker : shares what s/he learns

Jane Hart

We need to ensure the privacy and security of our organisation’s content. But if you want to keep the materials as close to the workflow as possible, then other tools are available for in-house, behind-the-firewall, enterprise use. Tweet.

Shrinking LMS Implementation Fees Drive Market Expansion

Talented Learning

Firewalls, server sizing, bandwidth, database preference, historical data migrations, customizations and integrations were complex and problematic. When an organization buys or licenses an LMS they only need to configure their own, private, secure area of the LMS.

3 Steps to Maximize Volunteer Engagement

Litmos

Can you ensure that your data is secure and that everyone in your organizations understands compliance? Using a secure firewall? A nonprofit would be just an idea without the volunteers that power the steam in your organization.