August 27, 2014 - LMS Security Matters
AUGUST 27, 2014
LMS Security Matters. Data security is one of the most important issues nowadays. That is why so much attention is paid to the system security and reliability. Thousands of websites are hacked and blacklisted every day, losing their data, reputation and search ranking. In addition to the reputation damage, hacking causes financial harm, emotional distress and clients’ confidence loss. eLearning
Handling a hack: Data security elearning
NOVEMBER 11, 2015
Preparation There are many types of cyber security breaches. The highest profile examples tend to be outside agents attacking or stealing secure data, but perhaps more common are simple lapses in protocol or mistakes in securing data.
Secure Video Hosting Options for Your LMS Courses
JANUARY 9, 2017
Videos are an integral part of e-Learning businesses. The quality of content and the level of interactivity determine how engaged students are in your course. Most Learning Management Systems, including JoomlaLMS, support embedding videos in their online courses. Blog articles
Cloud Computing Goes Mainstream Implications for the IT Security Workforce
MARCH 20, 2017
Addressing this IT cloud security challenge is a two-fold challenge. Changing Roles of IT Professionals First, while cloud computing and SaaS business models can enable IT organizations to lower infrastructure costs and enable more agility to support customers, they are fundamentally changing the roles of many IT and IT security professionals. Not so long ago, IT security staff worked to protect the organization’s IT perimeter.
Learning Insights Guide 2017: Progress with Purpose
securing high learner engagement. Learning Insights 2017 1 Learning Insights 2017 Progress with purpose Learning Insights 2017 2 “WE’RE LOOKING TO CLOSE THE. GAP BETWEEN LEARNING AND. PERFORMANCE – BETWEEN. KNOWING AND DOING. IT’S ABOUT. THE TOOLS THAT’LL HELP PEOPLE.
Seven Ways To Beat Security Threats In Mobiles [Infographic]
JUNE 29, 2016
With the increased usage of mobile phones and Smartphones, the threat to security is also increasing. Since mobiles are being used now-a-days to store professional information, receive training, and more, data security has become a big issue.
Surprise! Knowledge Guru Summer Release Adds SCORM, Security Features
JUNE 25, 2014
Your Games Just Got More Secure. You can now choose between a Low, Medium and High security setting: Low Security: Players may register on the website without restriction. High Security: Administrators decide what domain names can create a Knowledge Guru account.
Software as a Service SaaS Implications for the IT Security Workforce
APRIL 19, 2017
In this case, it is likely that sensitive data will be stored and controlled by the SaaS provider and used by an organization’s customers or partners so that the data never comes in contact with the organization’s network, firewalls, or any other security device or process controlled by the organization. This situation gives CIOs and CISOs significant concerns, as SaaS applications can leave leaders with little visibility and control regarding the security of the application and its data.
It’s Cyber Security Awareness Month!
OCTOBER 18, 2016
European Cyber Security Month offers UK businesses an opportunity to evaluate their current cyber security initiatives—and explore additional IT training.
Preventing Data Security Breaches on an LMS
AUGUST 5, 2016
Let us now look at some of the common challenges to the security of information stored in LMSs. This is arguably the biggest information security challenge in the use of an LMS. Let us now look some of the best practices of ensuring data security in your LMS.
Blockchain Solutions for Cyber & Data Security
Your Training Edge
JANUARY 9, 2017
In the world of increasing cyber-crimes and businesses’ struggle to cope with data security, its regulation and privacy concerns, can blockchain be a great relief? Previously in our posts at yourtrainingedge.com  , we have discussed the potential of blockchain in terms of security and privacy of the transactions. In this post, we will see this in a more comprehensive way to reveal its capabilities specifically for cyber and data security proposes.
Open-source and the “security through obscurity” fallacy
APRIL 20, 2012
The security of open source software is a key concern for organizations planning to implement it as part of their software stack, particularly if it will play a major role. As a result, there could be the assumption that FOSS is less secure than proprietary applications.
Securing your Video Player
JANUARY 16, 2015
When utilizing an enterprise video platform , one of the top concerns is almost always securing your video player. Ensuring that your videos are secure is a necessity for protecting against unlicensed viewing. A secure video player means content owners can select the level of permissions for groups, the level of user authentication, and secure the delivery of the video stream. The video stream can be securely delivered to protect against unlicensed viewing.
Mobile Learning: 3 Security Threats & 7 Ways to Beat Them
JUNE 15, 2016
However, security and privacy issues in mobile learning may play spoil sport. Malware/viruses, system and data security, users’ privacy, Copyright and Intellectual Property Right (IPR) issues pose challenges in the path of mobile learning. Seven Ways to Beat Security Threats.
Delivering Online Training Securely
JUNE 10, 2013
Moving your training online can dramatically reduce your costs and make training more convenient and enjoyable for your trainees, but it can also introduce concerns about security. We have taken a multi pronged approach to security. Physical Security. Content Security.
Sacrificing Learner Experience for Security
JANUARY 11, 2017
Content security. And what many often come to realize is that paying attention too much to content security can ultimately lead to a poor learner experience. The desire to secure your course content, especially if your selling it, is understandable.
Introducing Lectora Mobile—Simple and Secure m-Learning
JANUARY 13, 2014
With this powerful mobile learning solution, e-Learning administrators can easily deliver and track secure, SCORM-compliant mLearning content—even offline. With Lectora Mobile, you don’t have to worry about security, compatibility or integration.
Fastest Growing Jobs in America: Information Security Analyst
JULY 16, 2014
With recent security disasters such as the Heartbleed Bug and the Target Security Breach , the need for strong information security has never been more pressing. These cyber heroes are known as information security analysts. Becoming an Information Security Analyst.
Cyber Security Awareness Training Goes Global at BAE Systems
MARCH 15, 2016
Cyber security is a day-to-day consideration for most organisations, but for BAE Systems it is a critical competence. IT skills training
Cyber security webinar: Bring the risks to life for your workforce
OCTOBER 17, 2016
People hold the key to cyber security in any organisation with human vulnerability being the biggest single factor in most real life data breaches. The webinar entitled, Cyber Security: Bring the risks to life for your workforce takes place at 1500 (BST) on Thursday, October 27.
Video Security In Your Online Courses
MARCH 24, 2015
If you’re selling your online course, then when you create a video you ultimately think about its security. That said, it still makes sense to secure your videos. Wistia - A popular choice for many, Wistia has security settings that are very similar to VimeoPRO.
Adobe RoboHelp: Security Update Announced
I Came, I Saw, I Learned
AUGUST 17, 2011
An important vulnerability has been identified in RoboHelp and RoboHelp Server. A specially crafted URL could be used to create a cross-site scripting attack on RoboHelp installations. The solution is now available. Adobe's Technical Communication Suite Help Authoring RoboHelp
Considering Cyber Security Training A Burden? 5 Tips To Ease It!
AUGUST 9, 2016
According to a study by IBM, almost 95 percent of all security incidents surveyed were because of human error. Yet, not many organizations give training employees on information security a serious thought. How can employees be trained on cyber security?
Security in a Mobile World
ATD Learning Technologies
SEPTEMBER 22, 2014
As mobile devices become more powerful and more widely used, security has become the proverbial elephant in the room. Everybody knows there is an entirely new set of security issues that come into play, but few people are sure what to do about them. Click here to read full version
Benefits of Customized E-learning for Credit Card Security Training [Infographic]
SEPTEMBER 26, 2016
So, delivering training via an off-the-shelf course will not suffice your bank’s unique credit card security requirements. But, why only customized e-learning for credit card security training? Hope it convinces you of the benefits of custom e-learning for credit card security.
Securing Internal Video Content 101
OCTOBER 6, 2015
These videos are useful within your company, but if they’re not secure, your competitors have free rein. So, how can you make your videos secure? Unlisted YouTube videos are not your best bet if you’re a larger, more security-conscious business with a greater amount of potentially sensitive info. Larger companies should look for a secure enterprise video platform with more sophisticated security options. Security and Permissions .
Customized Credit Card Security Online Training for Your Banking Sales Staff
AUGUST 29, 2016
Let’s explore why customized e-learning is the way to go for your credit card security training. Delivering training via an off-the-shelf course will not understand your bank’s unique credit card security requirements.
Generic versus bespoke cyber security training: What’s the best for you?
JANUARY 20, 2016
Cyber security affects everyone. High profile businesses are victims of malicious hacks, but more frequently data security breaches occur due to normal staff making avoidable mistakes. How much of your data security is off the shelf? How many staff need cyber security training?
Avoid Security "Frights" With National Cybersecurity Awareness Month
OCTOBER 7, 2014
Cyber threats pose one of the gravest national security dangers the United States faces,” stated President Barack Obama. Yet spending on security training for application developers has failed to grow accordingly. Aspect Security, a leader in application security training and an OpenSesame seller, recently released its annual report on the state of developer application security knowledge.
AlliedBarton’s Bill Whitmore: A Higher Calling for Security
MARCH 24, 2014
Bill Whitmore, AlliedBarton’s president and CEO, sees it as his duty to prepare the company’s security officers, most of whom have only a high school education, for lifelong careers. It’s not often that you hear a CEO refer to employee training and development as “a higher calling,” but that’s how Bill Whitmore, the head of AlliedBarton Security Services, sees his company’s mission to produce top-flight security officers.
Tech Week: Avoid Data Breaches With Secure Code Training
FEBRUARY 17, 2014
In response to increasing security concerns, organizations and standards have been developed to provide guidance and structure around best practices for writing secure code. The DSS provides a framework for prevention, detection and reaction to security breaches.
Stay Safe Online: Cyber Security for Cyber Monday
NOVEMBER 28, 2014
For this reason we’d like to give you the basics of cyber security and the tools you can utilize to make safe transactions online! If the URL starts with “http” and not “https” the site is not secure, and you should show caution when putting private information into the site.
IBM and PNC to Train, Certify More Veterans for ‘New Collar’ Work
APRIL 17, 2017
IBM and CASY are spearheading the program, which certifies veterans in the use of software commonly used by law enforcement, cybersecurity and national security agencies. Homepage Commentary & Opinion Learning Delivery cyber security data analysis IBM PNC Bank training veterans
Is Your m-Learning Secure? The Threat and How to Avoid It.
JANUARY 14, 2014
But is m-Learning secure? Mobile security is a big issue as companies move toward delivering more and more training and just-in-time learning via mobile devices. The other security threat has to do with how you deliver and manage important company documents and information.
Monday Morsels – Avoid Employee Lawsuits and Breaches In Security
JULY 18, 2016
Security Breach Because of a Lack of Compliance Training. Is it secure? Do your employees know the security protocols for your organization? Lawyer : Do you have in place a training program to minimize security threats? Monday Morsels.
Making Video Smarter and More Secure
JANUARY 23, 2015
With an engaging, secure video platform , video can be accessed across the enterprise, enabling all users to create, manage, and distribute video content through any enterprise application. With a dramatic increase in the use of video as a learning and communication tool, companies are struggling to manage video like they do other types of content – with ease. So, how can video assets be managed completely and seamlessly? The answer: with the right online video solution.