Travel, tracking and Twitter

Learning with e's

So I arrived at Schipol Airport and was whisked away by bus to pass through the obligatory security and passport control checks, before then dashing back across the airport concourse to catch my onward connecting flight to Cologne.

Track 85

Monday Morsels – Avoid Employee Lawsuits and Breaches In Security

Edmego Learning

Security Breach Because of a Lack of Compliance Training. Is it secure? Do your employees know the security protocols for your organization? Lawyer : Do you have in place a training program to minimize security threats? Monday Morsels.

Handling a hack: Data security elearning

Sponge UK

Preparation There are many types of cyber security breaches. The highest profile examples tend to be outside agents attacking or stealing secure data, but perhaps more common are simple lapses in protocol or mistakes in securing data.

Surprise! Knowledge Guru Summer Release Adds SCORM, Security Features

Knowledge Guru

You can put Knowledge Guru content alongside your existing courses and track completion just like you always have. Your Games Just Got More Secure. Medium Security: When players register on the website, they are sent an verification link to the email they provided.

12 Ways to Get the Most Out of Your Authoring Tool

How it’s Viewed7 Tips and Tricks to Make Your Pages Interactive8 The Sky’s the Limit with the Cloud9 Translate Your Learning into Hundreds of Languages10 Track and Analyze Exactly how. handle any secure external API calls, which means. Track and Analyze Exactly.

Keeping Your Shareable Dashboards Secure

HT2 Labs

You know and love them as a handy way to track and display the learning KPIs that matter in your organisation. Figure 1 indicates the security options available for shareable links within the new URL filter mode. The post Keeping Your Shareable Dashboards Secure appeared first on HT2 Labs. Dashboards. A staple of the Learning Technologist’s digital diet. But how can the humble learning analytics dashboard be improved?’ I hear you ask.

Securing Internal Video Content 101

KZO Innovations

These videos are useful within your company, but if they’re not secure, your competitors have free rein. So, how can you make your videos secure? Unlisted YouTube videos are not your best bet if you’re a larger, more security-conscious business with a greater amount of potentially sensitive info. Larger companies should look for a secure enterprise video platform with more sophisticated security options. Security and Permissions .

Introducing Lectora Mobile—Simple and Secure m-Learning

Trivantis

With this powerful mobile learning solution, e-Learning administrators can easily deliver and track secure, SCORM-compliant mLearning content—even offline. With Lectora Mobile, you don’t have to worry about security, compatibility or integration.

Mobile Learning: 3 Security Threats & 7 Ways to Beat Them

CommLab India

However, security and privacy issues in mobile learning may play spoil sport. Malware/viruses, system and data security, users’ privacy, Copyright and Intellectual Property Right (IPR) issues pose challenges in the path of mobile learning. Seven Ways to Beat Security Threats.

Learning Thursday #6: Track Classroom Attendance Using a Scan Gun (Includes Video)

Adobe Captivate

Some employees aren’t allowed to have mobile devices on premise for security reasons. And it saves you from manually typing every learner’s user ID into the LMS, or into an import spreadsheet, in order to track attendance.

Your LMS synced with SAML protocol to make your training programs secure and reliable

Paradiso

Security is an essential element when conducting online training. Companies and educational institutions that implement eLearning tools for their training seek, among other features, should choose strong security protocols that are ruled by the specifications dictated by the law on computer security, data protection and information traffic in the web. This communication is handled in an encrypted manner and is completely secure.

Avoid Security "Frights" With National Cybersecurity Awareness Month

OpenSesame

Cyber threats pose one of the gravest national security dangers the United States faces,” stated President Barack Obama. Yet spending on security training for application developers has failed to grow accordingly. Aspect Security, a leader in application security training and an OpenSesame seller, recently released its annual report on the state of developer application security knowledge. Download your complementary copy of the training track!

Taco Mac Secures Fifty Spots in NRAEF Apprenticeship Program

discoverlink

As one of two restaurants in Georgia to participate in the program, Taco Mac is a pioneer for the restaurant industry, having secured 20% of the available restaurant apprenticeship spots and $50,000 in grants for the inaugural year. FOR IMMEDIATE RELEASE.

Mac 52

Stay Safe Online: Cyber Security for Cyber Monday

OpenSesame

For this reason we’d like to give you the basics of cyber security and the tools you can utilize to make safe transactions online! If the URL starts with “http” and not “https” the site is not secure, and you should show caution when putting private information into the site.

Lower Your Cybersecurity Risks with Proper Employee Training

Your Training Edge

Ensure that employees are made aware of the importance of the policy and that violations will be kept track of on their file and can impact their future with the company, up to and including termination. You may want to consider working with an outside security firm for these sorts of tests.

6 Data Security Tips For Mobile Learning In Corporate Training

PulseLearning

If your organization has already embraced mobile learning or BYOD, allowing employees to access training materials anywhere, anytime on their personal devices, it is likely that data security has become a hot topic. It is especially important to maintain data security vigilance now that the European Union (EU) is set to enforce the General Data Protection Regulation (GDPR), a regulation that aims to protect all EU citizens from privacy and data breaches, in May 2018.

Why You Should Stop Tracking Your Training Records in Excel & Move To An Online Tracking System

SET Safety

By moving your training records online, you open up a whole host of new functionalities and securities that can help you stop wasting time, money and energy on manually tracking employee records. Read on to learn about some of the main benefits of online tracking systems and how they can help your company’s training process. If you have questions about online record tracking systems or would like more information on how it can help your company, contact Set Safety today.

Track 39

A small investment in IT security training could save you millions

Litmos

Impacted companies are often unprepared, leaving them scrambling to secure data, communicate with customers, and repair damaged reputations. Faced with security measures that are nearly insurmountable, hackers have changed their strategy.

eLearning Review: A Module for the National Security Arena

Dashe & Thomson

I played through the scenario four different times before I finally registered a “good” result (as opposed to just adequate). Courtesy of www.blog.cathy-moore.com Once I finally found the proper path, I checked out the decision tree Cathy used to keep track of the outcomes.

Module 130

Effectus LMS For effective Employee Training Management and Tracking

CommLab India

Effectus can store classroom training resources sand online learning assets in a single, centralized and secured location. Effectus LMS has excellent tracking capabilities, you can effectively track online and classroom training activities.

Track 52

eLearning Review: A Module for the National Security Arena.

Dashe & Thomson

I played through the scenario four different times before I finally registered a “good” result (as opposed to just adequate). Courtesy of www.blog.cathy-moore.com Once I finally found the proper path, I checked out the decision tree Cathy used to keep track of the outcomes.

Module 130

Learning Management System Basics (LMS)

Your Training Edge

First, the management system consists of the tracking and reporting of the organization and individual learning activities. The tracking feature of most LMS systems is worthwhile in itself. First, automated tracking and delivery creates efficiency, cost savings, and better reporting.

LMS 141

Take a free Cyber Security course for Safer Internet Day 2018

Ed App

At Ed Microlearning, we believe that a safe and secure internet is a better internet for everyone, and that microlearning can play a part in educating teams, employees and staff members on the importance of safe online practices.

Learning Management System Basics (LMS)

Your Training Edge

First, the management system consists of the tracking and reporting of the organization and individual learning activities. The tracking feature of most LMS systems is worthwhile in itself. First, automated tracking and delivery creates efficiency, cost savings, and better reporting.

LMS 169

AlliedBarton’s Bill Whitmore: A Higher Calling for Security

CLO Magazine

Bill Whitmore, AlliedBarton’s president and CEO, sees it as his duty to prepare the company’s security officers, most of whom have only a high school education, for lifelong careers. It’s not often that you hear a CEO refer to employee training and development as “a higher calling,” but that’s how Bill Whitmore, the head of AlliedBarton Security Services, sees his company’s mission to produce top-flight security officers.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable.

PCI council turns to eLearning to bolster security compliance

Aptara

PCI council turns to eLearning to bolster security compliance. In the wake of the recent high-profile retail breaches, information security is high on everyone's radar.

The dawn of a new generation

E-Learning Provocateur

Beyond enterprise social networks – which are hardly universal and face substantial challenges of their own – UGC in the broader sense is beset by concerns about content quality, accountability, organisational culture, job security and power dynamics.

Forum 246

Find out if social learning chemistry works for you!

Origin Learning

What if the social learning platform can track, measure, and even predict a learner’s behavior? The cloud-hosted solution comes with a secure and customized environment that is simple and easy to use.

Game On: Training Employees To Battle Cyberattacks

The Game Agency

Information security company Shred-it found that 47% of business leaders blame human error and negligence for their security breaches. Recently, Intuit set out to teach 3,000 employees its latest set of security protocols. The game allows each player to learn about Amazon Web Services (AWS) security protocols. The game tracks and displays scores in the form of a leaderboard and provides rewards and feedback along the way.

Games 40

How big data changes the training scenery

Matrix

Security of data is a serious concern for many companies. Cloud-based LMS s are quite hard to get hacked due to their powerful and constantly updated security protocols. We live in a world of data. Money is no longer our only currency; big data is catching up.

eLearning at scale: 8 LMS features for large enterprises

eFront

Fortunately, securing enterprise systems is not the arcane art that it was in decades past. and adds support for “21 CFR Part 11”, the US Federal Government standard for secure and reliable electronic record storage. Big businesses have big demands.

Why Employ Digital Rights Management

MagicBox Blog

The Digital Right Management license protocol ensures secure distribution, promotion, and sale of digital media content. The architecture of DRM supports protection, monitoring, and tracking of the digital content usage. Secure e-book distribution: Once the e-book content is protected via DRM encryption, the proper key is needed to decrypt the content and render it readable. DRM systems provide effective security and provide users with a great user experience.

Podcast 13: High-Stakes Compliance Training Trends – With Bill Mastin of NetDimensions

Talented Learning

They’ve used our LMS for a few years, and recently they needed security courseware for their third-party vendors , like taxi and food service providers. WELCOME TO EPISODE 13 OF THE TALENTED LEARNING SHOW!

Why Employ Digital Rights Management

MagicBox Blog

The Digital Right Management license protocol ensures secure distribution, promotion, and sale of digital media content. The architecture of DRM supports protection, monitoring, and tracking of the digital content usage. Secure e-book distribution: Once the e-book content is protected via DRM encryption, the proper key is needed to decrypt the content and render it readable. DRM systems provide effective security and provide users with a great user experience.