Blog

10 Tips to help with Employee Training Programs

In an ideal world, you’d be able to hire exceptionally talented, motivated and focused employees who would be able to craft their own educational experiences in order to further not only your business, but the employee themselves. This is not that ideal world, so it falls upon the shoulders of business owners to spend a little hard-earned cash to direct and craft educational experiences that benefit the business and also keep employees motivated and happy. If you’re thinking of implementing an employee training program, here are ten tips to getting it started. Remember, not all of these will apply to your industry, but they are guidelines to setting up a program that works for you.

We Are All Connected – How Social Media is Finding Us Everyday.

This morning there was a power outage on the west side of town, where I live. It was just one of these random power outages where you don’t think there’s been an accident and the weather seems fine. But I heard all the fans and our alarm clock blip off and I knew exactly what happened. I think one year ago, my reaction to this situation would have been: Get up, go look at cell phone for time, call work if I need to, and go out for coffee. Today, I reached for my cell phone and checked my twitter feed to see if anyone else was experiencing the problem. Next, I also used my cell phone to check the local power company’s site to see any outages. Couldn’t get it to load, so I turned on the mobile hotspot on my phone, hooked up my laptop and was able to look at news reports, Facebook postings, twitter updates and, finally, see the power company’s website telling us we had no power.

SMBs Key to Local Economic Recoveries… through Ads? August PF 2010

Small Business Paving the Road to Recovery The strength of American industry began with local businesses that thrived and grew to national levels. But during current economic struggles, it’s not the national or even international growth monsters that the American public looks toward for help in recovery. It’s the Small Business. You know them — they’re everywhere, from local coffee shops to print houses; from small technology firms to legal and tax advisors. It’s these local economy cornerstones that will ultimately assist in America’s recovery from rough roads. At least, that’s what Irving, CA, based ad-firm WebVisible is stating in their recently released Q2 report, entitled: State of Small Business Online Advertising Q2 2010.

Technology Increases Small Business Profitability – PF July 2010

During times of economic struggle, most small businesses end up making cuts and changes to keep their businesses in the green. From laying off staff to decreasing business travel, reducing marketing efforts and ending bonuses and raises temporarily – there are a variety of ways small businesses look to cut their expenses.

Facebook – Simple Steps for Safety at Home and Work- PF May 2010

In this ever-advancing age of real-time social networking, the threats to sensitive personal information keep growing. Cyber-thieves now access all the daily sites you use, just looking for that slip of info that will unlock bank accounts, passwords, and sometimes even your house!

Your Copy Machine: A Serious Security Risk?

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentially extracted. So the next time you dispose of a copy machine, if you’re not sure what’s stored on it and how to get it off – give us a call to help out. To see the news report, watch this video.

Thwarting Insider Threats – PF May 2010

The greatest information security threat facing your organization is in your office right now. It has the ability to bypass the physical and logical controls you’ve put in place to protect the perimeter of your network and has already obtained credentials to access a significant portion of your infrastructure. What is this threat? It’s the often underestimated insider threat — the risk that your users will violate the trust you’ve placed in them to conduct malicious activity on your network.