Foster Continuous Learning with Peer-to-Peer Training

Posted by aeadmin on Jun 5, 2019 11:00:00 AM

 

Should you mix business with pleasure? Conventional wisdom says no, but there is mounting evidence that coworker friendships are critical to the modern work experience.

Read More

Tags: Technology, SharePoint, cybersecurity, Microsoft, cyberattack, Human Resources, ATS, HRIS

Automated Travel and Expense Management Has Universal Appeal

Posted by aeadmin on May 29, 2019 11:00:00 AM

 

A few years ago, astronaut Buzz Aldrin shared a surprising anecdote about the 1969 moon landing mission — he was required to file a travel expense report with NASA! His reported expenses for the eight-day, 480,000-mile trip totaled $33.31 for the use of government vehicles, including cars, planes and spacecraft.

Read More

Tags: Technology, SharePoint, cybersecurity, Microsoft, cyberattack, Human Resources, ATS, HRIS, Travel and Expense, TEM

Transforming the Performance Review from Annual Pain to Valuable Exercise

Posted by aeadmin on May 22, 2019 11:00:00 AM

 

The annual performance review is a time-honored process in which management provides employees with assessments of their job performance throughout the preceding year. Originating during the Industrial Revolution, the formalized review process is now ingrained in the corporate structure. More than 90 percent of businesses say they continue to conduct annual reviews.

Read More

Tags: Technology, SharePoint, cybersecurity, Microsoft, cyberattack, Human Resources, ATS, HRIS, Employee Engagement, Performance Reviews

With New Threats Targeting HR, a Portal Offers Strong Defense

Posted by aeadmin on May 15, 2019 11:10:48 AM

 

 Over the past year, the FBI, the IRS and numerous security analysts have warned of a marked rise in cyber attacks targeting human resources professionals. Given the type of information under HR’s control, it’s a wonder that such attacks are only a fairly recent phenomenon.

Read More

Tags: Technology, SharePoint, cybersecurity, Microsoft, cyberattack, Human Resources, ATS, HRIS, Employee Engagement

To Break the Cyberattack Chain, You Need the Right Tools

Posted by aeadmin on Jan 29, 2018 7:00:00 AM

 

In the military, the term “attack chain” or “kill chain” is used to describe how an attack is structured and executed, from identification of a target to selection of an appropriate weapon to the use of that weapon on the target. Reconnaissance operations are employed throughout the chain to monitor the movement and defense capabilities of the target and evaluate the impact of the attack.

Read More

Tags: adaptivedge, cybersecurity, identity, phishing, UEBA, cyberattack, security

    Are You Secure? Score a FREE O365 Security Assessment.

    We're here to help!

    We'd love to find out more about the projects and initiatives you're working on to exchange ideas and provide some high-level guidance where we can.  We love learning from others as well as sharing some of our experience and lessons learned.  Let's talk!

    Subscribe to Email Updates

    Recent Posts

    Posts by Tag

    see all