Home » 2014 » October
Oct 31

Overcome Internal Threats with Security Awareness Training

October 31st, 2014 by

Security Awareness TrainingThink your biggest security threat comes from some ill-defined external source? In reality, the most significant risks originate with simple, avoidable mistakes. The staff you trust to handle your data and deal with your clients’ vital private information on a daily basis may simply lack the understanding to know they’re contributing to vulnerabilities.[...] Read More

Oct 29

Change Management – Making Transitions Smoother and Effective!

October 29th, 2014 by

Change is inevitable. Change Management is a process in the ITIL® V3 framework that deals with the processes, practices, and strategies adopted in order to implement changes without disrupting business operations. Changes can be either self-adopted by the organization or a part of the structure due to changes in the IT environment.[...] Read More

Oct 29

Introducing ITIL®: The Service Desk (Part II)

October 29th, 2014 by

In the previous article in this series, we discussed setting up the Service Desk as a Single Point of Contact (SPOC) for IT as a logical starting point for ITIL implementation.  Now, we will take a closer look at the Service Desk responsibilities and relevant ITIL® processes.[...] Read More

Oct 29

3 Reasons Businesses are Benefiting from ITIL® Consulting

October 29th, 2014 by

ITIL ConsultingFirms that think they have a handle on ITSM frameworks often make the mistake of believing they don’t need additional consulting. Unfortunately, no matter how well your organization stays on top of changing ITSM methodologies, like ITIL®, it’s critical that you benefit from an outsider perspective.[...] Read More

Oct 23

Closing Security Backdoors and Opening Opportunities with CISSP®-Certified Staff

October 23rd, 2014 by

CISSP TrainingGetting your workforce security certified can be complicated, but that doesn’t mean you can let your responsibilities slide. In the process of improving your control over who accesses your own information and how you respond to threats, Certified Information Systems Security Professionals (CISSP®) make it easier to protect your own intelligence and win contracts with other companies who require such credentials in order to business with them.[...] Read More

Oct 21

Which ITIL® Processes Should Your Training Focus On?

October 21st, 2014 by

ITIL Processes TrainingITIL® processes compartmentalize the Service Lifecycle into five broad categories, each of which is further divided into individual processes and procedures. Although the five major process classifications, Continual Service Improvement, Service Strategy, Service Design, Service Transition and Service Operation, are intended to be applied together in a comprehensive fashion, there are finite limitations to corporate education.[...] Read More

Oct 17

ITIL® Certification: Investing in Your Workforce

October 17th, 2014 by

ITIL Certification Training for EmployeesAlthough most employers appreciate the need for a qualified workforce, some fail to understand their responsibilities in creating one. Your staff doesn’t come certified; it may be up to you to help them earn the credentials required to ensure your projects run as smoothly as possible.[...] Read More

Oct 14

Can Large Groups Benefit from IT Online Training Courses?

October 14th, 2014 by

Online IT TrainingModern IT training is commonly performed within the framework of an online setting. For instance, professionals seeking individual certifications often choose to pursue coursework over the Internet in order to accommodate their packed schedules.[...] Read More

Oct 10

Domains of CISSP: Access Control

October 10th, 2014 by

Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform on a system.[...] Read More

Oct 9

The Real Value of IT Security Training

October 9th, 2014 by

IT Security TrainingDon’t be fooled by the typical Hollywood portrayal of IT security. Even among professionals, there exist common misconceptions about the role that security plays and why it’s necessary. While it’s certainly true that hackers are capable of stealing your valuable business data, the idea that they have to go to great lengths to do so is just television’s way of making the concept more exciting for viewers.[...] Read More