Why Employees Adapt Faster to Mobile Learning Than eLearning

from the Enterprise Learning blog

The advent of eLearning, meaning the original delivery of courses and other educational material via computer, was not something to which employees easily adjusted to. 

Employees, who are accustomed to learning in a classroom setting with lecturers in front of them, can feel a little isolated and inadequate when they started to learn alone in the computer age.

By Roz Bahrami • April 13, 2017

Effective Training Inspires Customer Loyalty

from the Enterprise Learning blog

We know that online training leads to more educated and engaged clients. And we know that clients that are educated and engaged are more loyal customers.

Customer training is important because loyal customers are highly valuable.

By Stephanie Hadley • April 6, 2017

Building Trust in Leadership Development

from the Enterprise Learning blog

When is the last time you lost trust in an individual? Think back to that moment and try to recall what you were thinking or feeling. I am sure you can vividly remember what the person did or said that caused you to lose that trust.

Try to keep that feeling present as you continue to read on.

By Mike Kole • March 30, 2017

The Importance of Consuming and Analyzing Metrics

from the Enterprise Learning blog

There are countless ways a company can use big data and qualitative information to determine the suite of services and functionality a customer would want or need. From good old-fashioned tally marks to  highly robust analytics that consider your company’s entire customer experience ecosystem, there are tools that give clues as to what would provide meaningful automation for customers, set them on the path to success and reduce operating costs.

By Deborah Rapsinski • March 23, 2017

Sales Enablement: Cutting Down One-Off Field Requests With the Right Message

from the Sales Enablement blog

Some months ago, I replied to a hot blogpost debate on scripting as a sales tool.  Someone had posted the question, “Inside the sales conversation: To script or not to script? ” It was a question that begged for strong opinions, but was worded much too generally to draw out constructive answers. I offered a single word of sarcasm…‘YES!’  

By Monifi Schlick • February 13, 2017

Characteristics of an Effective Mentor

from the Enterprise Learning blog

In the last post, we discussed the importance of mentorship.  Key points were raised to give you something to think about as you decide if working with a mentor is the right approach for your career path. The value of mentorship has been proven time and time again. You have probably heard numerous stories about how key influencers contributed to the success of high-powered executives or world-class athletes. These stories aren’t exclusive to top-performers, they are present in every aspect of life.

By Brian Pia • February 9, 2017

Empower Sales Teams With Personalized eLearning

from the Sales Enablement blog

Amazon remembers your purchase history and style preferences to recommend the best products for you, giving you a truly personalized online shopping experience. Netflix recommends shows for you to watch based on your personal viewing history, making it easier for you to find the movies and shows you like. Today everything on the Web is personalized, and so it is no surprise that personalized eLearning is the biggest trend in sales training in 2017.

By Stephanie Hadley • February 8, 2017

Discussion Boards: A Key Element to Engage Learners

from the Enterprise Learning blog

A discussion, or conversation, is the most proven way to get to the heart of any subject matter. Particularly for eLearning, discussion boards provide a common platform for learner-to-learner and trainer-to-learner interaction.

By Oleksii Vyshnyk • February 7, 2017

How to Facilitate Unforgettable Online Learning

from the Enterprise Learning blog

Studies show that brain cells interact while learning and creating memories. Learning and development professionals can create course content that promotes cell connectivity by understanding how the brain collects and stores information.

By Karen Possessky • February 6, 2017

Soft Skills Training in eLearning

from the Enterprise Learning blog

Successful organizations understand the importance of soft skills training when developing millennial leaders. Soft skills including communication, problem solving, teamwork, negotiating and organization are key to effective leadership development among all generations within the workforce. 

By Shina Neo • February 3, 2017

5 Reasons the Training Industry Needs Content Security

from the Content Security blog

We know that effective online training programs can be a competitive advantage. Learning and development can also improve employee’s skill set and increase worker productivity. The strongest customer training programs can also be revenue generators. The incredible value of training is now easily understood at the highest level of any organization.

By Stephanie Hadley • February 1, 2017

3 Neurotransmitters to Enhance Corporate Learning and Engagement

from the Enterprise Learning blog

Neurotransmitter is a term for chemicals that are synthesized in brain cells. As a learning and development leader and professional, you have the power to influence synaptic brain activity. Synapse simply refers to gap-crossing activity of brain chemicals between two cells in the brain.

(Image from somerealitybites.com)

By Karen Possessky • February 1, 2017

Virtual Training: Engaging Adult Learners

from the Enterprise Learning blog

In the last blog, we discussed the need for a clear purpose in training. Adult learners have to be able to follow where the information is leading them to know what is important to retain as you move from one part of the training to the next.

By Leslie Holcroft • January 31, 2017

7 Mobile Apps That Will Make Your Employees More Productive

from the Enterprise Learning blog

The trouble with the deluge of mobile apps available in the marketplace is selecting the ones that your employees will really use, not the ones that are necessarily the most intriguing or complicated.

By Roz Bahrami • January 30, 2017

Defining Customer Success

from the Enterprise Learning blog

Your customers have in mind their reason for reaching out to your company well before they boot up their computer, take their smartphone out of their pocket, stop by your store, engage Google Home or Alexa or pick up the phone. Often, these drivers are predictable and you can anticipate their reason for contacting your company.  Other times, it's anyone's guess.  

Handling customer interactions with ease and grace will contribute to your customers' expectations of how easy it is to do business with your company, and whether that experience encourages them to remain loyal. Remember, each customer experience is either doing damage to your brand or helping to promote it.  

By Deborah Rapsinski • January 27, 2017

The Importance of Mentorship in a Millennial-Dominated Workforce

from the Enterprise Learning blog

The importance of mentorship can be traced back to ancient civilizations.  Throughout the ages, younger generations have successfully leveraged the knowledge possessed by more experienced, and often-times older, influencers.  If you think about your personal experiences growing up, you may be able to quickly identify people that have helped you become the person you are today.  Whether it was a teacher or coach, your parents or an older sibling, each played a vital role in your early development.  

By Brian Pia • January 26, 2017

5 Ways eLearning Is Changing the Relationship Between Technology Companies and Customers

from the Enterprise Learning blog

ELearning is fundamentally changing the relationship between technology companies and their clients. There are a few reasons why customer eLearning is especially relevant to technology companies. First, technology is ultra competitive, and software-as-a-service makes it easy for customers to switch to a competitor if they are not satisfied with their use of a technology. Second, most technologies boast rich feature sets, and customer training is needed to ensure clients get the most value from new technology innovations. Lastly, most technology companies sell globally, and therefore in-person training is logistically difficult and costly to deliver.   

By Awais Ahsan • January 25, 2017

8 Elements for Designing Training That Engages Corporate Learners

from the Enterprise Learning blog

Design your professional online courses according to the eight elements of Flow Theory as outlined by Mihaly Csikszentmihalyi, a primary founder of the psychology of flow. By appealing to these elements when developing your training program, you can maximize learning and memory recall. All objectives and goals can be achieved as a natural byproduct when placing primary focus on optimal flow to engage learners.

By Karen Possessky • January 24, 2017

4 Tips for Effective Distance Leadership

from the Enterprise Learning blog

Collaboration among employees is key to a cohesive workforce. It is critical to enforce teamwork in order to successfully achieve a mutual goal. The impact of effective leadership requires particular gravity in the age of globalization.

By Oleksii Vyshnyk • January 19, 2017

2 Keys to Effective Sales Teams: Sales Training and Sales Enablement

from the Sales Enablement blog

According to Manpower’s 10th annual talent shortage survey, a sales person is the fourth hardest role to fill in an organization. Ask any sales manager and they will tell you that of all sales roles, inside sales teams are especially difficult to staff. Inside sales representatives typically need significant sales training and a lot of high quality sales enablement tools to do their job well, feel successful, and therefore commit long term to the role. While sales positions in general are hard to fill, it does not help the situation that inside sales reps are also expensive to source.

By Awais Ahsan • January 18, 2017

Flow Theory: Captivate Learner Attention With Online Training

from the Enterprise Learning blog

Deep concentration puts people in a state of calm while immersed in a learning activity that is so engaging that time is forgotten. Research shows that early online training curricula often transmits information ineffectively without factoring the psychology of cognitive flow.

By Karen Possessky • January 17, 2017

Effective Ways to Develop a Learning Culture in Enterprise Organizations

from the Enterprise Learning blog

Successful organizations make it a priority to cultivate a culture of learning and nurture their employees’ full potential. In a work environment that is constantly changing, it is more crucial than ever to establish a positive learning experience and adopt an agile learning approach to enhance employee skills and knowledge. 

By Shina Neo • January 13, 2017

3 Tips for an Effective Sales Conversation

from the Sales Enablement blog

Business analysts have a long tradition of researching about why businesses fail.  The topic has become a staple of business publications and bloggers who will periodically rank their 5-10 reasons that startups don’t take off, small businesses dreams crumble and once successful enterprises meet their demises.  

By Monifi Schlick • January 12, 2017

Learning Paths Take Sales Training to Reps in the Field

from the Sales Enablement blog

According to Salesforce.com, a sales rep spends 67 percent of their time doing something besides selling. We know all too well that a good chunk of that time is spent on reporting, but another significant portion of it is spent in training sessions. Too often those training sessions are in-person, large group training sessions designed to provide the greatest amount of information to the most people in one sitting.

By Stephanie Hadley • January 11, 2017

Maximize Learning With the ABCs of the Socratic Method

from the Enterprise Learning blog

Instruct by asking questions and not lecturing. Answer questions with a question. At first this sounds like a simple corporate learning strategy. However, as you try to implement the Socratic style, you may find it quite daunting. Following the ABCs will help master the technique that will aid in monumental development of those learners you instruct

By Karen Possessky • January 10, 2017

The Importance of Developing a Learning Culture in Enterprise Organizations

from the Enterprise Learning blog

As organizations continue to adopt a digitalized blended learning approach, it is more important than ever to invest and establish a culture of learning in order to be successful. Values, goals and more importantly, employees define a strong corporate culture. 

By Shina Neo • January 9, 2017

Multigenerational Leadership: The Key to Teamwork

from the Enterprise Learning blog

Today’s multigenerational workforce includes employees between the ages of 18-80 years. Some employees are only starting their careers while others are approaching their retirement. The dominant three generations, which are forming a balanced mix of the workforce environment remain the same: baby boomers, Generation X-ers and millennials.

By Oleksii Vyshnyk • January 6, 2017

The Popularity of Personalized Learning

from the Enterprise Learning blog

As far back as seven years ago, Gene Willhoit, executive director of the U.S. Council of Chief State School Officers, predicted that the children of tomorrow would no longer be served well by what he termed assembly-line education that became popular in the industrial age.

By Roz Bahrami • January 5, 2017

eLearning Trends: Outlook for 2017 Puts a Focus on Accessibility, Analytics and Adaptability

from the Enterprise Learning blog

According to IBIS Capital, the outlook for eLearning in 2017 is bright. The firm reports that the global eLearning market will grow to $255 billion in 2017What will fuel this growth? A surging interest by global executives to focus training on the critical skill sets that their employees require will lead to more advanced execution of eLearning programs. The rise of millennials in the workplace, and the retirement of baby boomers will further expedite this shift from more traditional learning environments to emerging eLearning practices.

By Awais Ahsan • January 4, 2017

10 Rules to Create a Visually Appealing eLearning Course

from the Enterprise Learning blog

How do babies learn when they are first born? They use their senses. Adults depend on senses less than babies do for learning, but heavily rely on them for memory. Create content that appeals to the senses to help learners retain more information. Here are 10 basic rules for stimulating the sense of vision when creating an eLearning course.

By Karen Possessky • January 3, 2017

Effective Leadership in the New Year

from the Enterprise Learning blog

With the New Year right around the corner, this is often the time for self-reflection. What have we accomplished this year and what do we hope to accomplish in the next? We find ourselves thinking of the type of person we were and more mindful of the person we want to be.

By Shina Neo • December 30, 2016

Learning at the Speed of Search: Focus on the Learning Experience

from the Enterprise Learning blog

As technology continues to transform how business is conducted, organizations are becoming more aware of the cybersecurity implications and challenges that come along with today’s millennial and content sharing generation. Along with the ability to gather and access large amounts of data, enterprise organizations are starting to understand the importance of developing cybersecurity awareness training programs to protect and secure their intellectual property.

By Shina Neo • December 29, 2016

Sales Training 2017 Outlook: Content, Access and Relevance

from the Sales Enablement blog

Sales training is a $5 billion dollar industry, according to Sales Performance International and companies spend as much as $30,000 or more training individual sales reps.

By Stephanie Hadley • December 28, 2016

Leverage E-Learning Through Storyboarding

from the Enterprise Learning blog

In many cases, it turns out that even the brightest ideas for an e-learning course may not be effective without a detailed map. For an e-learning course, a storyboard highlights all key elements including learning objectives, interlinked content, engaging media, knowledge assessment and feedback features. More specifically, a storyboard enables learners to look from afar at the complete picture even before starting the course. Here are some of the distinctive features of storyboarding.

By Oleksii Vyshnyk • December 27, 2016

The Neuroscience Behind Effective Leadership

from the Enterprise Learning blog

Why we do the things we do is a question that can be constantly analyzed. Effective leaders are visionaries who have the ability to influence and inspire others to achieve a common goal. How our brain works, how we make choices, and how we act on those decisions is part of the neuroscience behind effective leadership.

By Shina Neo • December 23, 2016

The Driving Forces of Corporate Training in Europe

from the Enterprise Learning blog

The first part of this blog series discussed the driving forces shaping the demand for corporate training within the U.S. and around the worldThis blog will discuss the driving forces shaping the European market of corporate training.

By Oleksii Vyshnyk • December 21, 2016

Driving Engagement With a Clear Purpose

from the Enterprise Learning blog

What is the End Goal?

The principles of adult learning are founded on the notion that as we age, having a purpose behind learning becomes much more important. When we’re young, we are more likely to accept that the future may yield an unforeseeable need for the information we’re absorbing. We believe in the need for a well-rounded education, even if we can’t see an immediate need for certain pieces of information.

By Leslie Holcroft • December 20, 2016

Global Trends: The Driving Forces of Corporate Training

from the Enterprise Learning blog

With the holidays right around the corner, spare time provides room for reflection not only on gift lists and vacation plans, but also to focus on today’s acute topics in the working environment. The global trends are clear. To evolve efforts into impact, corporate training is key to directing a workforce that is focused on achieving business objectives through learning and development.

By Oleksii Vyshnyk • December 19, 2016

The Neuroscience of How E-Learning Blends Into Our Brain

from the Enterprise Learning blog

There is a reason why 77 percent of American companies offer online corporate training to improve the job skills and professional development of their employees.

By Roz Bahrami • December 16, 2016

Emotional Intelligence: The Key to Effective Leadership

from the Enterprise Learning blog

In today’s hyperconnected work environment, organizations are continuing to expand, building a multicultural workforce spanning the global marketplace. In order to be successful and stay relevant and competitive, it is critical to develop emotionally intelligent leaders capable of producing bottom line results. 

By Shina Neo • December 15, 2016

5 Ways E-Learning Enables Effective Sales Training

from the Sales Enablement blog

Sales trainers are smart people. They know when something is broken, and if The Bridge Group is correct and sales reps are only meeting their quota half of the time, then something is very broken.  It is clear that sales kick off events, in-room presentations, and mandated day-long training sessions are not working for the 50 percent of today’s sales learners who are failing to meet quota. E-learning programs can fix many of the problems with sales training.

By Stephanie Hadley • December 14, 2016

Security Training Best Practices

from the Content Security blog

As we progress through the education system, we find ourselves honing in on topics or skills that we enjoy and excel at. This, in turn, leads us into our chosen careers and to organizations where each team member brings certain skill sets, experience and qualifications that all go towards shaping successful organizations.

While focusing on day-to-day work, in any environment, whether that is finance, marketing, creativity, sales or customer service, it is also important to be aware that knowledge on security and information is required across all departments, to ensure organizations are kept safe and secure.

By Chris Gibbs • December 13, 2016

How E-Learning is Key to Effective Leadership Development

from the Enterprise Learning blog

Developing effective leaders in today’s ultra-competitive work environment is key to running a successful organization. Great leaders have the power to influence and inspire others by establishing trustworthy relationships based on encouraging feedback and opinion. When employees feel like their voices are heard and taken into consideration, they are more likely to acquire a vested interest in a common goal, and have a sense of loyalty and pride in what they do.

By Shina Neo • December 12, 2016

7 Ways to Improve Engagement with E-Learning

from the Enterprise Learning blog

The old adage in business that “if you build it they will come” doesn't necessarily apply to e-learning courses.

By Roz Bahrami • December 9, 2016

Cybersecurity Challenges in a Millennial-Dominated Workforce

from the Content Security blog

As millennials take over the global workforce by leveraging learning technologies, digitizing business processes and transforming how business is conducted, it is important to recognize the cybersecurity implications and challenges that come along with today’s digital native and content sharing generation.

By Shina Neo • December 8, 2016

Sales Enablement Programs: The Secret to Loyal Sales Teams

from the Sales Enablement blog

Sales managers, especially B2B and technology sales executives, are fighting an uphill battle to recruit and retain their sales staff. In fact, according to Manpower's 2016 survey sales representatives are the third toughest role to fill for any organization. But, it turns out that more so than many other tools, effective sales enablement programs can play an outsized role in helping sales managers increase retention and job satisfaction amongst the sales team.

By Stephanie Hadley • December 7, 2016

E-Learning: Key to Effective Onboarding

from the Enterprise Learning blog

Most people remember their first day in a new workplace. Without a carefully elaborated onboarding process and approach, the first day can lead to frustration, if not despair.

By Oleksii Vyshnyk • December 6, 2016

How to Design an Effective E-Learning Course

from the Enterprise Learning blog

Most companies and organizations have created manuals and learning materials in the print format over the years.

By Roz Bahrami • December 2, 2016

Knowing Your Audience: Training Your Employees

from the Enterprise Learning blog

Not Everyone is Just Like You

By Leslie Holcroft • December 1, 2016

Big Data Requires Bigger Security Efforts

from the Content Security blog

A chief information security officer (CISO) at an organization with 50,000 employees is asked, “How many employees do you have helping you secure big data?”

By Stephanie Hadley • November 30, 2016

Artificial Intelligence: Transforming the L&D Industry

from the Enterprise Learning blog

Learning and development leaders are continuing to recognize the importance of investing in an adaptive learning strategy that is customizable to meet the needs of today’s modern learner. With that in mind, it is essential to gather and analyze learning data and behavior patterns to create a personalized learning experience and effective training program.

By Shina Neo • November 29, 2016

Benefits of Gamification in E-Learning

from the Enterprise Learning blog

If you want your employees to learn faster, engage more in their training, and retain what they are learning longer, consider building gamification elements into your e-learning programs.

By Roz Bahrami • November 28, 2016

Sales Enablement: One Too Many Cooks in the Kitchen?

from the Sales Enablement blog

Just in case you were hungry for a shamelessly tortured holiday sales analogy… here’s a quick Turkey-Day tidbit cooked up especially for my peers in organizations with new or evolving sales enablement functions –many of whom are hard at work right now setting the table for sales in 2017.

By Monifi Schlick • November 23, 2016

Learning at the Speed of Search: Set Up for Success

from the Enterprise Learning blog

In the third and final part of our series on “learning at the speed of search” we give practical advice for setting up successful search-based learning systems that support self-paced online training. Our first two posts focused on why search matters in learning, and the technical capabilities required for effective search-based programs.

By Stephanie Hadley • November 22, 2016

Millennials: Leadership Outside the Corner Office

from the Enterprise Learning blog

Millennials have secured themselves as a dominant workforce within a majority of businesses and it’s time for many to take high-level executive positions and occupy the corner office of a reputable company. Nevertheless, by benefiting from the gained experience in large companies and a variety of learning technologies available, millennials prefer to test deep waters of a particular industry with their own start-up vessels rather be circumscribed inside the glass cabin. In such circumstances, an important question arises in regards to determining millennial leadership styles without emphasis on senior positions at the company.

By Oleksii Vyshnyk • November 21, 2016

Sales Enablement’s True North is on the Ground

from the Sales Enablement blog

Just 10 years ago the term sales enablement would have drawn blank stares even from seasoned sales professionals and top business leaders. By contrast, a 2015 Forbes study affirms that today nearly 60 percent of companies with best-in class sales organizations boast a robust sales enablement function.

By Monifi Schlick • November 17, 2016

Learning at the Speed of Search: Technical Requirements for Content Delivery Solutions

from the Enterprise Learning blog

The previous blog in this series discussed why search is critical to effective online learning and development programs. According to a LinkedIn article, "the majority of LMS buyers cite ineffective search as the primary reason they’re looking for a new solution." This blog will discuss the key technical capabilities for search that L&D executives should look for when purchasing a content delivery solution.

By Awais Ahsan • November 17, 2016

Data-Driven Learning: Benefits of Big Data in E-Learning

from the Enterprise Learning blog

With the abundance of information we have at our fingertips, today’s digital native generation understands how leveraging learning technologies is key to promoting professional development and ensuring organizational success. Oftentimes, learning and development initiatives are designed, developed and delivered with minimal strategies in place on how to measure learning outcomes. As a result, businesses find it difficult to see a return on their training investment.

By Shina Neo • November 16, 2016

Learning at the Speed of Search: The Key to a Successful User Experience

from the Enterprise Learning blog

Learning and development organizations are increasingly moving away from instructor-led training (ILT) to online, on-demand training sessions, and replacing teachers with online knowledge portals, learning paths and strong search capabilities. This move makes learning more convenient for students, reduces training costs and empowers students to take control of their learning.

By Stephanie Hadley • November 14, 2016

Millennials: A Digital Native and Content-Sharing Generation

from the Enterprise Learning blog

With the influx of millennials in our workforce, successful organizations are leveraging learning technologies to meet the needs of today’s content sharing generation. The constant use of technologies and increase in social engagement with comments, likes and tweets, have dominated the way we consume information, interact with others and conduct business. Learning and development leaders are starting to recognize how critical social sharing and engagement is for organizational success.

By Shina Neo • November 14, 2016

Transform Enterprise Training by Leveraging Big Data

from the Enterprise Learning blog

In this digital age, learning and development leaders are continuing to recognize the importance of leveraging big data to better analyze and make decisions that impact business outcomes.

By Shina Neo • November 10, 2016

Online Training is a Competitive Advantage

from the Enterprise Learning blog

Every dollar spent on training results in ten times the investment in new products, services and upgrades by the client, according to research provided by veteran learning industry expert and current Content Raven executive, Tom Clancy. Quite simply, the more knowledge and education you provide to your clients, the more product they will buy from your organization. The more product that customers buy and use, the more loyal they become to your company.  In smart, B2B, enterprise organizations, the learning and development team has evolved from operational necessity to become a true competitive advantage and important brand ambassadors for the company.

By Stephanie Hadley • November 9, 2016

How Great Leaders Influence

from the Enterprise Learning blog

As people stand in line today to cast their vote for the next president of the United States, it is important to recognize what makes great leaders influential. Discussed in the previous blog, effective leaders, whether political or corporate, have the ability to empower, influence and inspire others. 

By Shina Neo • November 8, 2016

Security Critical for Enterprise Mobility Market

from the Content Security blog

Successful organizations understand the importance of leveraging different learning technologies to meet the growing demands of today’s tech-savvy workforce by providing instant access to information at the moment of need. The prevalence of smartphones and tablets has become an intrinsic part of our daily life, in terms of how we consume and process information. With the influx of millennials in the global marketplace learning at the speed of search, it is time, not only to provide just-in-time learning experiences, but also to create effective BYOD policies that promote efficiency, adaptability and security.

By Shina Neo • November 7, 2016

4 Characteristics of Great Leaders

from the Enterprise Learning blog

With Election Day right around the corner, we are continuing to analyze opposing opinions and perspectives on various issues, and determine the intrinsic leadership qualities we’d like to see in our next president. While there isn’t a standard, definitive list of key characteristics that make up an effective leader, great leaders, whether political or corporate, have the ability to influence and inspire others. 

By Shina Neo • November 4, 2016

Revolutionize Training with the Netflix Model

from the Enterprise Learning blog

Chances are pretty good that you tuned into Netflix in the last week – there are more than 81 million Netflix subscribers in the world and they view 10 billion hours of Netflix content per month. In a relatively short period of time, Netflix has changed the way audiences view and consume television and movies.  The same transformation is taking place in the learning and development industry as training moves away from classroom-based instructor-led training (ILT) to online, on demand, subscription-based models – just like Netflix.

By Stephanie Hadley • November 3, 2016

5 Tips to Incorporate Video in E-Learning

from the Enterprise Learning blog

With the influx of today’s millennial workforce in our digitally innovative marketplace, learning and development leaders have started to recognize and adopt video as a solution to communicate, engage and educate learners on a global scale. While video plays an important role within an enterprise organization and can be implemented at various stages including pre-boarding, onboarding, kickoffs, initial training, continued education and partner training, more specifically, video facilitates a self-paced, easily retainable learning experience. 

By Shina Neo • November 2, 2016

Engaging Your Audience: The “Gotta Catch 'Em All" Phenomenon

from the Enterprise Learning blog

When you think about the tattered, ancient textbooks kids have been bringing home from school for decades, it’s incredible the rate at which public institutions of education are spending money on technology lately. Schools are concerned about the ubiquity of technology creating even larger gaps between socioeconomic groups where those who have it are running miles ahead, while those who don’t are left farther and farther behind.

But it’s more than that; there is a belief that smartboards, iPads, chromebooks, etc., inherently drive engagement in learning. We see people everywhere unable to tear themselves away from the virtual world long enough to cross the street or have dinner with a friend, so we assume that it must be technology itself that is addictive. Unfortunately, this mindset leads to a lot of readily available technology that remains under-utilized or abused because professionals lack the training for how to maximize its potential.

By Leslie Holcroft • November 1, 2016

Ways to Improve Cybersecurity Awareness and Training

from the Content Security blog

With the increase in cybercrime focused on businesses, high-impact organizations are starting to recognize the importance of implementing cybersecurity awareness training programs to protect and secure their intellectual property. One-off cybersecurity training initiatives are not enough to prevent your organization from being a victim of cybercrime. Establishing BYOD policies, data loss prevention strategies and consistent, agile cybersecurity awareness training is critical to ensuring confidential data is difficult to obtain.

By Shina Neo • October 31, 2016

Key Features for a Successful Enterprise Video Training Platform

from the Enterprise Learning blog

The next-generation learning experience platform is the future of corporate training. As businesses continue to transition to a blended learning environment, video platforms have emerged as an effective and invaluable asset to enterprise training organizations.

By Shina Neo • October 27, 2016

Soft Skills Training Makes an Impact on Sales Success

from the Sales Enablement blog

We have all worked with sales people. Think about the last great sales person you worked with – the one that helped you make the right decision for your business. Chances are that person is engaging, committed and dependable. Most likely that rep has had soft skills training. Of course, the sales rep has also learned how to prospect, position the product, and negotiate. But those technical skills are not the skills that have made you a loyal customer. When it comes to being a successful salesperson, sales managers say that soft skills training matters most.

By Stephanie Hadley • October 26, 2016

Amazon Web Services Expands: Helping Students Find Cloud Careers

from the Enterprise Learning blog

Amazon is taking the next step in connecting businesses to their future employees.

By Shina Neo • October 24, 2016

The Human Element of E-Learning

from the Enterprise Learning blog

I have embraced many changes since I first dipped my toe into the world of software support and training back in 1996.

By Chris Gibbs • October 24, 2016

Implementing an Effective Enterprise Video Training Platform

from the Enterprise Learning blog

There is no doubt that a customizable enterprise secure video training platform is an invaluable tool for corporate training. As learning and development leaders continue to transition from instructor-led training to a blended learning approach, video training has proven to be consistently engaging and learner-centric, as opposed to the text-heavy traditional learning environment. 

By Shina Neo • October 21, 2016

On the Right Path With Learning Paths

from the Enterprise Learning blog

When you consider that companies spend more than $160 billion on training, yet employees retain only 10 percent of the information presented, you can see that a new model is needed. For many organizations learning paths are proving to be the answer.

By Stephanie Hadley • October 20, 2016

Cybersecurity Training Critical to Securing Intellectual Property

from the Enterprise Learning blog

Successful high-impact training organizations understand how paramount it is to implement effective cybersecurity training to protect confidential data and digital assets. Not only is it essential to establish data loss prevention strategies and BYOD policies, businesses need to design, develop and deliver a cybersecurity training program that’s relevant, applicable, retainable and up to date.

By Shina Neo • October 19, 2016

Tips for Succesful Onboarding: It’s Personal, Not Paperwork

from the Enterprise Learning blog

We all know someone who has had a very bad first day of work. In fact, research shows that almost 4 percent of employees quit their job on the first day! Employees who get off to a poor start with a new company are more likely to underperform, fail to meet goals and leave within the year. So a proper, and thorough welcome for the new employee is paramount. But successful onboarding programs go beyond the paperwork, computer setup and desk assignment that most companies dole out on the first day of a new job.

By Awais Ahsan • October 18, 2016

Benefits of Video in Enterprise Training Organizations

from the Enterprise Learning blog

Today’s millennial workforce is all about accessing relevant and applicable content. As enterprise training organizations continue to transition from instructor-led training to a blended learning experience, the need for more effective training methods is key to ensuring you deliver the right message, at the right time. Successful organizations recognize the importance of utilizing video in the corporate training environment due to its effectiveness and proven return on investment. 

By Shina Neo • October 17, 2016

How Video is Transforming Enterprise Training Organizations

from the Enterprise Learning blog

Historically, training meant sitting in a classroom listening to an instructor speak and watching a PowerPoint presentation for hours on end. Today’s workforce is starting to transition from the traditional instructor-led training (ILT) approach to a blended learning environment, a hybrid between ILT and virtual ILT, and paper-based to digital learning. 

By Shina Neo • October 14, 2016

The Tools Powering Mobile Learning Today

from the Enterprise Learning blog

Are you reading this on a smartphone? Chances are good that you are, as almost 70 percent of U.S. adults now have one. Mobile technology is ubiquitous. It has already changed the way we work, so of course it is also changing the way we train our workforce.

By Stephanie Hadley • October 13, 2016

Gone Phishing: Enterprise Targeted Cybersecurity Training

from the Content Security blog

Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy, there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable.  

By Shina Neo • October 12, 2016

How Gamification Works for Sales Enablement

from the Sales Enablement blog

We always hear that sales reps simply do not use the sale tools, content, and data sheets that are created to help them sell.  In fact, IDC says that as much as 80 percent of content goes unused by sales teams. One simple and effective way to fix this problem is gamification. Gamification uses quizzes, quests, leaderboards and prizes to encourage sales training and development.  

By Awais Ahsan • October 11, 2016

Mindfulness Training in a Millennial Age

from the Enterprise Learning blog

Today, we live in a world of constant connectivity. Texting and social media are at the tips of our fingers and one might suggest that technology is becoming detrimental to our mental health. We are experts at multitasking and accustomed to checking our phones several times an hour in fear if we don’t, we might miss something.

By Kristin Swarcheck • October 10, 2016

Social Selling: How to Win More Business on Social Media

from the Sales Enablement blog

Only 31 percent of organizations currently employ social selling tactics. This despite the fact according to Invesp, 78 percent of people report that a company’s social media efforts impact their purchases. There is a clear link between trusted, educational content delivered via social media, and sales success. So why aren’t more organizations taking advantage of the benefits of social selling?

By Stephanie Hadley • October 6, 2016

Why Your Enterprise Training Organization Should Be Unique

from the Enterprise Learning blog

Businesses in today’s competitive marketplace must identify what separates them from the many other companies that do what they do. Innovative learning technologies are changing the way business is done and creating an environment that demands an agile workforce. In order to stay ahead of the competition, it is critical to identify what specific values and characteristics set your organization apart from others.

By Shina Neo • October 5, 2016

3 Key Lessons Millennials Can Learn from Baby Boomers

from the Enterprise Learning blog

Compared to millennials, technology is typically not a baby boomer’s strong suit. But just because they may not necessarily be tech-savvy, to think baby boomers have nothing to offer millennials in terms of training, development and career growth would be quite short-sighted.

By Stephanie Hadley • October 4, 2016

How Mindfulness Training Impacts Employee Engagement & Retention

from the Enterprise Learning blog

This blog is the second in a three-part blog series discussing mindfulness leadership and training.

By Kristin Swarcheck • October 3, 2016

Inspection: Analyzing Business Outcomes in a Training Organization

from the Enterprise Learning blog

Training initiatives are not cheap, and oftentimes learning and development leaders fail to see a return on their training investment as a result of ineffective means of measuring business outcomes. 

By Shina Neo • September 30, 2016

4 Tips for Empowering Your Independent Workforce

from the Enterprise Learning blog

While Uber and Lyft are the poster children of the independent worker economy, a less buzzed about group of freelancers and consultants are changing the way B2B enterprises and Fortune 500 companies do business. In 2016 highly skilled, educated freelance contractors are making a big impact on business. Trainers and managers need to adapt their learning and development programs to get the most out of this unique workforce.  

By Awais Ahsan • September 29, 2016

High Impact Training Organizations Require Effective Execution

from the Enterprise Learning blog

Visionaries exist in every organization. They are the people who set business goals for the future and inspire people to make ideas a reality. Establishing business objectives, ensuring strategic alignment, and adopting the tools and best practices necessary to meet learner needs is crucial; however, only solid execution can enhance the learning experience, and achieve individual and organizational success.

By Shina Neo • September 28, 2016

4 Ways Learning Paths Combat Training Information Overload

from the Enterprise Learning blog

Did you know that 2.5 exabytes of data are produced each day? That is a hard number to comprehend, so consider this: Each day the equivalent of 250,000 Libraries of Congress are produced! This infographic from Northeastern University gives further perspective to the amount of data produced daily.  With so much noise coming at anyone at any time, it is very hard for the brain to identify and retain the most important information.

By Stephanie Hadley • September 27, 2016

Mindfulness Training Critical in Leadership Development

from the Enterprise Learning blog

As a busy leader today, you are barraged with interruptions and demands for your attention. Much of a typical leader’s workday is spent reacting to the influx of emails and calls, responding to customer and/or employee requests, and checking off a lengthy to-do list. To make matters worse, the need for a leader to make thoughtful decisions on demand despite the array of distractions adds to one’s pressure and stress.

By Kristin Swarcheck • September 26, 2016

Adaptive Learning: How to Offer What Your Audience Wants

from the Enterprise Learning blog

There’s no such thing as a one-size-fits-all training approach. Successful training initiatives are created and designed with the understanding that people learn in different ways, at different speeds, and it is necessary to meet those needs on an individual basis. 

By Shina Neo • September 23, 2016

5 Sales Coaching Tips From History’s Best Coaches

from the Sales Enablement blog

The great college basketball coach John Wooden once said, “A coach must never forget that he is a leader and not merely a person with authority.”

By Stephanie Hadley • September 22, 2016

Why Alignment is Critical for Your Training Organization

from the Enterprise Learning blog

As explained in the previous blog on the keys to running a successful training organization, the second blog in this series will discuss the first vowel in the "Vowels Equal Value" framework: alignment. Organizational alignment is the fundamental building block to individual and corporate success.

By Shina Neo • September 21, 2016

3 Sales Enablement Technologies That Get Results

from the Sales Enablement blog

Sales enablement is the people, information, data and technology helping more reps meet and exceed quota each quarter. It is a multi-disciplinary function at the intersection of sales coaching, training and content marketing in leading edge enterprises. And it is a current favorite of sales leaders.

By Awais Ahsan • September 20, 2016

Oracle Attempts to Compete With the Leader in Cloud Computing

from the Content Security blog

It’s a bold claim to make, but Larry Ellison, executive chairman and CTO at Oracle, is confident in what’s on the horizon for Oracle’s Cloud Platform. 

By Shina Neo • September 19, 2016

The Keys to Running a Successful Training Organization

from the Enterprise Learning blog

Today’s fast-paced hyperconnected work environment has revolutionized the corporate training industry. Successful training organizations realize the need to keep up with technological trends, maximize productivity and drive engagement in order to stay ahead of the competition. More specifically, these organizations have designed and developed learning cultures centered on business goals and values.

By Shina Neo • September 16, 2016

5 Things About Millennials Every Sales Leader Should Know

from the Sales Enablement blog

If you ask a sales leader to describe his millennial employees, you are likely to hear terms as diverse as entitled, flighty, ethical, and coachable. Likewise, training and enabling a sales team comprised of millennials is either remarkably rewarding or incredibly frustrating. But, there is one thing that is not up for debate: Millennials are taking over your salesforce. 

By Joe Moriarty • September 15, 2016

OpenText to Acquire Dell EMC’s Enterprise Content Division

from the Content Security blog

Only a few days after Dell and EMC finalized their merge to Dell Technologies Inc., OpenText Corporation, an Ontario-based enterprise information management company, announced it has entered into a definitive agreement to acquire Dell EMC’s Enterprise Content Division (ECD) including Documentum, InfoArchive and LEAP products, for $1.62 billion, according to a press release today. 

By Shina Neo • September 12, 2016

Google Acquires Apigee: API Critical for Cloud Computing

from the Content Security blog

Yesterday, Alphabet, Inc.’s Google announced its acquisition of San Jose-based cloud software company, Apigee, for $17.40 a share, valued roughly at $625 million.

By Shina Neo • September 9, 2016

Content Security: Preserving the Future of the Cloud

from the Content Security blog

It isn’t very often you witness major tech rivals band together to support a specific cause. However, when it comes to security and the right to defend their customers’ fundamental privacy rights, it becomes a collective mission.

By Shina Neo • September 8, 2016

4 Tips for Successful Employee Offboarding

from the Enterprise Learning blog

In a recent blog post for TrainingIndustry.com, we highlight four factors for successful offboarding.

By Awais Ahsan • August 5, 2016

What is Dynamic Watermarking?

from the Content Security blog

Sharing content is easy. Email and social media have made it simple to download, post and view content regularly. However, not all of the content that is viewed was supposed to be shared.

By Christy Laubach • July 26, 2016

The 3 Most Important Search Features for eLearning

from the Enterprise Learning blog

Self-paced eLearning has quickly become the preferred training method for corporations because it allows learners to consume content at their own pace and on their own time. Moving from instructor-led training (ILT) to self-paced learning comes with the additional benefits of saving paper and significantly reducing print costs.

However, the shift to digital content brings with it the need for a platform with robust search capabilities. It is estimated that on average workers spend 20% of their day searching for the right content, while those responsible for evaluating new LMS solutions say effective search capability is the most important requirement.  When learners are unable to easily and quickly find the right content, it inhibits their learning, which results in knowledge gaps, wasted time and an overall suboptimal user experience. With so much content and only a limited timeframe for training, being able to quickly find what they are looking for will save corporate training leaders and learners invaluable time and increase productivity. That requires search functionality that is built around efficiency and optimized for learning.

By Alexandra Levin • July 14, 2016

Enhancing Sales Enablement with The Power of Analytics

from the Sales Enablement blog

Tracking sales proposals is important to understanding prospects and their needs. Being able to track a prospect’s level of engagement on a proposal can help a salesperson prioritize the right prospects and waste less time on unqualified leads.

By Christy Laubach • June 29, 2016

Self-Paced Learning Creates Loyal Customers and Yields Financial Gains

from the Enterprise Learning blog

In a recent Training Industry blog post - “Self-Paced Learning Creates Loyals Customers and Yields Financial Gains - We look at how one company made a valuable switch to self-paced learning and note three keys to successful subscription-based self-paced learning.  

By Awais Ahsan • June 23, 2016

Fighting Movie Piracy with Video Watermarking

from the Content Security blog

A study from Columbia University stated that at least 45% of Americans actively pirate movies. As a result, the movie industry has lost a significant amount of revenue and control over its  intellectual property (IP).

When 70% of online users see nothing wrong with online piracy, video-makers and the film and television industries need to take extra steps to protect their content from being illegally downloaded.

By Christy Laubach • June 16, 2016

4 Ways to Improve Sales Enablement

from the Sales Enablement blog

Companies with top sales enablement strategies can see a 13.7% increase in deal size. It’s important to support sales and help provide them with the materials they need to close more deals. Follow these tips to improve sales enablement:

By Christy Laubach • June 14, 2016

How Corporate Trainers Save Paper & Reduce Print Costs

from the Enterprise Learning blog

When the average U.S. office worker prints about 10,000 sheets of copy paper each year, business costs quickly run up. In fact, studies show that wasteful printing can amount to $2,480 per employee each year. In order to save trees and reduce costs, workers and businesses  need to be smarter about their printing practices.

By Christy Laubach • May 20, 2016

10 Years Later: What L&D Can Learn from Khan Academy

from the Enterprise Learning blog

In a recent Training Industry blog post - “10 Years Later: What L&D Can Learn from Khan Academy” - I look back at how I used Khan Academy as a math teacher and highlight five tools and teaching methods that can be repurposed by Corporate Trainers and Learning and Development executives.

By Awais Ahsan • May 13, 2016

The Three New Rules of Sales Enablement: Just in Time, Situational, and Personalized

from the Sales Enablement blog

How do Learning & Development executives and sales training leaders ensure that sales executives in the field have access to the right corporate training material when they need it? With the right content, delivered at the right time, and in the right way.

By Stephanie Hadley • May 9, 2016

Lessons Learned from Apple’s DRM Protection Software

from the Content Security blog

Many video-streaming services have been trying various strategies to protect content and prevent users from illegally downloading and sharing videos. Apple has created their own DRM (digital rights management) solution to try to protect their video content called FairPlay. Unfortunately for Apple, users have figured out how to remove FairPlay putting all of Apple’s video content at risk.

By Christy Laubach • April 29, 2016

5 Tips to Improve Sales Training for B2B Sales Reps

from the Sales Enablement blog

Much of a company’s success relies on the performance of its sales reps. Training B2B sales reps helps improve productivity and leads  to more closed deals. To help sales reps retain more information from training sessions and improve  overall performance, here are some helpful tips:

By Christy Laubach • April 21, 2016

How to Keep Sales Proposals Out of Competitor Hands

from the Sales Enablement blog

When a prospect shows interest in a company and asks for a proposal, it’s an exciting time for the company. A possible sale for the company means another customer and more money to help the business continue to grow. When a company is at this stage with a prospect, there is a lot of hope that the deal will close, but there’s also the chance that a competitor could swoop in and steal the sale.

By Christy Laubach • April 15, 2016

Why Businesses Need an Enterprise YouTube

from the Enterprise Learning blog

When it comes to managing corporate videos, businesses  need a platform that can effectively communicate their message. YouTube is a popular video-sharing website that can host videos for free, but has some downfalls for businesses with sensitive or valuable information.  

By Christy Laubach • April 8, 2016

CEO Joe Moriarty Talks to Talon Storage about Global File Sharing in an Always-On World

from the Content Security blog
Content Raven CEO Joe Moriarty Talks to Talon Storage about Global File Sharing in an Always-On World
By Stephanie Hadley • March 17, 2016

4 Sales Training Metrics You Need to Measure

from the Sales Enablement blog
By Awais Ahsan • March 8, 2016

How to Make Corporate Training More Effective for Employees

from the Enterprise Learning blog

When the average attention span of an adult is about
8.25 seconds, it’s pretty impossible to ensure that all of your efforts to train people - employees, partners or even paying customers - -- will be successful. Developing a perfect training program is difficult, and with busy schedules and a multitude of distractions, training may not always stick. But since you are responsible for training folks, your success is determined by how much your students learn, and how successful that makes your company. 

Too often, the challenge rests with the training materials themselves, which get ignored by trainees. Make your materials more effective by following some of these tips:

By Joe Moriarty • November 20, 2015

The Need For Dynamic Watermarking In Today’s Hyper Content Creation Environment

from the Content Security blog

Content comes in many formats today, and distribution is as easy as clicking a “share this” button. But content is not always intended for wide distribution. Whether you want to promote your company and know who is getting the word out for you, or protect your files from prying eyes, watermarking is a simple way to do both. There are a couple of options when it comes to watermarking, so how do you decide what type of watermark is best to use when sending a file?

By Joe Moriarty • October 29, 2015

The Cardinals-Astros Hacking Scandal - Why Passwords Alone Aren't Enough

from the Content Security blog

Over the last month, we’ve been fascinated by this story of the St. Louis Cardinals being accused of hacking into the Houston Astros’ internal database of important, private information. The information consisted of classified discussions of player trades, scouting reports and other player information that the Astros organization did not want seen or leaked.

By Christy Laubach • July 20, 2015

The Easiest Way to Save Money and Protect Your Training Materials

from the Content Security blog

As we’re moving more and more to digital publishing, it seems many companies are still stuck on printing employee handbooks and confidential training materials. Some have cited security as the reason for not e-publishing materials.

By Christy Laubach • June 16, 2015

Email Open Rate Is a Useless Metric

from the Sales Enablement blog

Email is one of the best ways for companies to generate leads and is regarded by marketers as the most effective digital marketing strategy.  It’s an inexpensive way to reach tons of potential buyers and yields the best ROI of digital marketing efforts. On average, for every $1 spent on email, companies receive $44.25 in return.

By Christy Laubach • February 26, 2015

7 No-Brainer Reasons to Choose Digital Publishing for Your Next Masterpiece

from the Enterprise Learning blog

There’s something really spectacular about holding a physical book: being able to hold the weight of what you’re about to read, seeing the coffee stains and creases from all of the love the book received in the past and that wonderful feeling of accomplishment when you’re nearing the end of a book.

Ebook readers have some great features as well: being able to start reading a book as soon as you’ve picked it out, carrying numerous books on just one, slim ebook reader and having access to more books and reading materials than any book store could hold.

By Christy Laubach • February 16, 2015

3 Ways Storms like Juno Cause Serious Problems for Businesses

from the Content Security blog

Sitting at home under three over-stuffed blankets from Mom, warm drink in hand, staring at an unopened box of Pop-Tarts on the kitchen counter, I (like most of the Northeast) am in full winter storm mode. Thanks to Winter Storm Juno, yesterday looked to be a great day for some businesses. Grocery stores were packed, liquor stores had empty shelves and gas stations had piles of cars lined up for gas that wouldn’t be able to be legally used the next day. Today, snow removal services will be working all day and getting some pretty good money, but winter storms hit most businesses hard. Here are three ways that snow days can cause serious issues for businesses: 

By Christy Laubach • January 27, 2015

Hooking Leads and Closing Deals: What You Aren’t Tracking is Losing You Money

from the Sales Enablement blog

We collect an enormous amount of information about our leads before we even contact them. By using a service like HubSpot, we learn the pages of our website that our leads have seen, what forms they have submitted and what specific product or service interests them. We can see what company a lead works for, how large that company is and maybe even the lead’s most recent tweet.

By Christy Laubach • January 26, 2015

Taylor Swift is Asking for Music to be Pirated- Could be Prevented by Limiting Device Allowances

from the Content Security blog

Earlier this week, Taylor Swift pulled all of her music from the popular music-streaming service Spotify causing much distress for her fans. Though it hasn’t been confirmed why the music was removed, Swift made her opinion on free music streaming very clear in the Wall Street Journal:

“Music is art, and art is important and rare. Important, rare things are valuable. Valuable things should be paid for. It’s my opinion that music should not be free…”

By Christy Laubach • November 7, 2014

5 Spooky Cyber Security Stories of 2014

from the Content Security blog

It’s October which means you’ve been busy putting together costumes, setting up the fog machine and worrying about cyber security, right? 

By Christy Laubach • October 31, 2014

[SlideShare] Everyone Is Stealing Your Videos

from the Content Security blog

The majority of online users see nothing wrong with online piracy. The number of tutorials on how to download videos from sites that don’t allow its content to be downloaded is astounding on its own. Sharing your video means taking the risk that your work could be stolen.

By Christy Laubach • October 21, 2014

What The Snapchat Hack Can Teach Businesses About Cloud Security

from the Content Security blog

It has happened again. Snapchat’s data has been hacked exposing more than 200,000 photos that were sent through the social photo-sharing application. A third party application that allowed users to save photos sent through Snapchat was breached which led to the unfortunate data leak.

So how can this be a lesson to businesses? With the rise of cloud-based file sharing solutions, there comes a great risk that your confidential data is susceptible to being shared, altered or stolen. The Snapchat hack (aka “The Snappening”) comes as a warning to anyone sharing private information: you need to protect your valuable data.

By Christy Laubach • October 16, 2014

Is Cell Phone Encryption an Effective Defense Against Hackers?

from the Content Security blog


By Mike Peroni • August 19, 2014

Instant Integration with Google Drive is Here

from the Content Security blog

By Mike Peroni • August 6, 2014

Gauge Engagement Levels for Your Marketing Collateral

from the Sales Enablement blog

By Mike Peroni • July 30, 2014

Maschino Hudelson Reminds Financial Firms Why Laptop Encryption Software Is Critical

from the Content Security blog

In May of 2014, roughly 5,500 people who either worked at or were clients of Maschino, Hudelson & Associates (MHA) – an Oklahoma-based financial planning firm that helps businesses set up benefit programs for employees –received a distressing letter in the mail. The first paragraph was enough to leave any recipient feeling concerned.

By Mike Peroni • July 22, 2014

Content Raven for Dropbox is Here!

from the Content Security blog

By Mike Peroni • July 15, 2014

HIPAA IT Compliance: When Mobile Device Carelessness Causes a Costly Breach in Healthcare

from the Content Security blog
If 2014 is any indication of things to come in the healthcare industry, then mobile security will be a high priority moving forward. The Office of Civil Rights (OCR) division of The Department of Health and Human Services has sent a clear message that companies will face stiff penalties if they experience a data breach due to lax security policies in regards to mobile devices.
By Mike Peroni • July 7, 2014

Jay Z Elevator Video Raises Questions about Secure Video Streaming

from the Content Security blog
Video footage depicting the Jay Z and Solange elevator altercation attracted negative publicity to both the Carter/Knowles family and the Standard Hotel. However, while Jay Z and company have managed to put the incident behind them, the Standard Hotel’s lax internal security has drawn lots of questions that have gone unanswered.

What Happened?
In May, TMZ posted an iPhone video of an incident that occurred at the Standard Hotel in New York City. The video was recorded from the screen of the hotel’s security monitors and captured rapper Jay Z, Beyoncé Knowles, and R&B singer (and his sister-in-law) Solange Knowles in the middle of a physical altercation in a Standard Hotel elevator. Days later, the iPhone video was leaked to TMZ. From there, it became national headlines.

Video File Security in the Spotlight
The JayZ-Solange tape was sold by a Standard Hotel employee to TMZ for $250,000 and puts the issue of video file security workarounds square in the spotlight. Even if video files are shared “securely” via internal file sharing software, workarounds such as screen capturing can be used to capture sensitive company materials. In short, whether people are likely to receive a monetary reward or gain notoriety on social media sites, there is an incentive for people to share sensitive video content in an unauthorized manner. For anyone in charge of security at a company that maintains video files for revenue generating purposes, record keeping, employee training, or other purposes, this is a major concern.
By Mike Peroni • July 1, 2014

Maintaining File Security at the World Cup

from the Content Security blog

June 12th marked the start of the World Cup, which is being hosted in Brazil this year. Hordes of spirited soccer fans made the trek to South America to watch the games live and in person. Attendees can expect to sample some of the local delicacies, take part in a few adventures in Rio de Janeiro, São Paulo, Fortaleza and other host cities, while catching a few epic games of soccer (or as the Brazilians call it, futebol).

But it’s not all work and no play. Many people headed to Brazil while toting a tablet or smart phone to help with tackling work projects and emails between snapping selfies and reading local reviews to find the best place to grab a caipirinha.

So while the World Cup is a showcase for world-class athletes, it’s also predicted to be a showcase for world-class hackers wielding world-class security threats.

By Mike Peroni • June 23, 2014

What’s the difference between file sharing in the cloud and a content control app?

from the Content Security blog

Sharing files, videos and other content through the cloud is convenient, but it’s not without risks. Most file share services don’t provide the security features needed to keep your sensitive data and information private.

That’s where a content control app comes in.

By Mike Peroni • June 17, 2014

Snap-in DRM with an API: Much Easier Than You Think

from the Content Security blog

The Current State of File Security
The current state of file security is taking a hit as a result of cloud-based, consumer file sharing solutions and a growing trend towards BYOD work environments. As it stands, your organization’s IP and other sensitive data is anything but secure. You know it, and you know that the current system needs an upgrade.

Your company has a lot of employees, all using different devices to access company data at different times and places. If you’re the person in charge of keeping that data secure, this is obviously presenting a real challenge.

By Mike Peroni • June 3, 2014

Don’t Miss the Webinar! Snap-In DRM for Air-Tight File Security

from the Content Security blog

Your employees, contractors and vendors are using their smartphones, tablets and other personal devices to share and collaborate on all types of files – from PDFs, Word docs and videos, to PowerPoint decks filled with your company’s precious IP.

The BYOD trend is here and appears to only be moving in the direction of widespread adoption, so if you’re the person responsible for content security and secure file sharing at your organization – you definitely need to register for the June 11th webinar.

We’ll be discussing upcoming trends and challenges in the secure file sharing space at the enterprise level, as well as solutions built to integrate seamlessly into whatever workflows your customers and team members are already accustomed to using.

By Mike Peroni • June 2, 2014

Internal Leak Hits the New York Times

from the Content Security blog

On May 15, 2014, BuzzFeed published a story in its business section that spread like a wildfire across the internet. The headline read:

By Mike Peroni • May 21, 2014

Sharing Content in the Cloud? Firewalls & Anti-Spyware Aren’t Enough

from the Content Security blog

Consider owning a small restaurant, or a large corporate chain of restaurants, and having your reputation ruined as a result of a disgruntled employee leaking your recipes and food prep standards on the web.

What if you’re a writer, working on the final installment of a bestselling series, when someone manages to obtain the manuscript online and release it to the entire world, free of charge, months before the actual book is due to be in stores. That could represent a significant amount of sales.

Now imagine this type of scenario at the government level.

By Mike Peroni • May 20, 2014

Raiders the Topic of NFL Controversy – How a Content Control App Could Have Prevented It

from the Content Security blog

The Oakland Raiders are once again the topic of an NFL controversy, this time as a result of the organization’s cheerleader handbook being leaked to the press earlier this year.

The leak fueled a lawsuit filed a short time prior by 27-year-old rookie Raiderette Lacy T., who accused the team of violating California employment rights.

By Mike Peroni • May 12, 2014

Keeping Medical Records Secure During Care Transitions

from the Content Security blog

Although medical facilities have only the best intentions for the wellbeing of their patients, there are considerations beyond the physical care of the patient that need to be addressed by the healthcare industry.

The issue of privacy and security in regards to a patients’ personal identity and medical records, as well as their financial and insurance information, is an area that is often discussed in relation to HIPAA compliance.

By Mike Peroni • April 24, 2014

Making the Mortgage Refinance Process More Secure for Consumers

from the Content Security blog

While refinancing my home recently, I came to a concerning conclusion about the security of my personal and financial information. Whether it’s due to a lack of awareness about the security risks involved, or because the tasks associated with home finance are tedious and time-consuming, many people (myself included), often fail to ask important questions about security when working with mortgage brokers.

By Mike Peroni • March 18, 2014

3 Ways to Keep Dropbox Secure in the Legal Community

from the Content Security blog

As with any cloud storage platform, keeping Dropbox secure is extremely important. When lawyers back up client information, notes concerning cases and financial data, it’s critical that it remains safeguarded and out of the wrong hands. Otherwise, a leak can reveal sensitive data, compromise legal proceedings, and potentially damage a lawyer’s reputation. Here are some techniques for keeping Dropbox secure in the legal community.

By Mike Peroni • March 4, 2014

Three Information Security Factors to Consider When Selling Your Company

from the Content Security blog

Before the dawn of electronic data and cloud infrastructure, selling a company didn’t present a risk to information security . But in today’s world, the wealth of digital data that’s stored in the cloud can put a business owner at huge risk if the right precautions aren’t taken to protect that data.

Protecting Your Company and the Buyer

By Mike Peroni • February 10, 2014

3 Ways to Secure Your SharePoint Environment for Manufacturing

from the Content Security blog


Information leakage and data tampering are just two of the problems that can arise when exchanging content for manufacturing projects.

There is always the threat of viruses and malware that can wreak havoc on your network, but knowing how to secure your SharePoint environment is critical for safeguarding your organization’s proprietary and/or confidential manufacturing content.

By Mike Peroni • February 5, 2014

Tarantino’s Leaked Script Easily Preventable with Content Control App

from the Content Security blog

When a first draft of Quentin Tarantino’s The Hateful Eight script “turned up in inboxes all over Hollywood,” the director announced he would no longer be pursuing the project in its originally intended film format.

By Mike Peroni • January 30, 2014

5 Ways to Work Smarter in the New Year

from the Enterprise Learning blog

2014 is almost here – and that means it’s out with the old, and in with the new. If staying productive and happy at the same time is one of your goals (and why shouldn’t it be?), here are five ways to work smarter now and through the next year. See if you agree with our top tips.

  1. Be happy first.

If you think that being productive will make you happy, think again. Psychologist Shawn Achor’s work has been devoted to discovering how happiness affects human potential. As he explains in his hilarious TEDx talk, your external world has very little to do with your actual happiness. In fact, just 10% of your happiness is determined by outside factors. The rest comes from inside. When you’re happier, you’re naturally more productive – so focus on the feeling first.

By Joe Moriarty • January 14, 2014

How to Safely Share Manufacturing Intellectual Property

from the Content Security blog

There are several benefits of sharing manufacturing intellectual property via cloud computing. The ability to collaborate in real-time and increased efficiency are some of the first things that come to mind. However, the associated security risks put some company leaders on edge because they fear that business plans, inside secrets and other sensitive information may be intercepted. Accordingly, much effort has been placed on controlling who has access to this information. Here are some ways to safely share manufacturing intellectual property and prevent security breaches from occurring.

By Joe Moriarty • January 8, 2014

Cloud Security: A Next Gen Guide for Manufacturers

from the Content Security blog

As more and more manufacturers implement cloud computing into operations, protecting intellectual property rights through cloud security has become crucial. According to industry expert Cindy Jutras of MintJutras, “SaaS-based applications are 22% of all manufacturing and distribution software installed today, and will grow to 45% within ten years.” Here are some specific ways that cloud computing is being used and how next gen manufacturers are using cloud security to keep their intellectual property safe.

Areas of Operations

Collaborating on product design via a cloud platform is one way that manufacturers are streamlining the process of new product development. With multiple parties having access to the same real-time data, it’s easier and more convenient to share ideas and get products to market. If there are issues along the way, they can quickly be dealt with so that the overall progress isn’t hindered. This means that goals can be reached with less difficulty than in the past and products can be launched with fewer setbacks.

Another aspect of cloud computing that’s advantageous is the Business Intelligence and analytics that most platforms offer. Whether it’s comparing actual sales versus sales quotas or tracking the various channels of a marketing campaign, manufacturers have constant access to a wealth of data. This allows executives and managers to make highly educated decisions based on concrete evidence rather than mere speculation.

By Joe Moriarty • January 6, 2014

3 Ways to Create a Successful Mobile Center of Excellence

from the Enterprise Learning blog

One term that’s receiving more attention in an increasingly BYOD oriented world is mobile center of excellence (mCoE). This term is defined by Forrester Research as “a coordinating force majeure, comprising approximately 25 to 100 technology and business staff under the leadership of a senior executive and a supporting mobile architecture council.” Simply put, it’s a group of experts with the skills to provide mobile solutions and develop an efficient plan. Here is why companies need a mobile center of excellence and how to create one. 

The Advantages

A more streamlined workforce is perhaps the biggest benefit. When implementing mobile devices and apps, there is the potential for numerous setbacks. By having a group of tech savvy individuals that are dedicated solely to this type of technology, operations can more run smoothly and glitches should be minimal. These team members can devise the optimal solutions for their company, develop suitable apps and create an infrastructure that makes everyone’s life easier.

With many industries constantly evolving, a mobile center of excellence can keep up with this change and make the necessary adjustments. This puts a company in a position to stay perpetually ahead of the competition and ultimately thrive. On the other hand, lacking a central nucleus puts stress on the handful of employees responsible for tackling mobile issues, which can adversely affect a company’s overall productivity. If you’re interested in this concept, here are three ways to create a mCoE.  

By Joe Moriarty • December 27, 2013

Content Security: Keeping Information Safe During Mergers and Acquisitions

from the Content Security blog

In a digital age where more and more data is stored electronically in a Cloud-based infrastructure, content security has become a major concern. This is especially true when two companies are consolidated during a merger or acquisition. When M&As occur, there is a significant exchange of information that can create serious problems if it ends up in the wrong hands. Here are some specific reasons why it’s important to take adequate content security measures during M&As.

Financial Information Safety

Perhaps the biggest threat is the potential for customer and company financial information to be compromised. When two sets of data come together, there is always the potential for banking information and financial records to be leaked. This can have catastrophic consequences such as identity theft and fraudulent behavior that may take years to resolve. Besides the headaches and legal complications, it can also damage the reputations of the two companies involved. Long-term results can be a loss of customers or clients, less repeat business and overall lower brand equity.

By Joe Moriarty • December 12, 2013

M&A Security Risks: 3 Common Threats Associated with Mergers and Acquisitions

from the Content Security blog

Mergers and acquisitions have become more and more commonplace in our increasingly connected economy, and M&A security risks are an unfortunate part of the transition. When these threats are unaddressed, it can be problematic for both companies involved and sensitive information may be leaked. Here are three specific M&A security risks that companies should watch out for and take the proper steps to prevent.

By Joe Moriarty • December 10, 2013

Content Security Apps: How to Stay Safe with Content Raven During Mergers and Acquisitions

from the Content Security blog

With more and more mergers and acquisitions (M&As) taking place, there has been a growing need for content security apps. According to the Institute of Mergers, Acquisitions and Alliances, there were more than 35,000 worldwide M&As in 2013 alone. The problem is that keeping content safe is often overlooked and not addressed until it’s too late. Here are three ways that content security apps like Content Raven can keep the sensitive information of two companies safe throughout the period of transition.

1) Document Sharing Control

There is often a significant exchange of data in the form of documents during a merger. Whether it’s customer contact information, legal contracts or marketing materials, keeping documents protected from outside parties is extremely important. With Content Raven, you can choose exactly who sees what and how long each document can be viewed. If data may be compromised after a certain period of time, you can set it to expire after (x) number of days. You can also use watermarking for even more enhanced security.

By Joe Moriarty • December 9, 2013

The API Economy: 3 Ways Businesses Can Benefit

from the Content Security blog

The application programming interface or API economy is a term that’s becoming more and more common in today’s business world. HowStuffWorks defines it as a set of programming instructions and standards for accessing a Web-based software application or web tool. When companies release an API, they provide a simple way for developers to combine data from different sources and create web apps. Here are three advantages that the API economy can have for companies.  

1) Higher Traffic Volume  

When companies allow access to their API data, there are a lot of people who benefit. The developers benefit because they don’t have to create a completely new program, which saves them time and frustration from having to work out the kinks. By taking a working platform and modifying it, this streamlines the app development process. Customers benefit because the products they use work together with greater efficiency. 

Most importantly, the company that originally releases an API benefits because it will often receive significantly more traffic than they would otherwise. In fact, some of the most innovative and successful companies like Google, Facebook and Amazon are currently using this strategy. That’s why the API economy can be thought of as a symbiotic relationship for everyone involved. 

By Joe Moriarty • December 6, 2013

The Mobile Executive: 3 Technology Trends of 2013

from the Content Security blog

As technology becomes increasingly intertwined with business operations, it has led to the rise of the mobile executive. With the ability to streamline projects and communication, mobile technology is a definite game changer that has no signs of slowing down. In fact, a report from Forbes points out that, "81% of employees are currently using at least one device for business purposes.” Here are three mobile executive trends that are propelling companies into the future.

1) Enterprise Tablets

Regardless of the industry, using enterprise tablets for tasks like project collaboration, managing inventory and searching for customer information is becoming the norm. These implement a variety of applications that make it easier to coordinate the activities of team members. This technology should become even more sophisticated in the future and prevent unnecessary mistakes from being made. Whether a mobile executive is in the office or out in the field, enterprise tablets are making operations more efficient and helping to better oversee the workforce.  

By Joe Moriarty • December 5, 2013

Three of the Biggest Challenges for CIOs in 2014

from the Enterprise Learning blog
By Joe Moriarty • December 3, 2013

Save Money - Go Paperless with These 3 Options

from the Enterprise Learning blog
By Joe Moriarty • November 27, 2013

Snapchat, Secure Video and Content Raven

from the Content Security blog

I was at a networking event last night and told our elevator pitch to a number of folks.  Three people without prompting all said, “oh wow, you’re like Snapchat for Enterprise.”  It got me thinking about Snapchat and what we do.  I decided to do some research.

By Joe Moriarty • November 22, 2013

Three Essentials for a Successful E-Governance System

from the Enterprise Learning blog

Board members, executives and other professionals have seen the way they communicate and exchange information rapidly change in the last two decades. In person meetings and paper board books have been replaced with email chains, text messages and other online tools.

By Joe Moriarty • November 22, 2013

Can Board Portals Keep Your Board Information Secure?

from the Content Security blog
By Joe Moriarty • November 20, 2013

BYOD : Are Your Employees As Safe As They Assume They Are?

from the Content Security blog

Seventy percent of employees who have a smartphone or tablet use the device to check work email and perform other work-related tasks, a new Ovum study reports. The study, which was released in June of 2013, found that the numbers fly in the face of anti-BYOD (Bring Your Own Device) policies. Almost 30 percent of those using their phones for work-related tasks are violating an existing corporate BYOD policy. Even if you have an anti-BYOD policy in effect, your business could still be at risk.

By Joe Moriarty • November 14, 2013

Why Your District Needs a School BYOD Policy, and How to Do It Right

from the Content Security blog

Is bring your own device (BYOD) an acceptable choice for schools? For years, teachers and administrators have done their best to keep students' devices out of schools. But districts who decide to allow mobile phones and tablets into schools in conjunction with a BYOD policy find that it contributes to the school environment without introducing unnecessary risks.

By Joe Moriarty • November 7, 2013

How to Make the Cloud Safe for Corporate Information

from the Content Security blog

Are cloud based services the right place to store important company data? Google CIO Ben Fried is cautious – even though Google itself is a provider of several cloud technologies.

By Joe Moriarty • October 30, 2013

5 Ways To Hack Your Brain

from the Enterprise Learning blog

We all want to be more productive, but getting into the habit of sleeping eight hours each night to boost productivity isn't realistic for many of us. Here are five simple changes you can make to be more creative, productive and efficient each day.

By Joe Moriarty • October 22, 2013

What Makes A Great Start Up Culture?

from the Enterprise Learning blog

1338212 30238506 resized 600Fuelled by an exciting idea, the passion of a committed group and unrealized potential, working in a start up can be invigorating. But in order to survive, entrepreneurs need to find a way to keep the team involved and productive until the company begins to take off.

By Joe Moriarty • October 16, 2013

Is Your Regulated Data Really Safe?

from the Content Security blog

Protecting your company’s data is essential, but with the increase in mobile devices and mobile sharing it has sometimes taken the backburner to accessibility. Employees often download information to their smartphones or tablets without a thought about security. This can lead to data losses, breaches and leaks that can impact competitive advantages, technical capabilities and overall profitability.

By Joe Moriarty • October 9, 2013

5 Signs Your Smartphone Is Taking Over Your Life

from the Enterprise Learning blog

mobile securityMobile phones make life – and business – easier. But it can be far too easy for them to take over. That little glowing rectangle of information, entertainment and connection just too hard to resist…here’s how to tell if you’re hooked.

By Joe Moriarty • September 26, 2013

Should Your Company Embrace a BYOD or COPE model?

from the Enterprise Learning blog

With the consumerization of IT, and the rise in tablets for corporate use, many companies come to a decision making point – do we let employees use their own devices or invest in corporately owned devices?

By Joe Moriarty • September 24, 2013

Why CISOs must Evolve to Meet Increasing Security Demands

from the Content Security blog

In the days of early information security, large organizations were challenged to create and foster security roles to support multiple business functions. Initially, these roles were part of the IT department or added on to existing employee duties. However, it soon became clear as we entered the mid-90s that a dedicated role to information security was necessary.

By Joe Moriarty • September 19, 2013

The Technology Behind BYOD

from the Content Security blog

What does BYOD mean to your organization? That's a question that INC.com posed to several leaders in the BYOD/BYOA space - including our own Joe Moriarty, vice president of marketing for Content Raven.

By Christy Laubach • September 16, 2013

BYOD: How to Stay Safe with BYOD

from the Content Security blog

Bring Your Own Device (BYOD) policies are being increasingly adopted by small, medium, and even enterprise-level operations all over the world. According to a recent study by Cisco Systems, businesses lower their operating costs and raise productivity when they implement bring your own device policies—even when they don't leverage said policies as much as possible.

By Joe Moriarty • August 27, 2013

Is Social Media Making You More Productive?

from the Enterprise Learning blog

Do you think social media is a time suck? Think again. According to a recent recent study by data firm Evolv, participating on five or more social media networks could actually make you more productive than average.  Here’s the scoop.

By Joe Moriarty • August 20, 2013

3 Keys to Advanced PDFs

from the Content Security blog

PDFs have all but replaced paper when it comes to paperwork and inter-office educational materials. They've even taken a bite out of the printing market and are used as brochures, proposals, and other marketing collateral.

By Joe Moriarty • August 8, 2013

The Top 5 Mobile Apps for Summer Vacation 2013

from the Content Security blog

Let's face it: mobile devices are essential to our lives these days. And since most of us use our devices to keep up with our friends, local events, and even our own location during day-to-day life, it's a cinch that we need our devices on vacation even more!

By Joe Moriarty • July 23, 2013

How to Profit and Protect Yourself with Online Courses

from the Content Security blog

Online courses are a good way to make money from a product you already have: your knowledge. You don't have to be a teacher in order to sell an online course, either. There are all books, seminars, and yes, courses about courses that can teach you how to create, market, and profit from your own courses online.

By Joe Moriarty • July 18, 2013

Native App vs. HTML 5: What Should We Build?

from the Content Security blog

The proliferation of apps over the past few years has made it necessary for any business, no matter how big or how small, to offer apps. Building these apps is now easier than ever, but which options – HTML 5 or a native app – suit your needs best?

By Joe Moriarty • July 2, 2013

Productivity Tips from App Developers and Health Experts

from the Enterprise Learning blog

 Are you (or your co-workers or employees) feeling overwhelmed with tasks that are actually long projects? Many of us are, without even realizing it. Four productivity app designers focus on this and other sources of stress and productivity loss in an interview with PC Mag this month.

By Joe Moriarty • June 25, 2013

How Using Technology to Track Reading Benefits Schools, Students, and Businesses

from the Content Security blog

At one time, professors had to judge whether or not their students were reading based on “classroom detective work” such as attendance, performance on tests, or even facial expressions during class.

By Joe Moriarty • June 18, 2013

What is App Wrapping?

from the Content Security blog

App wrapping is a way to provide extra security to your software or mobile applications. You can use an “app wrap” to add further authentication, or to restrict an app or device from specific functions. 

By Joe Moriarty • June 11, 2013

Android vs iOS: The Battle Royale

from the Content Security blog

Which is the better operating system: Android or iOS? For many people, there is no hard and fast answer. Instead, each individual's answer tends to hinge around what is most important to them.

By Joe Moriarty • June 4, 2013

The Rise of the Enterprise App

from the Content Security blog

When online shopping first became a reality, there was a sudden and imperative need for software that would improve and provide security for online retailers and their customers. Enterprise applications are the natural progression of the evolution of this kind of software. 

By Joe Moriarty • May 28, 2013

Why Dropbox Falls Short as a Document Sharing Solution for Business

from the Content Security blog

Dropbox may be a fine tool for sharing documents and other files inside an organization (although on the other hand, maybe Dropbox isn't the best solution ). But how does it fare when you need to collaborate or otherwise share documents with third parties like consumers, contractors, other businesses, and other third parties? 

By Joe Moriarty • May 21, 2013

How Can Enterprises Protect Mobile Data Across Multiple Platforms & Devices?

from the Content Security blog

Unsecured content, documents, and other data on mobile devices can be a huge liability for any enterprise. It's no exaggeration to say that it can be at least as big a liability as an unsecured website or wireless network!

By Joe Moriarty • May 14, 2013

Designated Driver App for iPhone Review

from the Content Security blog

We trust that you have been using (and enjoying) some of the craft beer apps we reviewed recently. We've found a related app that we probably should have told you about  last time, that can help you after you've had fun finding your favorite (or new favorite) craft beers. It's called Designated Driver, and it will help you get home safely with a unique approach.

By Joe Moriarty • May 7, 2013

Securing Documents for Collaboration

from the Content Security blog

Who is responsible for document security in your office? With multiple people in charge of policy, implementation, and the handling of sensitive collaborative data, it can be difficult to know just who bears the burden of keeping collaborative data safe.

By Joe Moriarty • April 30, 2013

How Much Money Will a Lost Laptop Cost You

from the Content Security blog

In the now-infamous “Billion Dollar Lost Laptop Study,” industry giant Intel and independent research firm Ponemon Institute provided that the average cost of a stolen laptop came to over $49,000—and topped $56,000 if the device didn't include adequate safety measures (which the majority did not).

By Joe Moriarty • April 23, 2013

4 Craft Beer Mobile Apps that Make Your Fun More Fun

from the Content Security blog

I am a firm believer in the people. If given the truth, they can be depended upon to meet any national crisis. The great point is to bring them the real facts, and beer. - Abraham Lincoln 

By Joe Moriarty • April 17, 2013

Venture Beat: Ensuring papal-level secrecy … without the black smoke

from the Content Security blog

It’s incredible to witness the secrecy the papal conclave is able to maintain in an era of over-sharing, data breaches, social postings and texting addictions. No encryption, beyond what is captured in thousands of years of doctrine that forbids communication with the outside world and only provides updates via smoke signals – arguably more archaic than the carrier pigeon.

By Joe Moriarty • March 28, 2013

Content Analytics : Content Marketing Security

from the Content Security blog

From special reports and whitepapers to teleseminars and multi-part e-courses, content marketing has become the favored method of many successful businesses for snagging leads and sliding them successfully down the sales funnel.

By Joe Moriarty • March 26, 2013

Is Dropbox a Good Business Solution?

from the Content Security blog

Plenty of businesses use Dropbox as a sharing solution for important and sensitive documents. Most who do don't just keep the shared folders in-house―they use it for outsourcing and third-party collaborations as well.

By Joe Moriarty • March 19, 2013

CIOs: Who Is Putting Your Intellectual Property at Risk?

from the Content Security blog

Are you in danger of theft or damage to your intellectual property? Most business owners and executives believe they are not. But as the past two years have shown, even global giants like Google, Lockheed Martin, and Intel (via McAfee) have been successfully breached.

By Joe Moriarty • March 13, 2013

Are You Making these Small Business Cloud Security Mistakes?

from the Content Security blog

Over the past half decade or so, cloud computing has gone from an in-the-know buzzword, to a practical computing solution for small and large businesses in every industry. It allows even single-person startups the advantages of a basement full of processors and a full IT department at a mere fraction of the cost. It also allows for easy collaboration between employees and contractors across the globe. 

By Joe Moriarty • February 28, 2013

The IRS Man Cometh: Keeping Your Financials Secure in Tax Season

from the Content Security blog

As tax season approaches, many of us will be asked to share sensitive personal and financial information with accountants. In fact, independent contractors, freelancers and consultants typically have several W-2 forms to fill out, complete with social security numbers and other personal info, which requires that content be shared externally. And in an age of e-filing, more and more taxpayers are sending signed forms to their accountants over email with no guarantee of how those documents are used or stored once received.

By Ronald Matros • February 27, 2013

Don’t Let This Type of Content Security Breach Happen to You!

from the Content Security blog

Laptops and tablets are becoming common business devices – even in the healthcare field. But wherever that technology goes, personal and company information goes as well. The riskiness of this type of set up was underscored in a recent incident at the Lucile Packard Children’s Hospital at Stanford.

By Joe Moriarty • February 21, 2013

4 Things You Need to Consider About Your Workplace's BYOD Policy

from the Content Security blog

“Bring Your Own Device” (BYOD) is a practice that is increasingly becoming the norm in many offices. But just like any major change in the workplace, it helps to go consider important points about these changes, and set clear boundaries early in the process.

By Joe Moriarty • February 13, 2013

Data Loss Prevention Plans: How to Protect Data of All Types

from the Content Security blog

Data loss can happen at both large and small businesses and can occur more often than realized. While some data breaches are malicious, some are caused by employees. The latter may inadvertently leak important information in seemingly benign ways, like through email or a mobile device such as a USB.

By Joe Moriarty • January 30, 2013

Want To BYOD? Here Are Some Of The Best Tablets For Business, So Far

from the Enterprise Learning blog

TabletBoth the BYOD trend and tablet usage in the U.S. have grown at a dizzying rates. In fact, one in every four adults now owns a tablet, according to recent data from the Pew Research Center.  

By Joe Moriarty • January 22, 2013

5 Ways to Manage Mobile Data Protection

from the Content Security blog

Mobile devices, such as smartphones, tablets, and laptops have made everyone’s jobs increasingly efficient and convenient, but have also created opportunities for fraud and theft of critical information. The rapidly growing BYOD trend is requiring businesses to get serious about protecting their mobile data. The following control procedures can mitigate the risks and help protect the business when their data is made available on the web.

By Joe Moriarty • January 15, 2013

The 4 Biggest Challenges Facing CIOs in 2013

from the Enterprise Learning blog

For many, the New Year brings a clean slate and resolutions for marked improvements. For CIOs, the New Year may include those things from a personal standpoint, but from a business perspective, there are other challenges to concentrate on. Each of the following are the biggest, based on predicted trends in 2013. 

By Joe Moriarty • January 8, 2013

The Best Reading on BYOD

from the Content Security blog

The Bring Your Own Device movement is no longer a small consideration - it’s something your business needs to address. Fortunately, there is a lot of expertise being generated about the best way to deploy and manage BYOD in enterprises. From data ownership considerations to an industry survey, here’s the best reading this month on BYOD. 

By Joe Moriarty • January 3, 2013

Sports and Technology Roundup

from the Content Security blog

Is technology, particularly mobile technology being used in sports today? Absolutely! Professional sports teams are using mobile applications to help them improve player and team performance in a multitude of ways. Interaction between players and fans as well as fan statistics with social applications is also an important component of sports technology. 

By Joe Moriarty • December 27, 2012

Does Online Team Collaboration Lead to Security Threats?

from the Content Security blog

Does Online Team Collaboration Lead to Security Threats? 

According to a Forrester report titled The State of Collaboration Software Adoption, team collaboration software adoption rates for businesses increased by 15% from 2008 to 2009. This is an interesting fact considering it was a recessionary period!  

By Joe Moriarty • December 20, 2012

How to Create your Own BYOD Stipend Policy

from the Content Security blog

With increased use of BYOD (Bring Your Own Device) in the workplace, more organizations are eliminating their contracts and allowing their employees to use their own devices at work. For example, employees with a work-related cell phone needs can carry their own contracts and receive a stipend based on anticipated business use of their personal devices. 

By Joe Moriarty • December 13, 2012

Mobile Video is on the Rise: How to Protect Your Shared Videos

from the Content Security blog

Video sharing and delivery gaining tremendous popularity. Today, most people are well aware of the explosive growth in video traffic across the internet and particularly at the enterprise level. 

By Joe Moriarty • December 6, 2012

Is Cloud Document Management a Safe Solution for Enterprises?

from the Content Security blog

Cloud document management is very likely in your company's future, if not already. In a recent Association of Information and Image Management (AIIM) report by Doug Miles, called Content in the Cloud -- Making the Right Decision there were some astounding growth predictions made. The report stated that the number of companies using cloud and other Software as a Service applications will grow from 7% today, to 41% in three years, and eventually be 77% in six to eight years. That type of growth doesn't come without pains, however.

By Joe Moriarty • November 29, 2012

Cloud Document Management is a Necessity for High-Tech Manufacturing

from the Content Security blog

Business plans, sales forecasts, engineering data, strategic alliances, trade secrets, design documents and new product ideas are just a few critical pieces of cutting-edge data used in high-tech manufacturing industries. 

By Joe Moriarty • November 13, 2012

Secure Document Sharing – Managing Documents with Mobile Devices

from the Content Security blog

Not surprisingly, mobile data consumption has exploded in the last few years and has become an essential way of conducting business. According to a recent study from CTIA, American mobile users have consumed 1.1 trillion megabytes between July 2011 and June 2012. That’s a huge increase of 104 percent over last year’s 568 million megabytes. 

By Joe Moriarty • November 1, 2012

How to Minimize Healthcare Compliance Data Risks

from the Content Security blog

The healthcare industry is feeling more pressure on a federal level to establish and implement compliance plans. According to McKesson, there’s a seven dollar return for every one dollar that the federal government spends on fraud and abuse investigations and prosecutions, and state governments are seeing the same type of return. Finding and prosecuting healthcare fraud is a top priority. As a result, healthcare provider or medical establishment need to focus on staying compliant.

By Joe Moriarty • October 18, 2012

Must Read Big Data Articles – What is Big Data and How is It Used?

from the Enterprise Learning blog

Need the scoop on big data? Big data is one of the most important IT, security and marketing concepts to hit in the last five years. It transforms the way that organizations understand their customers, their competition and their results. Tying together data from multiple sources can create a complete picture that can help make decision making easier across the board.

By Joe Moriarty • October 9, 2012

Mobile Data Security : How Usage and Technology are Defining IT Policies

from the Content Security blog

Mobile devices are an essential mainstay for most major enterprises, and even mid-sized businesses. However, mobile devices aren’t always secure. They can be hacked, stolen or otherwise compromised – along with the data they contain. Smartphones and tablets can be the gateway to major data breaches, which can put an organization at risk for regulatory fines, damaged reputation, loss of revenue and more.

By Joe Moriarty • October 4, 2012

New Survey: Content Security Concerns are Preventing Widespread Embrace of Enterprise Mobile

from the Content Security blog

Enterprise level adoption of mobile technology has multiple benefits – but there are still some major data and content security issues to be dealt with before it can be embraced on a widespread level. According to a recent survey from Trend Micro, cloud document management and other cloud based data sharing practices are on the rise, but so are concurrent data security lapses. 

By Joe Moriarty • September 27, 2012

What's the Big Deal About Big Data?

from the Enterprise Learning blog

big data resized 600You can’t throw a stone without hitting the term “big data.” Corporations of all sizes are struggling to collect, analyze and make decisions based on the massive amounts of data that are being gathered each day from their consumer base. Although direct marketers have dealt with data for decades, technology is making it even easier to track content usage, website visitors, social mentions and more. Big data is not going away – it’s just getting bigger.

By Joe Moriarty • August 8, 2012

4 Ways to Use DVD Distribution for Your Enterprise

from the Enterprise Learning blog

DVDsPromotional videos have grown by leaps and bounds in the past several years – and online video seems to be the dominant way to distribute information. However, DVD distribution is still valuable and essential to promoting your company, educating your customers and engaging employees. Whether you want to increase your customer base, publicize your company’s goals or train off-site team members, secure DVD distribution can help.

By Joe Moriarty • June 14, 2012

3 Ways Mobile Has Forever Changed Business

from the Enterprise Learning blog

mobile security resized 600As recently as ten years ago, smartphones and tablets seemed like something straight out of science fiction. Now they are as important to people’s personal and business lives as coffee and sleep. Mobile devices have become main stream necessities – and as such, they change the way that we do business. Ericcson and Cisco estimates that there will be 50 billion connected devices by 2020.

By Joe Moriarty • May 21, 2012

eLearning Learning

Search Post

Have a topic idea?

Let Us Know