3 Hidden Threats to Corporate Training Programs

Hiddren Threats to your Corporate Training Program

3 Hidden Threats to Corporate Training Programs

Let me ask you a question. Are you conducting your corporate training through an e-learning channel, like Blackboard or Moodle? It’s funny. Companies know they need to train their employees on security protocol, but often they communicate that protocol in some rather un-secure ways.

According to a recent survey from Trustwave, a majority of companies have either no system in place or a partial system in place for monitoring and tracking their sensitive data.

Moreover, what we have found at eServe is that many companies are unaware of what kind of data they even need to protect! Is that you?

Think about it. Any training session you conduct for a new hire or seasoned employee would (and should) include data about your company’s processes, products, customers, strategies, goals and more. They are not just casual blogs or press releases – training materials contain proprietary data. That is data your competitors would love to have and that you should do everything in your power to keep from getting out!

You don’t have to be in a government agency or big tech firm to worry about this either. Whether your data is intentionally hacked or just mishandled, you would be surprised at who might be interested in using it to their advantage – or where it might end up. Corporate training leaders in every field – from medicine to the culinary arts- has company secrets to protect.

And it is often only after those secrets have become vulnerable that they realize what that information means in the wrong hands.

Here are 5 hidden threats to putting your training information online.

corporate training1. The Threat of Hacking to Corporate Training

Remember Julian Assange of Wikileaks? His goal was simple – expose the hypocrisy of the U.S. and other governments. As an expert computer programmer, he was able to achieve this goal. But you don’t have to be a political organization or nation to be threatened by a motivated hacker. You just need one company wanting to mirror your company and with the know-how to go after your information. Don’t let sticky fingers threaten your bottom line.

corporate training2. The Threat of Careless Employees to Corporate Training

I bet if you were to survey your staff members you would find that at least 50% (if not more) write their password down on a sticky note and attach it to their monitor. Or, maybe they forget it altogether and use the password of their cubicle mate or neighbor. But who’s to say their neighbor is privy to the same information they are?

Also, who’s to say that sticky note doesn’t end up in the wrong hands? Or, what if the slides you presented during a WebEx conference aren’t saved on a staff member’s laptop that was accidentally lost or left behind?
An employee does not have to be disgruntled to leave your proprietary information in the wrong hands.

They just have to be human. If you’re sharing any secure information with your staff, always keep that in mind.

corporate training3. The Threat of Upheaval to Corporate Training

Another e-learning threat has nothing to do with the exposure of data – in fact it is quite the opposite. For some industries, such as medicine or finance, the rapid dissemination of information is crucial to the success of their operations. Many times, it can literally mean life or death.

Think about it like this. What if a medical organization in Florida scheduled a seminar titled “Zika Virus: Our response to the Threat & Treating Pregnant Women.” In 2016, the Zika crisis was a real and urgent threat for South Florida families. Getting the right information in the hands of professionals who needed it most was an urgent concern. Similar situations would be training for security institutions that contract out to the TSA or other government bodies.

Updates and training sessions are often ad hoc and almost always must go on without a hitch. Any threat to the system these sessions are conducted on could mean putting people and possibly whole areas at risk.

No matter where you fall on this spectrum or which threat concerns you the most, there is a solutions! Always secure your training sessions. Avoid putting your valuable knowledge in the wrong hands by setting up the right security infrastructure and protocol from the get-go:

• Only allow registered invitees to join meetings
• Create specific passwords for each meeting rather than the same password for all your meetings
• Coach your trainers to choose wisely who they let in the training rooms
• Create rank-based permission levels (i.e., Tier 1, Tier 2 and Tier 3 access levels)
• Track and analyze who accesses your data (when, where and how long)

Want to gain greater peace of mind with your corporate training content? eServe is a content delivery platform that helps you empower your staff with the freedom to train and learn on their schedule, while also providing you with the power to protect that information.

In the digital age, both security and flexibility are key to mastering corporate e-learning and digital document management.


eServe - Digital Age of Enterprise Learning

Introducing the Digital Age of Enterprise Learning. Introducing eServe.

In the enigmatic words of Bob Dylan, “the times, they are a’changin’.”

The Internet has revolutionized the world in all spheres – from the way we communicate and shop to the way we learn and train. Thankfully, this has also opened up plethora of new avenues for education. With eLearning, Internet technology is being employed in a way that makes learning anywhere, anytime and at any speed.

Isn’t that such an exciting concept? No matter where you are at in the world or in the learning cycle, education can meet you where YOU are – not the other way around.

Also, while companies worldwide adapt and grow with e-learning applications, so do the applications and products themselves. There are tools to manage administration, automation, certification and micro-credentialing. Now, there are tools to manage content creation too!

Both the LMS and LCMS are enterprise wide-applications which enhance the flow of information from learning development teams to staff and new learners worldwide.

On that note, we are exciting to announce the development of our very own LCMS (Learning Content Management System). While the LMS (Learning Management System) manages people, the LCMS is a platform manages the content they consume.

And just like the flexibility of the LMS, the LCMS works anywhere, any time and at any speed – allowing you to cater the content to YOUR organization’s needs, rather than the other way around.

Want to know more?

Watch this introductory video to eServe – a tool designed to bring enterprise learning into the digital age.

Spies, UNsecured

The Pitfalls of Unsecured Digital Documents

Over the last few years, I have seen dozens of conversations in professional training forums about digital content delivery strategies, including what formats are most effective, what is required to deliver them, and how these digital formats can be securely encrypted.

Questions like:

Is there any value in a do-it-yourself solution to remix existing third-party material and custom content for delivery to any tablet or mobile device?

What are the benefits of timed content delivery?

I’m researching delivery options for a new learning curriculum. Can anyone share any lessons learned on different delivery models?

Is there content that can be taught most effectively only through a certain medium, such as elearning using mixed digital content vs. traditional classroom training, for instance?

While training professionals should understand these issues and create learning experiences in appropriate mediums, delivery considerations often distract them from what they most need to focus on: creating the content. While many enterprise companies have brought this function in house, small and mid-sized businesses are often without a reliable solution and are winging it. These companies often create simple, easily broken password-protected PDFs and call it a day, leaving their intellectual property up for grabs by their competitors.

When asked about these practices, my colleagues share stories that would give the company legal department pause. If your company’s content and people are what gives you the market edge, why would you leave your playbook in the other team’s locker room? The main response is about time and money. When there are so many options to consider- from ebooks formats and timed- access, to print and sharing considerations, many training professionals don’t have time to wade through the options and develop an organizational strategy.

If the resource isn’t in house, and your company values content security, it makes sense to find a partner who can help you develop an approach to content delivery and security, doesn’t it?  What’s your strategy?

Topics: Secure Content

Twitter: @Docuserve

Facebook: @Docuserve