Human Resources Knowledge Base

Knowledge Pad

Tagged: Security

SHRM-SIOP Role of Human Resources in Cyber Security

Posted on December 16, 2015 by F.A.I.T.H. Resources Human Resources · Security

This paper reviews what is known about effective cyber security training for end users of computer systems and offers suggestions about how human resource (HR) leaders can effectively implement this training. This includes a broad review of the cyber security policies and competencies that are the basis for training needs analysis, setting learning goals, and effective training design. Finally, the paper discusses opportunities for human resource (HR) practitioners, industrial and organizational (I-O) psychologists, and information technology (IT) specialists to integrate their skills and enhance the capabilities of organizations to counteract cyber security threats.

This whitepaper is brought to you by SHRM.org

Why you shouldn’t accept every LinkedIn connection invite

Posted on August 21, 2015 by F.A.I.T.H. Resources Information Technology · Hiring · Interview · Management · Security

Next time you receive an invitation to connect on LinkedIn from someone unfamiliar, think twice before you accept. This is not only sound advice, it’s part of LinkedIn’s official rules. Section 8.2 of the site’s user agreement specifies that members agree not to “invite people you do not know to join your network.” While Facebook and Twitter are great for broadcasting random thoughts and bragging about your private life to complete strangers, LinkedIn is designed to be personal and relevant to your professional life.

This article is brought to you by CIO.com

Use your browser to "leap" to our most visited web pages!

Southern California Salary Guide LinkedIn eBook Leap With Us Finance Jobs Accounting Jobs Information Technology Jobs Human Resources Jobs Consultant Bench The LEAP Report Knowledge Pad Leapro Mobile App