Competency Mapping – Roadmap for Workplace Success

According to Pattys Davis of Development Dimensions International (DDI), Jennifer Naughton of ATD (previously ASTD) and Bill Rothwell of Rothwell & Associates, “competencies encompass clusters of skills, knowledge, abilities, and behaviors required for people to succeed. In this case, it refers to success across jobs in workplace learning and performance.” Continue reading

Small Businesses Face Growing Security Threats

Fact: 43% of phishing attacks target small businesses; this represents a 25% increase since 2011.

News about cyber security breaches nearly always focuses on large-scale organizations, including major national retailers, banks, insurance companies and health care providers. In reality, however, small businesses are targeted by hackers everyday. While the smaller number of clients impacted means that the small business cyber security breaches may never become big news, combined, attacks on small business impact millions of Americans each year and worse yet, attacks on small businesses are currently on the rise. Continue reading

How to Foster the Learning Mindset

When it comes to training and development, most employers focus on immediate concerns—for example, ensuring their employees have the knowledge and skills needed to stay in compliance. Training and development, however, are about much more than ensuring employees can do the job at hand. On a broader level, training and development are about promoting what Dr. Carol Dweck, a Stanford University psychology professor and author of Mindset: The New Psychology of Success, calls the “learning mindset.”  Continue reading

How to Write a Training Outline: Putting it All Together

In the first two articles of this series on how to write a training outline, I covered the six steps you should follow to make sure your training is well organized and complete. In this final part of the series, I present how my leadership training outline might look as a fully developed training outline. Continue reading

How to Write a Training Outline: Steps 4-6

In the first article of this series about how to write a training outline, I explained how useful the process is in making sure your training sessions are well-organized and well-received. I covered the first three steps of the process, including training basics, defining objectives, and nailing down both the purpose of the training and how you’re going to engage participants from the start. In this second article of the series, I’ll cover the last three steps of the process: Clarifying key topics, related concepts and timing; presentation techniques and materials; and evaluation, assessment and reflection. Continue reading

How to Write a Training Outline: Steps 1-3

Training outlines are designed to help trainers organize their training to make sure they have properly outlined the objectives, modalities, methodologies feedback and end results they want to achieve from the training effort. Your training outlines can also help you figure out the all the resources including trainers, rooms, schedules or rotation and other systems you need to assemble to ensure you have a successful training session.

Continue reading

How Secure is Your Company’s Information?

You’ve no doubt seen at least one of several different versions of Microsoft’s recent cybercrime television commercials. In it you’ll hear a variation of these words: “Every day you read headlines about businesses being hacked and intellectual property being stolen. That is cybercrime, and it affects each and every one of us.” Behind those words are lot of startling statistics that should give every business reason enough to pause and consider just how secure their company’s information may be, and whether they should be doing more to protect it. Continue reading

Cyber Security: Top Concerns for U.S. Organizations

Fact: 53% of U.S. organizations plan to hire more cyber security professionals in 2016 but 59% of U.S. organizations report that when hiring new graduates for entry-level cybersecurity positions, it is difficult to identify who has an adequate level of skills and knowledge.

Fact: 82% of U.S. organizations report that they would be more likely to hire a cyber security job candidate who holds a performance-based certification (Source: 2016 Information Systems Audit and Control Association’s Cyber Security Survey).

Continue reading

5 Lessons from the MOOC Trend

It seems like only yesterday that everyone was talking about MOOCs. While MOOCs are no longer the latest craze in eLearning, they are still making waves. Some of the most interesting revelations about MOOCs, however, have to do with what MOOCs have revealed about learning, eLearning and workplace training more generally.  Continue reading

Cyber Security: Preventative Training

Fact: You or your business will probably get hacked at some point. Its not a question of if, it is a question of when and what you can/should do about this.

In today’s technology landscape, every business owner is responsible for securing some amount of data and every business owner is vulnerable to security breaches. Preventative cyber security training is essential, whether you’re a large insurance company, non-profit, or small family-owned construction business. To put the situation into perspective, consider the unusual situation of Gene and Lori Cate of Cate Machine & Welding–a small family-owned business located in Belleville, Wisconsin.   Continue reading