NH Learning Solutions Blog
What Every Business Should Know about the General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR), which will take effect on May 25, 2018, is the biggest overhaul of European Union (EU) data protection law in more than 20 years. It replaces the Data Protection Directive, which was adopted in 1995, and is designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy, and to reshape the way organizations across the region approach data privacy.
7 Skill Areas Required for a Digital Transformation
Digital Transformation (DX) is the application of digital technologies to improve the performance or reach of a business, and it will continue to be an important topic for companies across the globe. Executives in all industries are using digital advances, such as data analytics, mobility, social media, and smart embedded devices (IoT) to change customer relationships, internal processes, and value propositions.
The IT Skills Gap Infographic
With the incredibly fast pace of technology and innovation, it's not surprising that there's a significant IT skills gap. However, there are several ways that a skills gap can negatively impact a business, including low productivity and decreased profitability.
The IT Skills Gap & How You Can Respond
Essentially, a skills gap is a gap between what employers need their employees to do, and what those employees can actually do. If you've ever said something like, “Our organization desperately needs to migrate more infrastructure to the Cloud, but our IT staff lacks the knowledge to do so,” you're talking about a skills gap.
Top 20 Technical & Application Courses of 2017
The New Year is often a time when many businesses and their employees begin to think about ways to introduce formal learning solutions into their development plans. New Horizons offers a large selection of courses to help students further their knowledge and proficiency of software and other areas of technology.
In 2017 we provided almost 14,000 classes to students in all formats, including: Private Group Training, Instructor Led Training (ILT), and Online LIVE classes (OLL).
How to Improve Security within Your VMware Environment
Guest Author: Ryan Birk, Technical Instructor
Cybersecurity is at the forefront of everyone’s mind right now. However, there can be a lot of confusion when it comes to those with virtual servers: How can businesses be sure their data will be safe? Should more precautions be taken because these are virtual machines? The answers may surprise you.
6 Cybersecurity Precautions Companies Fail to Take
Guest Author: Shawn Stugart, Technical Instructor
The September 2017 Equifax breach is shaping up not only to be one of the largest in history (143 million private records exposed, or about 44 percent of US adults) but also the most potentially damaging since the data includes names, birth dates, Social Security numbers, and, in some cases, driver’s license and credit card numbers. In combination, this personally identifiable information could be used by identity thieves to open new lines of credit, apply for loans, file fraudulent tax returns, and more.
The NIST Cybersecurity Framework & Workforce Development
In May 2017, the US president issued an Executive Order for “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” which hold heads of executive departments and agencies (agency heads) accountable for managing cybersecurity risk to their enterprises.
How to Help Secure Windows Server
As more IT infrastructures become virtualized and migrate to public, private and hybrid cloud environments, cybersecurity has been a persistent concern. Taking assets off premises and entrusting them to third-party service providers always carries at least some degree of risk; the hardware and software that were once under your direct supervision are now someone else's responsibility. Although they are usually in good and experienced hands, you have to remain vigilant against the various possible cyberattacks against your critical servers, storage, networks and applications.
Top 7 Data Breaches of 2017
According to the 2017 Ponemon Cost of Data Breach Study, the global average cost of a data breach is $3.62 million. A data breach is the intentional or unintentional release of secure or confidential information to an untrusted environment. Other terms for data breach include: unintentional information disclosure, data leak, and data spill.
As threats continue to rise and evolve, understanding and managing cybersecurity risks have become top-of-mind for business and government leaders. Organizations across the world are adopting innovative technologies like cloud-enabled cybersecurity, big data analytics, and advanced authentication to reduce cyber-risks and improve cybersecurity programs. However, data breaches are harsh realities, especially to organizations that are left vulnerable.