BLOGSPOT atas

Wednesday, November 29, 2017

Need of the Hour: An Effective Cyber Security Leader

Need of the Hour: An Effective Cyber Security Leader


Cyber risks have taken center stage in the corporate world. It is estimated that more than 80 percent of organizations have now included cyber risk as one of the top five risks in their risk register. Cyber security has become a key concern for boards and executive leadership.

Recent surveys and research suggest that although visibility at the board level has increased, requisite organizational structures (to support cyber risk mitigation) are still lagging. I believe that is a result of a combination of factors:

1. Cyber security as a domain, being new, has no specific standard format to follow in terms of implementing structures and allocating responsibilities.
2. There is an inherent shortage of resources and the problem is more exacerbated at senior levels.
3. Depth of cyber security knowledge is lacking at the board level.

The apparent disconnect and gap in trust needs to be closed if the cyber threat is to be tackled effectively. Organizations must realize that, in order to have a mature cyber security posture, they need transformational leadership in their cyber security area.

An executive/manager in charge of cyber security in an organization has the unenviable task of influencing the board and the executive leadership group, as well as impacting the security culture across the organization. The cyber security leader does not necessarily need in-depth technical skills, but certainly needs dynamic leadership skills.

What are the skills required for cyber leadership?
If you are a board member/executive manager looking to hire a security manager or you are a security manager looking to rise to the challenge, in addition to technical understanding of security, I recommend focusing on getting/developing the following skills:

  • Great communicator and story teller: Only a great communicator can influence effectively at the board and executive level, as well as impact end users from various business units with varied amounts of technical knowledge.
  • High emotional intelligence: A highly developed emotional intelligence (EI) is needed to foster enduring internal relationships with peers, business unit leaders and technical staff. EI is a critical trait as it will influence collaboration, teamwork, crisis management and more.
  • Big-picture thinking (being able to see the forest through the trees): A security manager usually comes from a technical background, and technical engineers are very good at focusing on the minutiae which is necessary to solve technical problems. Security, on the other hand, is very much connected with being able to see the bigger picture and the context. Security leaders need to have big-picture thinking to be successful.
  • Business acumen: A security leader has a very important part to play in business planning, strategic planning, and ensuring that security and risk management are built into all business processes. Most importantly, the person needs to be able to frame security challenges into business opportunities. Ultimately, security leader need to balance dollars with risk.
  • Ability to lead cultural change: Organizational culture sets the tone, the framework and the operational context for security to operate. Implementing a mature security posture has a lot to do with successfully leading culture change in an organization. Ultimately, security leader must create a positive security culture.
  • Personal integrity: For the security leader, the foundation of success is built on how he/she can engender trust of various parts of the organization in the security processes and security programs being put in place. Trust starts with the security leader, and hence he/she must exhibit the greatest of personal integrity.
  • Execution/ability to get things done: Security leaders must be results-oriented. At the end of the day, soft skills are all good, but the security manager must have the ability to execute and complete tasks and projects successfully. Security leader must find ways to say "yes" to internal stakeholders and make security an enabler and not a roadblock.
  • Be a team-builder: Good leaders build good teams. The security leader needs to be a "servant leader" and build a team of specialists with multi-dimensional skillsets, attracting the best talent to the organization. Successful security programs need people with the right mix of talent, technical skills and interpersonal skills working as a cohesive unit.

===


Virus-free. www.avg.com

Tuesday, November 28, 2017

Uber Breach Reinforces Need to Rethink Enterprise Security Response


Uber Breach Reinforces Need to Rethink Enterprise Security Response

As if the personal data of more than 57 million customers and drivers being exposed is not bad enough, the timing and response to the recently exposed Uber breach is especially problematic.

Several studies on data breaches indicate that it can take up to nine months to identify and resolve a security incident. This is simply too long, and in the case of Uber, it took more than a year to disclose the massive breach.

It was easy for hackers simply exploiting the login credentials from a private GitHub coding site used by Uber software engineers, obtaining access to Amazon Web Services, to then discover information on Uber drivers and guests.

There are several things we as security professionals need to keep in mind in the aftermath of this and other major breaches we have seen in the past.

First, be honest. Everyone will get to know about a data breach sooner or later. And, you have an obligation to disclose the breach information to legal entities/authorities.

If we take the Uber case, according to GDPR (EU General Data Protection Regulation), Uber can face penalties of up to 4% of its annual turnover as of 25 May 2018. Think about Uber's turnover; I don't need to mention any numbers here!..

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=907

===

by Idham Azhari


Virus-free. www.avg.com

Monday, November 27, 2017

Ask a Resume Writer: Why Is My Resume Getting Picked Apart in Job Interviews?

Ask a Resume Writer: Why Is My Resume Getting Picked Apart in Job Interviews?

"I'm landing interviews with my resume but spend most of the time having to defend weaknesses. What's going on?"

The good news: Most job seekers vastly underestimate how much power their resume has in shaping the hiring process. How you're perceived, how difficult of an interview process you have, and yes, how big the initial offer is hugely dependent on what information you provide to an employer and how accurately you address their pain points.

The bad news: Most have no idea how to pull the right levers on the resume to make this happen. But you will.

Here are the big warning signs hiring managers pick up on and what to do instead...

https://www.cheatsheet.com/money-career/ask-resume-writer-why-is-my-resume-getting-picked-apart-in-job-interviews.html/?a=viewall

===

by Idham Azhari



Virus-free. www.avg.com

Friday, November 24, 2017

Five Areas to Consider When Testing Cyber Threat Intelligence Effectiveness

Five Areas to Consider When Testing Cyber Threat Intelligence Effectiveness

According to the ISACA State of Cyber Security 2017 research, 80% of respondents believe "it is either "likely" or "very likely" that they will be attacked in 2017." In 2018 and beyond, based on current risk trends to organizations from their infrastructure, employees, supply chain and external threat actors, this figure is unlikely to drop.

Cyber threat intelligence (CTI) plays an important role in an organization's defense-in-depth defense strategy often being leveraged by other cyber security functions, such as security event monitoring, incident response and forensic investigations.

To derive value from CTI, raw or processed data feeds must be analyzed and applied within the context of the organization to improve, among other capabilities, the ability to detect threats and respond to incidents.

Visibility into the design and operating effectiveness of CTI processes can provide some assurance to management and potentially support funding requests for further investment in this area. Based on that premise, below are five areas to consider when conducting a review of your organization's CTI capabilities...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=906

===

by Idham Azhari


Virus-free. www.avg.com

Thursday, November 23, 2017

13 Most Useless Job Skills Employers Don’t Want Anymore


13 Most Useless Job Skills Employers Don't Want Anymore

For millions of Americans, there's nothing more frightening than waking up one day and discovering you're redundant. You've suddenly become replaceable, and the world has moved on without you. What are you supposed to do? In all likelihood, you've invested many years in a specific career path. You've sunk tens of thousands into degrees and certificates. Perhaps you've even given up more lucrative jobs to chase a passion.

Then, in one fell swoop, the rug has been pulled out from under you. It's a scary thought. But for more and more people, it's becoming a reality. The jobs of today are not the jobs of tomorrow. And the job skills you needed yesterday are not the job skills you need today — or tomorrow...

https://www.cheatsheet.com/money-career/job-skills-employers-dont-want.html/?a=viewall

===

by Idham Azhari




Virus-free. www.avg.com

Wednesday, November 22, 2017

Five Mistakes to Avoid When Deploying Emerging Technology

Five Mistakes to Avoid When Deploying Emerging Technology



When I finished my proof-of-concept presentation to the CIO of a prospective client at a recent meeting, he was more than surprised – he was upset. He almost yelled at me: "How did you do it?"

For my demo, my client had to complete a paper application form used by his company's sales force. He needed to do this by hand, as would any customer, but using a digital pen equipped not only with an ordinary ink cartridge, but also with a micro-camera that captured each trace of the pen on the paper. When he had finished the application, he checked one box at the end of it that read "Transmit." While explaining the features of the digital pen, I opened my laptop and remotely connected to our demo server. From there, just a few seconds after he had completed the application, I could show to him not only a high-quality scan of the completed application, but also all the data already translated into usable fields: numbers, dates, addresses, ready for ERP integration. He stood up in astonishment and asked: "How did you do it? How??"

This appears to be a nice example of a presentation that went so well that I took my audience completely by surprise with an emerging, unexpectedly beautiful technology. But the truth is, less than two years after launching our work with digital writing, we had to completely write off two years of work and investment put in an offering that appeared to be "The Next Big Thing."

Talking about our digital transformation successes is always nice, but I would like to share these five innovation facts that, from my experience, should be understood to avoid failing in this era where all of us are at the brink of launching The Next Big Thing, whether on top of blockchain or IoT or AI or machine learning technologies...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=905

===

by Idham Azhari


Virus-free. www.avg.com

Tuesday, November 21, 2017

How To Plan For Your Next Job Before You’re Ready To Look For It

How To Plan For Your Next Job Before You're Ready To Look For It

You're just coming off that promotion you'd been angling for, and feeling great about the bump in pay, added responsibilities, bigger team, and the chance to make a deeper impact. You're still settling into the new position, so the last thing on your mind is your next role after that. But maybe it should be.

The point isn't to encourage paranoid, presumptuous, or premature action–it's just to make it clear that there are risks to not planning at least one step ahead, no matter what–as I've learned firsthand. A few years back, I was a rising star in a public company that was grooming me to succeed our chief people officer. I moved cross-country for a promotion that put me on the leadership career path I was excited about. My future at company was bright, so I focused single-mindedly on rising up the ranks there. That was my mistake..

https://www.fastcompany.com/40497833/how-to-plan-for-your-next-job-before-youre-ready-to-look-for-it

===

by Idham Azhari


Virus-free. www.avg.com

Advancing a Symbiotic Relationship Between COBIT, ISO Governance Standards

Advancing a Symbiotic Relationship Between COBIT, ISO Governance Standards


As a 2003 CISA recipient and a former honorary secretary of the ISACA Singapore Chapter's board of directors, I am honored to be selected as the ISACA liaison to the International Organization for Standardization (ISO) Technical Committee 309 – Governance of Organizations.

Having served nearly three years as the chair of the US Technical Advisory Group to ISO Project Committee 278 to help develop, draft and evangelize the ISO 37001 Anti-Bribery Management System Standard, I see this as a wonderful opportunity to not only keep both the ISACA and TC-309 communities informed of significant developments in the world of governance and compliance, but also to help shape and develop newly proposed ISO standards while supporting and strengthening existing ones...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=903

===

by Idham Azhari


Virus-free. www.avg.com

Friday, November 17, 2017

Getting Digital Transformation Right: The Fundamental Three

Getting Digital Transformation Right: The Fundamental Three

Emerging technologies – such as machine learning, artificial intelligence (AI), blockchain, Internet of Things (IoT), augmented reality, and 3-D printing – are swiftly disrupting several industries. To paraphrase Klaus Schwab, co-founder of the World Economic Forum, these mind-boggling innovations are redefining humanity, pushing the thresholds of lifespan, health, cognition, and capabilities in ways previously considered to be preserves of science fiction.

The possibilities presented by digital transformation are indeed captivating. The uses are as varied as the organizations putting them to use. Sensors attached to jet engines are transmitting signals mid-flight, enabling airlines to promptly detect sub-optimal performance and conduct pre-emptive maintenance, boosting safety and minimizing downtime. Physicians are replicating flesh and bones using 3-D technology to simulate high-risk surgical operations, lifting patients' confidence and shortening their anaesthesia durations. Meanwhile blockchain – an open source, distributed ledger of everything – is being used to develop self-executing contracts, eliminating record labels and enabling artists to interact directly with consumers, maximizing their ingenuity rewards...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=893

===

by Idham Azhari


--
Muhammad Idham Azhari / 0855-777-222-6
IT Consultant | Mentor Komunitas Bisnis Online & Internet Marketing SB1M
Konsultasi Gratis Bisnis Online & Internet Marketing via WA: 0855-777-222-6



Virus-free. www.avg.com

Wednesday, November 15, 2017

6 Red Flags You Should Pay Attention to in a Job Description

6 Red Flags You Should Pay Attention to in a Job Description

Searching for a new job, especially when finances are tight, can be a daunting task. As soon as you wake up, you head to your computer and frantically search for job postings. And each time you send out a resume, you say a prayer as if your life depended on it. When the phone rings, you pick up eagerly, hoping it's a hiring manager. Much to your dismay, it's usually just another bill collector calling to harass you about an unpaid debt. You keep explaining you'll get a job soon, and plead for another 30 days to pay your bill (if only it worked that way). The cycle continues each month and you're running out of money.

Unfortunately, your anxiety about finding work could cloud your judgment. Not paying close attention to a job description could cause you to accept a position at a job you end up hating. Even if you're desperate for work, it's important to read the job description closely. There are some red flags that could signal trouble down the road. Here are six key terms you should pay attention to in a job description. In some cases, certain words can tip you off about whether you're interviewing for the job from hell...

https://www.cheatsheet.com/money-career/red-flags-you-should-pay-attention-to-in-a-job-description.html/?a=viewall

===

by Idham Azhari


Virus-free. www.avg.com

Will Quantum Computing Break the Internet?

Will Quantum Computing Break the Internet?

"What could cause a digital Armageddon?" That is a popular question to pose to information and cyber security professionals, and when asked, I don't hesitate: Quantum computing.

While the principles of quantum computing are certainly complex, at a high level, the risk from quantum computing can be understood fairly quickly. Unlike a digital computer bit, which can only be a zero or one, a quantum bit, or qubit, can be a zero, one, and everything in between – all at the same time. For those who are not quantum physicists, this can be mind-blowing, but the result is that a quantum computer can offer such a huge speed-up to solving certain problems, that some problems previously thought to be nearly impossible to solve may soon be solved.

For instance, it isn't a question of if, but when, today's cryptography that protects the Internet will be broken. Some experts have said that this is likely to occur in the next 3-7 years – it's just a matter of having enough qubits, and it will likely take 100 to 300 qubits to fuel a quantum computer powerful enough to do this. Working quantum computers with fewer qubits already have been developed...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=901

===

by Idham Azhari


Virus-free. www.avg.com

Tuesday, November 14, 2017

5 Not-Exactly-Original Ideas That Became Massive Successes

5 Not-Exactly-Original Ideas That Became Massive Successes


Ask people what it takes to build a successful business, and many will probably tell you that the most important factor is having an original idea. The entrepreneurial narrative we're given is that someone has a groundbreaking, never-before-seen idea that solves some massive consumer problem, and then builds that idea into a large-scale, profitable enterprise...


===


Virus-free. www.avg.com

IoT Security and Privacy: Exploring Technology Solutions Aligned to Regulatory Needs

IoT Security and Privacy: Exploring Technology Solutions Aligned to Regulatory Needs

In my last post, I spoke about the Internet of Things (IoT) in terms of trust, security and privacy at a high level. Here, I will take a deeper dive in terms of how IoT security and privacy can impact an ecosystem interconnect.

When we talk about IoT, we think about the process we implement as we migrate to sensor-driven infrastructure for automated processes.

Looking at economies and technology ramp-up trends from a financial perspective, we will expect that there with be standardization around policies and processes, as well as implementing interfaces that are expected to connect sensors to networks, platforms, and application systems, or a combination of services...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=900

===

by Idham Azhari


Virus-free. www.avg.com

Monday, November 13, 2017

Ten Signs You're Headhunter Material -- And Ten Signs You're Not

Ten Signs You're Headhunter Material -- And Ten Signs You're Not

Here are three items to double check -- to make sure your LinkedIn profile is telling your story effectively:

1. Make sure the headline under your name matches the type of job you're interested in. Your headline is one of the most important parts of your LinkedIn profile!

2. Now, be sure the information you share with recruiters specifically describes the jobs you want, the pay range you're looking for and one or two examples of your success on the job...

https://www.forbes.com/sites/lizryan/2017/11/11/ten-signs-youre-headhunter-material-and-ten-signs-youre-not/2/#53b75ea6adcc

===

by Idham Azhari


Virus-free. www.avg.com

5 Ways to Grow and Build Trust

5 Ways to Grow and Build Trust

From your creditors to your employees, good business relationships are built on trust. Can the people who depend on you, confidently rely on you to treat them fairly? Once you have proven your dependability, they will make allowances for you and extend their level cooperation. This is essential to your business success.

How much will you save on loan interest with extended credit, easier terms and complementary warehousing? How much will you save on hiring and training by reducing turnover, engaging your people and having them go the extra mile for you? How much will you save on advertising with cooperative distributers, loyal consumers and customers who become advocates? The sooner you demonstrate your trustworthiness, the sooner you'll receive these benefits and more!..

https://www.entrepreneur.com/article/304411

===

by Idham Azhari


Virus-free. www.avg.com

Understand Ransomware Methodologies

Understand Ransomware Methodologies

Cyber security is now on the agenda in board rooms. The threats and risks in the cyberspace are significant enough to warrant the attention at the highest levels.

In 2017, those conversations often have focused on ransomware. This year, the global community has experienced a large number of incidents related to ransomware. Organizations are anxious to ensure that the necessary approach and countermeasures against ransomware are understood and implemented. Security professionals therefore need to update their knowledge on the subject...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=899

===

by Idham Azhari





Virus-free. www.avg.com

Thursday, November 9, 2017

My Boss Said 'If I Were You, I'd Start Job Hunting'

My Boss Said 'If I Were You, I'd Start Job Hunting'

Dear Liz,

I've had my job for three and a half years. Last Friday my boss "Dylan" came out of a management meeting and walked straight over to my desk.

He asked me to follow him into his office.

We got in there, he shut the door and he said "Carmen, you do a great job. I always tell you I couldn't do my job without you and it's true. However, there are going to be budget cuts. If I were you, I'd start job-hunting."..

https://www.forbes.com/sites/lizryan/2017/11/07/my-boss-said-if-i-were-you-id-start-job-hunting/#3f893bf91a20

===

by Idham Azhari



Virus-free. www.avg.com

As Smart Home Cyber Security Takes Center Stage, Practitioners Need to be Part of the Solution

As Smart Home Cyber Security Takes Center Stage, Practitioners Need to be Part of the Solution

Cyber security gets a lot of discussion in terms of small business, but what few outside of the industry know is that many cyber attacks actually take close much closer to home. In fact, thousands of attacks actually occur in the home. Part of the role of security practitioners moving forward can be to educate homeowners and help them protect their households with stronger, more secure solutions.

Hackers target home "security" systems
The entire objective of a home security system is to keep threats out of the home. A security system is designed to be both a deterrent and a defense mechanism. But while most security systems are focused on physical threats – like burglars – the rise of internet-connected systems has created an entirely new risk category. With some basic hacking strategies, cybercriminals can gain access to security cameras, disarm alarm systems, and prey on homeowners and their families.

SimpliSafe and other Internet-connected systems have proven to be able to be manipulated – something that most homeowners aren't aware of. It's the job of the security community to be part of the solution and help educate homeowners and customers on the risks, while providing them with specialized guidance that helps them select security systems that are actually secure...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=898

===

by Idham Azhari





Virus-free. www.avg.com

Wednesday, November 8, 2017

6 Reasons Why Employers Are Ignoring Your Resume

6 Reasons Why Employers Are Ignoring Your Resume

On the job hunt, you can do everything right and still come away empty handed. Finding a good, well-paying jobis one of the most stressful and difficult things you can do, and when you send in application after application without so much as an email or phone call in return, it can send you into a downward spiral. Is it your application? Your social media accountsPerhaps it's your cover letter or the resume you pieced together using one of those internet resume templates?

It can be anything — but if you want to get serious about getting the job and being noticed, start with your cover letter and curricula vitae.

These days, your CV needs to dazzle in a number of ways. You need to make sure it impresses a hiring manager, and ultimately, the people you'll be working under. It also needs to be able to make it past the original filtration programs many companies use. It can be very difficult, and small mistakes can mean your resume gets sent immediately to the trash..


===


Virus-free. www.avg.com

Measuring Cyber Resilience - A Rising Tide Raises All Ships

Measuring Cyber Resilience - A Rising Tide Raises All Ships

I admit it … I am one of the 143,000,000 people afflicted by the Equifax breach. For those of us who reside in the US, that number approaches 60% of all adults, based on recent numbers from the US Census Bureau. Perhaps most unsettling is that failing to perform something as routine as a timely patch produced an event so catastrophic that it cost the CISO, CIO and CEO their jobs. Make no mistake about it, accountability for cyber resilience is in the boardroom and rests heavy on the shoulders of those in the C-suite. This is accentuated by the data from a recently completed study by ISACA and MIT which overwhelmingly confirmed that CEOs and boards are leading enterprise digital technology initiatives.

Strong oversight of cyber security is now a critical component of organizations' overall governance of their information and technology, and on that front, there remains some steep hills to climb. ISACA's new Better Tech Governance is Better for Business research shows that only a little more than half of senior business leaders think their organization's leadership team and board are doing all that they can to safeguard the organization's digital assets, and less than half of boards intend to fund a significant expansion of their cyber defenses in the coming year, despite expanding attack surfaces and daily changes to the threat landscape...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=897

===






Virus-free. www.avg.com

Tuesday, November 7, 2017

6 signs that you should ‘nope’ right out of that job interview

6 signs that you should 'nope' right out of that job interview

There are a lot of articles covering things you should or should not do during a job interview. You should dress nice, answer questions confidently and have the right body language. You should not fidget with your pen, ask about vacation or compensation policy or even sit without being offered a chair.

Some are obviously more valid than others, you can't expect to make a good impression if you show up unshowered, put your feet on the interviewer's desk while lighting up a cigarette. But what about your interviewer? What are the signs that indicate that perhaps this isn't a very healthy company? Jobs are a two-way street; you want to contribute to a good company culture, but it might not always be there to begin with...


https://thenextweb.com/insider/2017/11/06/6-signs-that-you-should-nope-right-out-of-that-job-interview/

===


Virus-free. www.avg.com

Tips for Preparation and Success in the CGEIT Exam

Tips for Preparation and Success in the CGEIT Exam


I recently received my CGEIT exam result, with a final score of 557. It is not an elite score, but surpassed the required number of 450. I was happy with this result, and glad about my CGEIT learning journey.

For me, each autumn is a yearly planning and budget discussion season. It has become harder to balance all stakeholders' expectations and to keep pace with the fast-changing business landscape. Through CGEIT preparations, I could verify my perceptions, discover theoretical systems to support my ideas, and find more methods to convince others...

https://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=896

===

by Idham Azhari


Virus-free. www.avg.com

Monday, November 6, 2017

90 Percent of Hiring Managers Surveyed Say This Interview Skill Makes Job Candidates Irresistible

90 Percent of Hiring Managers Surveyed Say This Interview Skill Makes Job Candidates Irresistible

Do a Google search on "interviewing skills" and you'll get 526,000 results on anything from dress and hygiene, body language, story-telling, and questions to ask and not ask. For job seekers serious about upping their interview game, you need a clearer target.

What do you shoot for to really impress your hiring manager and get that offer? Well, plenty of data out there suggest different things, like, for example, "being interesting." ...


https://www.inc.com/marcel-schwantes/this-is-no-1-trait-hiring-managers-want-most-according-to-research.html

===


Virus-free. www.avg.com

Data Governance Is Becoming More Complicated – Enablers Can Help

Data Governance Is Becoming More Complicated – Enablers Can Help

Enterprises are becoming increasingly digital. Consider a bank that refers to itself as an information technology firm that happens to process financial transactions. Or, perhaps a manufacturer that likewise refers to itself as a technology company. The management of data is critical to all enterprises. 

A breach can cause enormous harm outside of the core business of the enterprise. Target had a significant data breach that caused the company material damage. Technology firms are obviously at risk. Witness the recent breach at Equifax – the repercussions of that event are still being measured...


===





Virus-free. www.avg.com

Friday, November 3, 2017

Linkedin HR exec: The 3 best ways to help you stand out in a job interview

Linkedin HR exec: The 3 best ways to help you stand out in a job interview

Companies go through thousands of applicants to find the perfect hire. With all this competition, it's important that you stand out to employers when it matters most: the interview...



Virus-free. www.avg.com

Thursday, November 2, 2017

Always avoid answering this question in a job interview


It pays to keep your mouth shut.

On Tuesday, New York City began its ban on employers asking prospective employees to share their previous salary. When Mayor Bill de Blasio signed the bill earlier this year, he noted that it's motivation was to achieve equal pay for equal work.

"The simple fact is that women and people of color are frequently paid less for the same work as their white, male counterparts," said de Blasio. "This Administration has taken bold steps to combat the forces of inequality that hold people back and this bill builds upon the progress we have made to close the pay gap and ensure everyone is treated with the respect they deserve." ...


http://nypost.com/2017/11/01/always-avoid-answering-this-question-in-a-job-interview/

===


Virus-free. www.avg.com

Windows File Server Versions – Are Functionality Changes Necessarily a Headache?

Windows File Server Versions – Are Functionality Changes Necessarily a Headache?


The security risk of running an unsupported version of Windows File Servers is not at the top of the IT topic debate list. Most will concur that enterprises electing to use an unsupported version of Windows may expose themselves to security vulnerabilities..


===


Virus-free. www.avg.com