<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Working with executives Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/working-with-executives/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/working-with-executives/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 29 Jul 2014 06:00:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Working with executives Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/working-with-executives/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executives Give Clues Before Firing IT Firms</title>
		<link>https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Jul 2014 06:00:30 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firing IT Firms]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[Outsourced IT Firms]]></category>
		<category><![CDATA[Outsourcing IT]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Managing IT Professionals]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1935</guid>

					<description><![CDATA[<p>Not all top-level executives, owners, and other decision makers are pleased with their outsourced IT firm. What signs should a service provider notice? The Wall Street Journal released an enlightening article entitled “Six Subtle Signs You&#8217;re About to Lose Your Job &#8211; For Busy and Confident Executives, These Warnings Are Easy to Miss” by Joann [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/">Executives Give Clues Before Firing IT Firms</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Not all top-level executives, owners, and other decision makers are pleased with their outsourced IT firm. What signs should a service provider notice?<span id="more-1935"></span></p>
<p>The Wall Street Journal released an enlightening article entitled “<a href="http://online.wsj.com/news/article_email/six-subtle-signs-youre-about-to-lose-your-job-1405959180-lMyQjAxMTA0MDIwMjEyNDIyWj" title="Six Subtle Signs You're About to Lose Your Job - For Busy and Confident Executives, These Warnings Are Easy to Miss">Six Subtle Signs You&#8217;re About to Lose Your Job &#8211; For Busy and Confident Executives, These Warnings Are Easy to Miss</a>” by Joann S. Lublin.</p>
<p>Like executives, many outsourced IT firms are so incredibly busy that they do not catch the hints that they are about to lose a customer. </p>
<p>Many executives loathe considering the fallout of changing outsourced IT support companies. Sometimes they say, “I don’t want to fire our outsourced IT firm &#8211; it is so helpful that they’ve learned how our business works.” </p>
<p>Because outsourced IT firms have their finger on the jugular vein of your business, executives prefer to wait until the last possible moment, after making all the preparations, and sever the relationship without warning. </p>
<p>There are many wonderful outsourced IT firms out there. If you have one, keep them. </p>
<p>Technology is an essential component for most companies, and you must feel confident that you have excellent IT service providers. Moreover, most service providers want to be excellent. As Stephen Covey said, it is a win-win when your service providers exceed your expectations.</p>
<p>Next week, expect 3 questions to ask your service providers in order to see how well they are delivering.</p>
<p>Would you advise every executive you know to tell their outsourced IT firm what they do and do not appreciate about their experiences while working together?  Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/">Executives Give Clues Before Firing IT Firms</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You Don&#8217;t Care About Thinner Anymore</title>
		<link>https://fosterinstitute.com/you-dont-care-about-thinner-anymore/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Feb 2013 06:00:52 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[laptop]]></category>
		<category><![CDATA[Working with executives]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1569</guid>

					<description><![CDATA[<p>As the future becomes reality, what features will executives and workers demand? Users, including busy executives like you, know that laptops are now thin enough, fast enough, and lightweight enough. So, what do manufacturers have to improve in order to win your business? Recently I visited with one of the top engineers working with product [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/you-dont-care-about-thinner-anymore/">You Don&#8217;t Care About Thinner Anymore</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the future becomes reality, what features will executives and workers demand? Users, including busy executives like you, know that laptops are now thin enough, fast enough, and lightweight enough. So, what do manufacturers have to improve in order to win your business?<br />
<span id="more-1569"></span><br />
Recently I visited with one of the top engineers working with product design and development at Intel. It is interesting how much “Intel” has influenced all of our lives for decades.</p>
<p>He surprised me when he said that, once a laptop is 18mm thin, users don’t care about having a computer that is thinner than that. Today’s computers are “fast enough” to run applications (except for big servers&mdash;they will always need speed). Many applications “run in the cloud” anyway. Additionally the weight is light enough that other priorities take over. </p>
<p>“So what’s more important than thinness,” I asked.  He said there are three things that people want, in this order:</p>
<p><strong>First</strong>, and this is the big one, is battery life. Users want to maintain the same “thinness” and same light weight, and they want their computer to work for at least 12 hours without needing a charge. Basically, grab the computer in the morning, use it all day at your desk, around the office, at lunch, on a plane, in the hotel, etc. without ever needing to recharge. This might be working and/or playing. Writing letters,  working on email, using the Internet, watching videos, using social media, and perhaps even playing games&mdash;that is what users want to do all day.</p>
<p><strong>Second</strong>, the next lower priority, users want a better screen. This mimics televisions&mdash;people always want higher resolution with more vibrant colors. Sure this helps gamers, people who watch videos, and even business users who need the sharpest screens to reduce eye strain and improve the entire work experience.</p>
<p><strong>Third</strong> most important, beneath the other two, is “the radio.”  Users want to be able to connect their device to the many different flavors of Wi-Fi, have access 4G, and use other budding technologies in the future such as WiMAX which may be replaced by LTE.  In today’s world, “being connected” is what it is all about.</p>
<p>The post <a href="https://fosterinstitute.com/you-dont-care-about-thinner-anymore/">You Don&#8217;t Care About Thinner Anymore</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives, Be in the Know!</title>
		<link>https://fosterinstitute.com/executives-be-in-the-know/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 13 Dec 2012 06:00:18 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Relating to IT Professionals]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1511</guid>

					<description><![CDATA[<p>Executives: When you make decisions, make sure you fully understand the pros and cons of your decisions. If IT is asking for some new technology, how do you know if it is an IT “want” or a “need?” Many of our clients explain that sometimes a qualified independent third party is the best person to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-be-in-the-know/">Executives, Be in the Know!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Executives: When you make decisions, make sure you fully understand the pros and cons of your decisions. If IT is asking for some new technology, how do you know if it is an IT “want” or a “need?”<br />
<span id="more-1511"></span><br />
Many of our clients explain that sometimes a qualified independent third party is the best person to help them understand the ramifications, both positive and negative, of making decisions.</p>
<p>When an executive asks their own IT professionals or service providers for advice, the executive wonders if the IT professional has some kind of “agenda.” </p>
<p>When executives talk to their peers and get advice on technology, keep in mind that they may not fully understand how the same technology they tried can help or hurt your organization’s situation.  </p>
<p>A qualified independent third party has no “agenda” other than to help you. Most IT professionals, and even IT vendors, appreciate your choosing to seek advice from the qualified third party since then the IT professional doesn’t feel they have to “convince” you of necessary changes. </p>
<p>Most of the time top-level executives have 20/20 hindsight after security event or IT failure affects an organization. I hear questions like, “Why weren’t the IT professionals prepared&mdash;why didn’t they do something to protect us from something like this from happening?” Often the executives are very angry at their IT professionals. Wise ones know to go look in the mirror to see who to blame. </p>
<p>The post <a href="https://fosterinstitute.com/executives-be-in-the-know/">Executives, Be in the Know!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives, Grab the Reins of IT!</title>
		<link>https://fosterinstitute.com/executives-grab-the-reins-of-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 06 Dec 2012 06:00:10 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[professionals]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1507</guid>

					<description><![CDATA[<p>If you aren’t careful, your organization’s IT capabilities may fall behind your competitors. You may wonder what happened. Avoid being on the “bleeding edge” buying every technology as soon as it is released, but your IT advisors may be holding you back out of their own best interests. Take charge of IT. Many IT departments, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-grab-the-reins-of-it/">Executives, Grab the Reins of IT!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you aren’t careful, your organization’s IT capabilities may fall behind your competitors. You may wonder what happened. Avoid being on the “bleeding edge” buying every technology as soon as it is released, but your IT advisors may be holding you back out of their own best interests.<br />
<span id="more-1507"></span><br />
Take charge of IT. Many IT departments, including outsourced IT support companies, by nature, are focused on keeping systems up and running, on avoiding problems, and keeping your existing technology running. When you need to upgrade your IT systems, they generally try to stretch your existing technology grow with your business. </p>
<p>They will often avoid changes that involve making big changes in the way your IT systems function. They are already “too busy” with other tasks taking care of your system the way it is; even if your system is terribly out of date.</p>
<p>Often, IT professionals are more focused on tactics than on strategy. This is exacerbated when you reward them after they “fix” what is “broken.” </p>
<p>For example, workstation virtualization technologies might help your business tremendously&mdash;or not. It is sure worth finding out, and you may need to bring in a workstation virtualization specialist for the implementation.</p>
<p>Guess what else: IT professionals, at least the ones confident about their abilities, appreciate your taking an active role in making strategic decisions. Take the reins.</p>
<p>The post <a href="https://fosterinstitute.com/executives-grab-the-reins-of-it/">Executives, Grab the Reins of IT!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An executive&#8217;s three-step guide to securing Wi-Fi</title>
		<link>https://fosterinstitute.com/an-executives-three-step-guide-to-securing-wi-fi/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 31 May 2012 04:00:06 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[securing wi-fi]]></category>
		<category><![CDATA[wi-fi connection]]></category>
		<category><![CDATA[Working with executives]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1349</guid>

					<description><![CDATA[<p>The easiest way to secure your Wi-Fi connection in your home or office is to stop using Wi-Fi altogether. But what if you want to avoid the cords? First, if you have control over the wireless access point, meaning the access point is in your home or office, set the encryption to WPA2-AES (Not WEP [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/an-executives-three-step-guide-to-securing-wi-fi/">An executive&#8217;s three-step guide to securing Wi-Fi</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The easiest way to secure your Wi-Fi connection in your home or office is to stop using Wi-Fi altogether. But what if you want to avoid the cords?<br />
<span id="more-1349"></span><br />
First, if you have control over the wireless access point, meaning the access point is in your home or office, set the encryption to WPA2-AES (Not WEP or WPA&mdash;that is as long as all of your computers can support WPA2).</p>
<p>Second, use a long passphrase (known as a pre-shared key or PSK)&mdash;up to 64 characters. As of now, to discover your WPA2-AES passphrase, attackers will have to “brute force” your password&mdash;but they can make guesses 100,000 times every second. So use a long passphrase that makes no sense to anyone else but you. Don’t share the key with others. Attackers will trick people into giving away the passphrase. If you do share the passphrase with someone such as a guest, change the key when they leave. Your IT professionals can set up WPA2-Enterprise which is even more secure.</p>
<p>And third, hide your access point or, even better, lock it up so nobody can push the reset button to restore factory defaults.</p>
<p>There are other steps as well, but those will get you started and provide a great deal of security.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/an-executives-three-step-guide-to-securing-wi-fi/">An executive&#8217;s three-step guide to securing Wi-Fi</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be cautious about using the cloud</title>
		<link>https://fosterinstitute.com/cautious-about-the-cloud/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Dec 2011 04:00:57 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cloud service]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1116</guid>

					<description><![CDATA[<p>In the last blog post I talked about the big benefits of the cloud. What should you, as an executive, be on the lookout for? Sometimes one of your organization’s most important applications, such as your ERP, offers a cloud based solution. If you have your internal application customized to populate forms in your word [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cautious-about-the-cloud/">Be cautious about using the cloud</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the last blog post I talked about the <a href="/blog/cloud-benefits/">big benefits of the cloud</a>. What should you, as an executive, be on the lookout for?<br />
<span id="more-1116"></span><br />
Sometimes one of your organization’s most important applications, such as your ERP, offers a cloud based solution. If you have your internal application customized to populate forms in your word processing programs, etc., you may lose the ability to perform customizations if you move to the cloud.</p>
<p>The same with sharing data between your local applications. Moving one of your most important applications to the cloud may eliminate the ability to share data with your other applications.</p>
<p>It may be expensive to convert your systems to run in the cloud.</p>
<p>Using a cloud service just adds one more entity to the finger pointing game of “the hardware guy blames the software guy, who blames the cloud provider, who blames the Internet Service Provider” etc.</p>
<p>In the past, it was easy to define the perimeter of your network as existing at your firewall. Everything outside your firewall is “out there” and everything inside your firewall is “in here.” Utilizing cloud services for your private data blurs the delineation.</p>
<p>In the next blog post I’ll focus on the dangers of the cloud.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/cautious-about-the-cloud/">Be cautious about using the cloud</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Build a better firewall?</title>
		<link>https://fosterinstitute.com/better-firewall/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 10 Nov 2011 04:00:30 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[professionals]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1092</guid>

					<description><![CDATA[<p>Your IT professionals can protect you even more than they are now. In the experience of auditing, most organizations know to use a DMZ that functions as a buffer zone between your internal network and the public Internet. Sometimes it is even better to have a buffer zone in-between your local network and the DMZ. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/better-firewall/">Build a better firewall?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your IT professionals can protect you even more than they are now.<br />
<span id="more-1092"></span><br />
In the experience of auditing, most organizations know to use a DMZ that functions as a buffer zone between your internal network and the public Internet. </p>
<p>Sometimes it is even better to have a buffer zone in-between your local network and the DMZ. In other words, for traffic to get into your network, the traffic will have to get past at least three firewalls.</p>
<p>Since this blog post is directed towards an executive level audience, I’ll invite IT professionals to <a href="/contact-us/">contact me for more details</a>. And, for any of you who are interested, <a href="/pdf/network-zones-and-subnets.pdf" target="_blank" rel="noopener">click here to download a diagram</a> that provides both a clear visual and also the details you will find helpful.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/better-firewall/">Build a better firewall?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are live presentations best for Security Awareness Training?</title>
		<link>https://fosterinstitute.com/live-presentation-training/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 27 Oct 2011 04:00:02 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1073</guid>

					<description><![CDATA[<p>My last post covered Security Awareness Training via videos and/or internet. What about using a live presenter? Points about live training by a qualified presenter: Live “in person” presentations by a qualified presenter capture attendees&#8217; attention and will improve their security awareness dramatically more than attending a web meeting. It is easy for a qualified [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/live-presentation-training/">Are live presentations best for Security Awareness Training?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My last post covered <a href="/blog/video-training/">Security Awareness Training via videos and/or internet</a>. What about using a live presenter?<br />
<span id="more-2776"></span><br />
Points about live training by a qualified presenter:</p>
<ul>
<li>Live “in person” presentations by a qualified presenter capture attendees&#8217; attention and will improve their security awareness dramatically more than attending a web meeting.</li>
<li>It is easy for a qualified presenter to keep attendees’ undivided attention for 90 minutes and increase their security awareness significantly.</li>
<li>Qualified presenters know how to “read” the audience to know when to speed up or slow down, to use specific people’s names if that person starts to doze off since they were up all night with their newborn baby, etc.</li>
<li>Require your qualified presenter to use live demonstrations. Nothing can replace “seeing the process in action.”</li>
<li>Live presentations provide a unique opportunity for attendees to experience the reactions of their peers&mdash;and especially the reactions of the mangers they report to.</li>
<li>Live presentations make it easier for attendees to ask questions and have them answered immediately. Usually when one person asks a question, several other people had the question too, so they benefit from the answer as well.</li>
</ul>
<p>I’ve presented both online and in person many times. Experience has shown that in almost every case you will have a higher ROI with live training. ROI is measured based on feedback from my clients who say the live presentations dramatically increase user retention and they feel that retention provides the organization with increased protection against social engineering attacks.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/live-presentation-training/">Are live presentations best for Security Awareness Training?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is video best for Security Awareness Training?</title>
		<link>https://fosterinstitute.com/video-training/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 20 Oct 2011 04:00:23 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1064</guid>

					<description><![CDATA[<p>So you realize you need to require Security Awareness Training for everyone in your organization in order to help increase your IT security. What is the best way to deliver that training? Live training? Computer based learning? Videos? Points to remember about instruction delivered over videos and/or the Internet: Provide 60 minutes maximum to help [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/video-training/">Is video best for Security Awareness Training?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So you realize you need to require Security Awareness Training for everyone in your organization in order to help increase your IT security. What is the best way to deliver that training? Live training? Computer based learning? Videos?<br />
<span id="more-2775"></span><br />
Points to remember about instruction delivered over videos and/or the Internet:</p>
<ul>
<li>Provide 60 minutes maximum to help avoid losing attention.</li>
<li>You can lose attendees&#8217; attention before the meeting even starts.</li>
<li>Attendees may choose to multi-task during the presentation anyway.</li>
<li>If you have a qualified presenter, then videotaping a live presentation is generally better than recording a web meeting. Viewers often feel the presenter’s recorded presentation is more interesting than a web meeting.</li>
<li>Experience with other organizations strongly suggests that your ROI will be better via a live presentation. Users &#8220;get it.&#8221;</li>
<li>If you do choose to present a web meeting and/or video recorded live presentation, I suggest you notify the remote attendees ahead of time that they will be required to fill out an answer form (basically a test) afterwards. This may encourage them to pay even more attention during the presentation.</li>
</ul>
<p>Next time I will focus on using a live presenter as the delivery method.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/video-training/">Is video best for Security Awareness Training?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives&#8211;do you let your kids use computers?</title>
		<link>https://fosterinstitute.com/kids-use-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 31 Mar 2011 04:00:19 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Working with executives]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=911</guid>

					<description><![CDATA[<p>As a fairly new dad, I wonder how executives choose to handle all of the IT devices available&#8212;do you allow your kids to have them too? Do you ever tell your kids, &#8220;When I was young, pocket calculators with 15 keys were the latest gadgets?&#8221; Will our kids tell theirs, &#8220;When I was young, all [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/kids-use-computers/">Executives&#8211;do you let your kids use computers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As a fairly new dad, I wonder how executives choose to handle all of the IT devices available&mdash;do you allow your kids to have them too?<br />
<span id="more-911"></span><br />
Do you ever tell your kids, &#8220;When I was young, pocket calculators with 15 keys were the latest gadgets?&#8221;</p>
<p>Will our kids tell theirs, &#8220;When I was young, all we had were iPads and Blackberries?&#8221;</p>
<p>It is hard to imagine where technology will be in ten or fifteen years from now.</p>
<p>I&#8217;m happy I used calculators, and loved my TI-59C covered with buttons, but I feel reluctant to allow my kids to spend hours and hours using iPads.</p>
<p>As a teen, I learned the resistor color code, designed schematics, etched PC boards, and built fascinating gizmos using integrated circuit chips like the 555 timer. This technology may never be needed again!</p>
<p>Do you allow your kids to use computers and other electronic devices? If so, what limits do you set? Do you monitor their use?</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/kids-use-computers/">Executives&#8211;do you let your kids use computers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
