From Apprentice to Advocate: A Personal Journey at the Uniting Women in Cyber Event
As a woman starting in the field of cybersecurity, I was thrilled to have the opportunity to attend a conference as an apprentice for the Aquia Accelerator program! I credit this program as the reason I can follow my dream of becoming a cybersecurity professional. This was my first time attending a cybersecurity conference, and I was […]
Reading Beyond the Stereotypes: An Insider Perspective
I have ADHD. For some, a diagnosis of a neurodivergent condition is a badge of honor. For others, this admission validates their feelings of deficiency. Over the years, I have had the opportunity to work with, manage, mentor, and learn from many women in professional roles who were climbing the corporate ladder and flourishing in […]
If You Think Cyber Compliance is Expensive, Try Non-Compliance
Cyber compliance is a hot topic in light of the new SEC rules going into effect at the end of this year. Many companies have waited to implement a program, but now is the time to focus and engage! How to Create a Program In Top Cyber News Magazine, the August 2022 issue, I discussed “Effective Cyber Compliance” and the […]
Reading Beyond the Stereotypes: Let’s Talk About Health
I am an ADHDer, not a person with attention deficit hyperactivity (ADHD). I am not a CPTSDer, but a person who thrives with complex post-traumatic stress disorder (CPTSD). What’s the difference? My neurodivergent brain wiring is an identity, not a mental health condition nor a neurological disability like dementia whereas neurodiverse includes all minds. I […]
Reading Beyond the Stereotypes: What is Neurodiversity?
Neurodiversity relates to the natural variations in the way that people think and act. Brain differences are also viewed as normal, rather than deficits. The neurodiversity term was originally coined by sociologist Judy Singer in the 1990s. Today, she has updated her definition as follows: “Neurodiversity is: – a state of nature to be respected, […]
7 Ways That PEOs Help Employers Manage Responsibilities to Employees
This article is an excerpt from a full blog on Insperity.com. Read the complete post here. Running a business while simultaneously managing employee issues can be a major challenge. However, a professional employer organization (PEO) can help alleviate employers’ responsibilities to employees – many of which employers find tedious and time-consuming – and focus on […]
How a Culture of HR Compliance Can Reduce Risk
This article is an excerpt from a full blog on Insperity.com. Read the complete post here. From a legal perspective, owning and operating a business is inherently risky. While it’s not possible to shield your business from every conceivable negative outcome, establishing a culture of HR compliance can protect your company from the most common […]
Inspire a Winning Team Culture Through Action, Not Just Words
Culture is the Heartbeat of an Organization Culture is often referred to as the heartbeat of an organization because it represents the collective beliefs, values, behaviors, and attitudes that permeate every aspect of a company’s underlying fabric. It shapes the organization’s identity, guides decision-making, and influences employee behaviors for better or for worse. A strong […]
The Most Common Mistakes to Avoid with EEOC Complaints
This article is an excerpt from a full blog on Insperity.com. Read the complete post here. A common threat faced by employers is an Equal Employment Opportunity Commission (EEOC) complaint. The top five EEOC complaints reported nationally are related to: They carry many risks for your business: Here’s how you can prevent EEOC complaints against […]
Let’s Talk Consent in Cyber Monitoring
When Chief Information Security Officers (CISO), or anyone in the technology and cybersecurity sector, hear the term “cyber monitoring,” they think the same thing. It brings to mind companies that are tracking internal systems to look for anomalies that occur in an internal system: things like visiting unauthorized websites or accessing confidential files. But in […]