1-866-245-5224 info@globallearningsystems.com
Wed, August 23, 2017 Twitter LinkedIn

Compliance Training Blog

Security is everyone's responsibility

GLS a Finalist in Network Products Guide’s 2014 Best Product Awards

I am excited to announce that our Security Awareness Training Program has been named a finalist in the 2014 Best Products Awards by Network Products Guide. This announcement comes just a month after we won Gold for this program in the Info Security Products Guide Awards.

While the Security Awareness Training program is a finalist in the  are also a finalist in the Training, Awareness and Educational Programs category, we are also a finalist in the Cloud Computing/SaaS category for our OnDemand Learning Management System (LMS).

We are excited to be a part of these industry awards, and we thank our customers for their continued support. We continue to update our platform and courses to provide the best training for organizations across the globe.

For more information check out our news release here.


Identity Theft hit 13.1 million in 2013-Americans becoming victims every two seconds- Stay Protected

Security Awareness Alert

Identity theft continues to be a global threat for every individual, and protecting personal information is a vital component for security awareness. In 2013 there were 13.1 million victims of identity theft according to a report done by Javelin Strategy & Research. This is an increase of 500,000 from 2012. Furthermore, in America, every two seconds an individual becomes a victim of identity theft (source).

Identity theft transpires when someone uses your personal information to perpetrate a fraud or carry out other illegal activity. Attackers gather information from various venues, using many tactics to lure information directly from individuals. You need to perceive this security threat, implement safety best practices and limit the disclosure of personally identifiable information.

Where do attackers gather the information for Identity Theft?

Attackers locate information from a variety of sources, and this list provides examples to be aware of:

  • Unsecured documents: Always make sure any paperwork with your information is locked up and secured. Limit the information you provide on medical, financial and other paperwork to the required amount. Even though an organization is requesting your information, it isn’t always required (for example a specific identification number such as a social security number). If you wonder why the organization would need such information, ask them what the purpose is before offering it. Verify that these documents will be stored securely and only be used for the purposes stated.
  • Discarded documents: Always shred documents with any personal or professional information on them.
  • Email and Other Online Accounts: Password secure, changing the password regularly, all of your accounts with any personal or organizational information.
  • Social Media: Always set your social sites to “private” (only approved friends can view your information) and always require authentication of those following you. Do not list personal information in your profile such as your anniversary date, birthdate, childrens’ names, or nicknames.
  • Mobile Device Breaches: Lock all mobile devices and require password authentication every time you want to check email, professional information, social sites and more.

For more information on Security Awareness Training and educating your workforce on best practices, click here.


Phishing Scam Posing as ?Google Doc Sharing?

2. Request of Login Credentials
Phishing emails usually request login credentials, personal information, or organizational information.

3. Assurance of Security
To say “it is a secure Link” sounds a little “phishy” to me. I would hope if my true friend was sending me a link, they wouldn’t have to mention that it is secure.

4. Hovering over the link
When you hover over the link in your email, you will be able to check the legitimacy of the URL source.

5. Checking the displayed URL in the bottom left corner of your browser
Once you hover over the link, you will see the source URL displayed at the bottom left corner of your screen in a tan box. Now knowing that this URL is not relevant, do not click through.

6. If you happen to click through (which you shouldn’t), you can see the URL at the top before ever following through on the request

As you can see in the below image, when you click through the link in the email to the webpage, you will notice the URL is not relevant to Google Docs. Never share information in such a situation. If you see this page, you went too far. You shouldn’t have clicked on the URL in the email in the first place.

In conclusion, never assume an email from your co-worker, classmate, friend or family member is legitimate. Attackers pose as trusted contacts, use claims that seem relevant (like sharing documents) and find ways to capture your information.

If you feel the email was meant for you, don’t click the link. Instead, reply to your friend (not by hitting the reply to the email button but by composing a new email in a separate tab, manually entering in the trusted contact’s email address) and ask if the email was intended for you and the purpose of the link.

For more information on Anti-Phishing Training for your organization click here.


Make eLearning Relevant for the Rapidly Changing Global Enterprise

No one would argue that the learning industry is experiencing rapid change, but how do we find a place for self-paced/asynchronous eLearning courses in today’s workforce? Our team recently did a presentation titled “Making eLearning Relevant for the Rapidly Changing Global Enterprise,” and this blog will focus on a few of the key points. For the entire PowerPoint presentation, fill out the form below and we will send the slides your way.


1. First, are you a learning organization? The ah-ha moment that is gradually spreading throughout organizations is that learning is not a single intervention, learning is now recognized as a continuous, lifelong experience woven into our daily work (and life) experience.

The effect of mainstream acceptance of continuous learning  has changed our business drastically. Even as recently as three years ago, a typical customer engagement would be for  6 months and at the end of that 6 months we had produced a single 3 hour elearning course, which was released as the final solution.

Today, however, we enter a partnership with our clients that starts with a 1-2 year learning plan that generally includes a series of short modules to be developed and released throughout the year. Along with the eLearning are supporting knowledge products such as  articles, YouTube videos, webinars, collaborative p2p sharing spaces, etc. Depending on the client and training goal, we develop some or all of  these additional elements, so the work is more collaborative than ever.

2. Do you have a Global Audience?
When it comes to production we need to produce (and often localize) our eLearning products quickly...which means our process and tools have to be easy to understand and used by everyone involved from the client to the instructional designers to the development, production and localization specialists. It also means that localization is not an afterthought, it is part of our process from the outset.  And, it means that often a product is never “finished” - with rapidly changing knowledge our products are designed and developed for easy updates to be maintained, always staying current.

3. What eLearning Design Trends are Working?
Gamification and storytelling have in many cases gone hand in hand  for us.  We’ve picked up aspects of gamification (challenges, scoring, incentives, avatars) and incorporated them into the scenario-based learning that we’ve always employed--now with even greater emphasis on telling a good story-- to create story-driven, role-play learning activities.  

In conclusion, these three elements are just a glimpse of how to effectively start your elearning program in today’s environment.

To learn more about our custom eLearning solutions click here

Additionally, for the full presentation on this topic, fill out the form below:

award Winner Two Years In A rowaward award award  

Award-winning Training for Powerful Results

Request a Demo