{"id":33203,"date":"2022-08-01T09:08:26","date_gmt":"2022-08-01T14:08:26","guid":{"rendered":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/?p=33203"},"modified":"2022-08-09T07:57:33","modified_gmt":"2022-08-09T12:57:33","slug":"is-remote-training-putting-your-company-data-at-risk","status":"publish","type":"post","link":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/","title":{"rendered":"Is Remote Training Putting Your Company Data at Risk?"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<p>By Evan Hackel<\/p>\n<p>Data security has come a long way since December 2005, right? That was the month when somebody popped open a car trunk and stole a laptop that contained the records of 230,000 Ameriprise Financial customers. \u00a0Suddenly, data security became a big concern, executives heard the word \u201cfirewall\u201d for the first time, and companies scrambled to protect themselves.<\/p>\n<p>But how much has computer security really improved? You have to wonder. Only a few years ago, the records of 74,000 current and former Coca-Cola employees were compromised when laptops were stolen from company headquarters in Atlanta.<\/p>\n<p>That\u2019s really bad. But the most pressing question is, how secure is <em>your<\/em> company data? And because we are a training company, we need to ask . . .<\/p>\n<p><strong>Are your training platforms exposing your company to attacks from hackers?<\/strong><\/p>\n<p>It\u2019s a troubling question, especially if you deliver training to employees in multiple locations:<\/p>\n<ul>\n<li><strong>Your trainees are logging onto Wi-Fi<\/strong> in Starbucks and other public places across the country. Does that expose you to risk?<\/li>\n<li><strong>You\u2019ve got a powerful new distributed system<\/strong> that lets employees do their training on their smartphones. But is that safe? What if one of your trainees loses a phone? Does that put your company data at risk?<\/li>\n<li><strong>You maintain stringent security<\/strong> in company headquarters, but what\u2019s going on in your regional offices? Can you be sure that laptops and workstations are secure? Remember the hard lesson that Coke learned when company laptops were lifted in Atlanta.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"eut-element eut-image eut-align-center\" style=\"\"><a href=\"https:\/\/csuiteold.c-suitenetwork.com\/become-c-suite-network-executive-membership\/pricing-options\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"338\" src=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-6c-white-800x338.jpeg\" class=\"attachment-medium size-medium\" alt=\"3 Strategies to Let Go of Past Mistakes and Move Forward\" srcset=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-6c-white-800x338.jpeg 800w, https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-6c-white-768x324.jpeg 768w, https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-6c-white.jpeg 900w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/div>[vc_column_text]<strong>Proactive Steps to Take<\/strong><\/p>\n<p>It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data. Here are some defenses to keep in mind:<\/p>\n<ul>\n<li><strong>Remember, the cloud can be a great defense.<\/strong> When your training materials reside in the cloud \u2013 in effect, on servers that are maintained by your training company, not by you in house \u2013 it is virtually impossible for hackers to use them as entry-points to get into your company\u2019s servers or company records. And if your training modules are organized in separate \u201csilos\u201d so that trainees can access only one training area at a time, you have even more security.<\/li>\n<li><strong>Be sure that trainees are using two-step encrypted passwords to log into your system.<\/strong> \u201cTwo-step\u201d means that each trainee must enter two individual credentials to start training \u2013 such as a username and a strong password that passes muster. \u201cEncrypted\u201d means that the username and password are \u201cscrambled\u201d so they cannot easily be copied over Wi-Fi or by remote hackers. Also, let trainees know that they are required to log off as soon as they complete different training units. That prevents phone thieves from stealing phones and having easy access to your training materials.<\/li>\n<li><strong>Make sure robust security protocols are being followed in all company locations.<\/strong> You know your company and its structure better than we do, so you know the obstacles you might be facing in this area.\u00a0 To make sure that protocols are followed, you might have to deliver regular security training to divisional or regional supervisors. You might also need to have your training director take on the role of security officer by making sure that company security directives are being followed.<\/li>\n<\/ul>\n<p><strong>Prevention Is Better than Fixing a Breach<\/strong><\/p>\n<p>One certain thing is that it is much better to take preemptive steps to protect your security than it is to repair the damage after a breach has taken place. When selecting a training development company for distributed training, the best course is to choose one with the expertise to build security defense into your plans from day one.[\/vc_column_text]<div class=\"eut-element eut-image eut-align-center\" style=\"\"><a href=\"https:\/\/csuiteold.c-suitenetwork.com\/become-c-suite-network-executive-membership\/pricing-options\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"338\" src=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-5c-1-800x338.jpeg\" class=\"attachment-medium size-medium\" alt=\"3 Strategies to Let Go of Past Mistakes and Move Forward\" srcset=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-5c-1-800x338.jpeg 800w, https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-5c-1-768x324.jpeg 768w, https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/04\/CTA-btn-5c-1.jpeg 900w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/div>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Be sure that trainees are using two-step encrypted passwords to log into your system. \u201cTwo-step\u201d means that each trainee must enter two individual credentials to start training \u2013 such as a username and a strong password that passes muster. \u201cEncrypted\u201d means that the username and password are \u201cscrambled\u201d so they cannot easily be copied over Wi-Fi or by remote hackers. Also, let trainees know that they are required to log off as soon as they complete different training units. That prevents phone thieves from stealing phones and having easy access to your training materials.<\/p>\n","protected":false},"author":77,"featured_media":33206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wpupg_custom_link":[],"wpupg_custom_link_behaviour":["default"],"wpupg_custom_image":[],"wpupg_custom_image_id":[],"footnotes":""},"categories":[36,64,59,56,66,47,57],"tags":[2407,2408],"editorial_calendar_month":[],"class_list":["post-33203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-business-practices","category-corporate-governance","category-digital-technology","category-people","category-personal-development","category-technology","tag-company-security","tag-computer-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors<\/title>\n<meta name=\"description\" content=\"It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors\" \/>\n<meta property=\"og:description\" content=\"It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"C-Suite Network Advisors\" \/>\n<meta property=\"article:author\" content=\"ingageconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T14:08:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-09T12:57:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ehackel\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Hackel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#website\",\"url\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/\",\"name\":\"C-Suite Network Advisors\",\"description\":\"Notable Business Experts and Thought Leaders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#webpage\",\"url\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/\",\"name\":\"Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors\",\"isPartOf\":{\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#primaryimage\"},\"datePublished\":\"2022-08-01T14:08:26+00:00\",\"dateModified\":\"2022-08-09T12:57:33+00:00\",\"author\":{\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#\/schema\/person\/005607093e3b76c8acb9ea5d1c5a0435\"},\"description\":\"It\\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.\",\"breadcrumb\":{\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Remote Training Putting Your Company Data at Risk?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#\/schema\/person\/005607093e3b76c8acb9ea5d1c5a0435\",\"name\":\"Evan Hackel\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c476c6761b4130c7aeeff016ed295776b3decee2ef0fd67a4efb65f5d25753f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c476c6761b4130c7aeeff016ed295776b3decee2ef0fd67a4efb65f5d25753f?s=96&d=mm&r=g\",\"caption\":\"Evan Hackel\"},\"description\":\"A dynamic, innovative, thoughtful and inspiring leader with 30 years of experience in franchising, distributed networks and cooperatives. Successful history of: (i) turning around a $700 million distressed franchise system into a $2.0 billion revenue business in four years, (ii) reviving and re-energizing a $3.5 billion revenue franchisor and (iii) founding three franchise systems. Experienced corporate board member.Currently, a consultant to some of the largest franchise systems in North America. A franchise industry leader, widely published, keynote speaker, member of the New England Franchise Association Board, and Co-chair of the International Franchise Associations Knowledge Share Task Force.\",\"sameAs\":[\"https:\/\/www.ingage.net\",\"ingageconsulting\",\"https:\/\/twitter.com\/ehackel\"],\"url\":\"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/author\/ehackelingage-net\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors","description":"It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors","og_description":"It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.","og_url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/","og_site_name":"C-Suite Network Advisors","article_author":"ingageconsulting","article_published_time":"2022-08-01T14:08:26+00:00","article_modified_time":"2022-08-09T12:57:33+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@ehackel","twitter_misc":{"Written by":"Evan Hackel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#website","url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/","name":"C-Suite Network Advisors","description":"Notable Business Experts and Thought Leaders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#primaryimage","inLanguage":"en-US","url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg","contentUrl":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-content\/uploads\/sites\/5\/2022\/07\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"WebPage","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#webpage","url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/","name":"Is Remote Training Putting Your Company Data at Risk? - C-Suite Network Advisors","isPartOf":{"@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#primaryimage"},"datePublished":"2022-08-01T14:08:26+00:00","dateModified":"2022-08-09T12:57:33+00:00","author":{"@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#\/schema\/person\/005607093e3b76c8acb9ea5d1c5a0435"},"description":"It\u2019s reassuring to know there are ways to make sure remote laptops, tablets and phones do not give hackers access to your company data.","breadcrumb":{"@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/is-remote-training-putting-your-company-data-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/"},{"@type":"ListItem","position":2,"name":"Is Remote Training Putting Your Company Data at Risk?"}]},{"@type":"Person","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#\/schema\/person\/005607093e3b76c8acb9ea5d1c5a0435","name":"Evan Hackel","image":{"@type":"ImageObject","@id":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0c476c6761b4130c7aeeff016ed295776b3decee2ef0fd67a4efb65f5d25753f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c476c6761b4130c7aeeff016ed295776b3decee2ef0fd67a4efb65f5d25753f?s=96&d=mm&r=g","caption":"Evan Hackel"},"description":"A dynamic, innovative, thoughtful and inspiring leader with 30 years of experience in franchising, distributed networks and cooperatives. Successful history of: (i) turning around a $700 million distressed franchise system into a $2.0 billion revenue business in four years, (ii) reviving and re-energizing a $3.5 billion revenue franchisor and (iii) founding three franchise systems. Experienced corporate board member.Currently, a consultant to some of the largest franchise systems in North America. A franchise industry leader, widely published, keynote speaker, member of the New England Franchise Association Board, and Co-chair of the International Franchise Associations Knowledge Share Task Force.","sameAs":["https:\/\/www.ingage.net","ingageconsulting","https:\/\/twitter.com\/ehackel"],"url":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/author\/ehackelingage-net\/"}]}},"_links":{"self":[{"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/posts\/33203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/comments?post=33203"}],"version-history":[{"count":0,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/posts\/33203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/media\/33206"}],"wp:attachment":[{"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/media?parent=33203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/categories?post=33203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/tags?post=33203"},{"taxonomy":"editorial_calendar_month","embeddable":true,"href":"https:\/\/csuiteold.c-suitenetwork.com\/advisors\/wp-json\/wp\/v2\/editorial_calendar_month?post=33203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}