Education Center

Articles, Training, Videos, Tips, eBooks, and More!

One Little Nagging Thing...

Thanksgiving is the time of year I cherish most. I love spending time with family and friends, eating, watching football, playing with my grand kids, and just relaxing. It always feels like the calm before the storm of the Holiday Season. From here on, it's a sprint to the end of the year that will become a blur for most. 

Planning for the New Year is undoubtedly on the agenda for December.

If your 2017 planning juices need a jump start, I have a little trick that may help...

Read More

What To Do When Your Email Has Been Hacked

A colleague got an odd email from you, but you didn’t send it. … How did this happen? Were you hacked?

With the right IT security measures in place, successful attacks on corporate email systems are rare, but they do happen.

So what should you do when you think you’ve been hacked?

Read More
Topics: I.T. Security

Could One Tiny Leak Wipe Out Your Entire Company?

Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company.

He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists. Life was good for this middle-aged businessman from Detroit.

Then, one Tuesday afternoon in May 2008, the phone call came that changed his life. His general manager came in to tell Daugherty about a call he’d just fielded from a man claiming to have nabbed a file full of LabMD patient documents. For a medical business that had to comply with strict federal rules on privacy, this was bad. Very bad.

Read More
Topics: I.T. Security

Watching "Discipline Equals Freedom" Come To Life


Have you been surprised in the month of October? There sure is no shortage of things to be surprised about considering Halloween and our political climate!

But I was surprised this month in a very positive way.

You may recall last month when I discussed how my team has adopted the principles of Extreme Ownership from a book by Navy SEALs, Jocko Willink and Leif Babin.

The weekly and quarterly meetings have continued, and this month we embarked upon our 3rd Quarter Leadership Meeting. We had 13 people in the room and were ready to go.

One of the topics for discussion was: How can we do better at demonstrating Extreme Ownership to our fellow teammates?

I started us off with a few opening remarks and then we dove right in.

Read More

Go Mobile - Without Killing Your Data

What if you could tap into the top talent in your industry, no matter where in the world they are? With the power of the mobile web, your all-star team is now – literally – at your fingertips.

Read More
Topics: I.T. Security

Leading With Extreme Ownership: What A Difference It Makes

Earlier this year, my Vistage Group Chair, Don Pierro, introduced me to one of the best business books I’ve ever read.

The book is, Extreme Ownership: How U.S. Navy SEALs Lead and Win, by Jocko Willink and Leif Babin.

As I read through it, I was completely enthralled by the discipline, training, and results that the Navy SEALs are able to achieve while being involved in very real life-or-death situations. It occurred to me that our already darn-good organization might be way better if we applied the principles of Extreme Ownership to ourselves.

Read More

3 Tips To Reduce The Amount Of Spam That Makes It To Your Inbox

According to Talos Security Intelligence and Research Group, a division of Cisco Systems, 86 percent of emails sent worldwide are unwelcome junk mail, or spam. Not only is spam annoying, it can also be dangerous if you or one of your employees accidentally succumb to one of their schemes.

With the prevalence of spam today, not only do you need the right technology in place to keep it under control, you also need to educate your users on how to reduce the amount of spam that you may unintentionally be inviting in.

Read More

What To Do When The Cloud Goes Down

Technology is a great enabler.

Think of all the ways that your business is able to thrive, grow and serve your customers better – ways that didn’t even exist 18 to 24 months ago.

That being said, technology isn’t perfect. For all of the power that these systems bring, software will have bugs, hardware will fail and the Internet will go down. Having a plan for when that inevitably happens is what separates the companies that are able to continue business as usual when the unexpected occurs, versus those that lose productive time due to IT problems.

Read More

Ironman Challenges and Lessons Learned

It’s amazing how sports and life events parallel business principles sometimes.

Two weeks ago, I completed my second IRONMAN Triathlon. It was held in the Laurentian Mountains at Mont-Tremblant Ski Resort in Quebec, Canada, which means I spent MANY hours training in the local California mountains trying to get ready for this extremely hilly course. I trained very hard and was as ready as I could be for the 140.6 mile course.

Well, I finished…but not without some issues that could have been avoided with a bit of planning and situational decision making.

Read More

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security