NCR Annual Wine Tour 2011

January 10, 2012 in Networking Events

Fine Wine, Weather and Company!

Average rating  1 2 3 4 5fYou must login to vote
NCR - Wine Tour 016.JPG
NCR - Wine Tour 017.JPG
NCR - Wine Tour 020.JPG
NCR - Wine Tour 025.JPG
NCR - Wine Tour 048.JPG
NCR - Wine Tour 049.JPG
NCR - Wine Tour 001.JPG
NCR - Wine Tour 002.JPG
NCR - Wine Tour 003.JPG
NCR - Wine Tour 005.JPG
NCR - Wine Tour 006.JPG
NCR - Wine Tour 007.JPG

Leadership – Best Practices

January 8, 2012 in Human Resources Consulting

Marlene_Zagon

The art of leadership is not just leading a bunch of people through a task or a project, but helping them realize their own strengths and awaken them to live their dreams. The impact of the leader’s behavior creates a bull whip effect on the follower’s performance. At times the act retains an indelible mark on the follower’s mind. In the words of Warren Buffett, “I was lucky to have the right heroes. Tell me who your heroes are and I’ll tell you how you’ll turn out to be. The qualities of the one you admire are the traits that you, with a little practice, can make your own, and that, if practiced, will become habit-forming.”

There are different styles of leadership. Ideally every human being is unique, so are their leadership styles. There are different theories related to human behaviors to form different leadership styles. As explained by Daniel Goleman on Leadership that gets results, Coercive Style with compliance focused “Do what I tell you”, Authoritative Style in leaders who have a clear vision saying “Come with me”, Facilitative Style to build harmony and teamwork through “People come first” attitude, Democratic Style to build consensus i.e. “What do you think”, Pacesetting Style who leads by example “Do as I do, now”, Coaching Style develop people through coaching with “try this.” concept. Ideally the situation as well as the environment contributes to behavior, whereas the dominant part of the nature would remain. During organizational change, when leaders are in the eye of the storm, it is imperative to identify their innate nature and predict who they would struggle for, be it people, process or the client.

The implementation of leadership development concepts would as required by the environment. A dynamic environment may include more than one strategy to implement, where in more stable and mature organizations there are fewer structures. Ultimately “Leadership is about creating a domain in which human beings continually deepen their understanding of reality and become more capable of participating in the unfolding world. Ultimately, leadership is about creating new realities.”– Peter Senge

Put even more simply, the leader is the inspiration and director of the action. He or she is the person in the group that possesses the combination of personality and skills that makes others want to follow his or her direction.

In business, leadership is welded to performance. Effective leaders are those who increase their company’s bottom line.

SDHR Consortium, LLC has specialist expertise and can help you with anything related to making your business perform to a higher standard. Every company must measure, manage and improve its performance if it is to survive and your business is no exception.

Marlene Zagon, SPHR, Managing Director of SDHRC, has over 25 years’ experience in Human Resources and has worked with executive teams to train the next generation of leaders in their organizations. To find out more about SDHR Consortium you may contact Marlene directly at: 619-857-1644 or go to the website at: www.sdhrconsortium.com and read about the organization or request more information.

Common Network Security Mistakes

January 3, 2012 in Computers & Networking Consultant

Businesses use networking to connect their employees to one another and create a productive shared work environment. However, in their haste to get the network up and running, some businesses do not take the time to make sure all security measures are in place. Here are a few common network security mistakes: 

1. Password use. Passwords are the simplest form of security. By leaving passwords blank or simple (i.e., password or admin), unauthorized users are practically invited to view sensitive data. Passwords are more secure when they contain both letters and numbers in a combination of upper-case and lower-case characters, and they should be changed periodically.

2. Lack of education. Educate users in the use of their software, especially with regard to e-mail, attachments, and downloads. They need to know exactly what kinds of threats are out there. Uneducated computer users are often those who fall victim to viruses, spyware, and phishing attacks, all of which are designed to corrupt systems or leak personal or company information to a third party without the user’s consent.

3. No backups. Laziness is one of the biggest security threats. It’s considerably more difficult to completely re-create a crippled system than it is to take the time to create proper backups. Create backups often, and do not immediately overwrite them with the next set of backups. In addition, make copies and keep them off-site in case of an emergency.

4. Plug and surf. Unfortunately, computers are not designed to be connected to the Internet straight out of the box. Before a phone line, Ethernet cable, or wireless card is anywhere near a new computer, install a line of defensive software. Ideally, this should include virus protection, multiple spyware scanners, and a program that runs in the background to prevent malicious software from ever being installed.

5. Not updating. What good are all those virus and spyware scanners if they’re not updated? It’s crucial to update what are called the “virus/spyware definitions” every week. This keeps the scanners up-to-date to detect the latest malicious software.

6. Ignoring security patches. Security holes may exist in your operating system. No software is perfect. Once an imperfection or hole is found, it’s usually exploited within a very short period of time. Therefore, it is imperative to install security patches as soon as possible.

7. Trust. Ads on the Internet have become devious and deceptive. They now appear as “urgent system messages” and warnings designed to scare users into clicking. As a rule of thumb, if a popup window contains an ad claiming to end popups, chances are it’s a scam of some sort.

8. Not using encryption. Encryption is especially important when dealing with banking and credit cards. Storing and transferring unencrypted data is the equivalent of posting that data for everyone to see. If you’re not comfortable implementing encryption technology, have an IT specialist assist you.

9. Trying to do it all yourself. Setting up a network, applying proper security measures, and downloading and installing software can be tricky. Large companies have IT departments. Small business owners should also ask for advice or even hire help. It’s worth the extra cost.

10. Proper instruction. Security measures are most effective if everyone is aware of how the system operates. Give employees a brief overview of the security measures they’re expected to follow.

Chiropractor

January 3, 2012 in Chiropractor, Uncategorized

Dr. Kip Rode was born and raised in southern California. Growing up in an environment that places emphasis on outdoor activity and vitality he developed a keen interest in health in health, healing and wellness. This led him to pursue a career in the natural approach to health offered by chiropractic care.

Visit Us On FacebookVisit Us On YoutubeVisit Us On TwitterVisit Us On Linkedin