Simone Erskine

Recent Posts

Leadership Program Students to Help Company Streamline Manufacturing Process

Posted by Simone Erskine on Aug 15, 2018 1:53:21 PM

This is an original article written by Tim Crosby, Communication and Marketing Strategist. 

Students in Southern Illinois University Carbondale’s Leadership Development Program don’t learn leadership out of a book; they learn it in the real world.

The latest batch of incoming students, along with the upper classmen, will again demonstrate this approach next week when they help a company reorganize part of its Chicago-area facility to improve efficiency and profitability.

+

Nobody Likes a Compliance Audit... and Why You Should Do Them Anyway!

Posted by Simone Erskine on Aug 7, 2018 2:33:46 PM

This is an original article written by Jana White, Cybersecurity Engineer and Trainer with Alpine Security.

What Is a Compliance Audit?

A compliance audit is an examination of documentation, records, or other evidentiary artifacts that use a specific set of regulatory controls to determine compliance. There are many different types of compliance audits including financial, technical, and cybersecurity audits. Common compliance audits include HIPAA, PCI-DSS, and SOC. 
+

Team Spotlight- Mary Mechler

Posted by Simone Erskine on Aug 1, 2018 5:14:46 PM

Mary is one of IMEC’s Technical Specialists who demonstrates her passion for enterprise excellence by helping organizations achieve top-line growth. She has been with IMEC for 5 years and has over 35 years of professional experience in marketing, sales and management.

+

Preparing Tomorrow's Leaders Today

Posted by Simone Erskine on Aug 1, 2018 12:43:54 PM

 

There is no debating the impact that strong leaders have on the success of an organization, so it is critical that new leaders are being prepared to transition into their new role. Organizations who invest in leaders at all levels of the organization – not just at the senior level – exhibit higher levels of employee retention and a pipeline of qualified leaders.

+

Spot and Stop Phishing Emails

Posted by Simone Erskine on Jul 23, 2018 10:41:16 AM

 

Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email. Instead of the attachment you thought you were opening, you have inadvertently opened the door to hacking from an outside source, usually without your knowledge.

+

How Efficient is Your Quick Changeover?

Posted by Simone Erskine on Jul 18, 2018 9:36:00 AM

What can you accomplish with the time saved on machine or product setup? A quick changeover plan or Single Minute Exchange of Dies (SMED) is a lean manufacturing technique intended to improve process efficiencies. Let’s take a look at how quick changeover is applied on the racetrack.

+

Small Changes, Huge Results

Posted by Simone Erskine on Jul 17, 2018 3:22:46 PM

 

There is always room to improve any process or operation. By equipping team members to apply lean manufacturing principles and techniques, companies gain a competitive edge internally and externally. Continuous improvement is a method designed to implement incremental changes that will improve efficiency, increase profits and eliminate waste.

+

5 Biggest Healthcare Cybersecurity Breaches

Posted by Simone Erskine on Jul 10, 2018 10:09:00 AM

 This is an original article written by Alpine Security.

The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather. 

+

Two Keys to Stopping Cyber Attacks

Posted by Simone Erskine on Jul 2, 2018 1:42:42 PM

This is an original article written by Alpine Security


Protecting your agency or company from cyber crime is critical to keeping your business running smoothly and profitably in the digital age.

What are two of the most likely areas of vulnerability in your cyber defense strategy?

+

    Subscribe to Email Updates:

    Stay Connected:

    Posts by Category