Blog
Part 1 of 4 in our Active Listening Series on Time Management – Assessing how you spend your time.
Hi everyone, Scott Munden here from Huntleigh Group. Welcome to this four part sequence in our leadership series focused on time management. There's a lot of topics we could explore on time management, but what we want to do is provide you kind of a foundation to get...
Differentiating your services in a market that has become commoditized
Differentiating your services in a market that's become commoditized is a challenging but crucial task for maintaining competitiveness and attracting customers. Here are some strategies to consider: Focus on Quality: Emphasize the superior quality of your service....
Compare and Contrast: Sustained Marketing vs. Burst Marketing
Comparing and contrasting sustained marketing efforts versus burst marketing involves looking at their strategies, objectives, advantages, and potential drawbacks. Strategy and Objective: ‐ Sustained Marketing: This approach involves continuous and consistent...
Cybersecurity Roadmap Part 4 of 4 — Maximize the value of your roadmap
Hi everyone, Scott Munden here from Huntleigh Group. Welcome to the final sequence. Part four in our cybersecurity series is on the security roadmap. In the final sequence here, we want to give you some takeaways in terms of how to maximize the value of your security...
Cybersecurity Roadmap Part 3 of 4 — Difference between a security roadmap and a WISP
Hi everyone, Scott Munden here from Huntleigh Group. Welcome to part three in our cybersecurity series on the security roadmap. Part three we're going to talk about the difference between a security roadmap and a WISP, which is a written information security plan. To...
Cybersecurity Roadmap Part 2 of 4 — Drawing insights from your Security Roadmap
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to part two in our cybersecurity series on a security roadmap. In part one, we talked about the purpose and scope of the roadmap and then some of the things that you're going to want to look at, including...
Cybersecurity Roadmap Part 1 of 4 — Security Roadmap Introduction
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to the introduction of our four part cybersecurity series on a security roadmap. While you see the key elements you'll have to consider in your roadmap on the left hand side of the screen, let me give you a...
Active Listening Part 8 of 8 — Acknowledging and Responding Appropriately
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to the final sequence, part eight of our active listening series. This section we're going to discuss acknowledging and responding appropriately. So if you've been practicing the techniques we've given you...