Blog
Active Listening Part 3 of 8 — Briefly discussing reflecting and paraphrasing
Hi, everyone. Scott Munden here from Huntleigh Group. Welcome to part three. In our eight part series of active listening. Part one, we talked about full attention. Part two, we discussed nonverbal cues. Part three is about reflection and paraphrasing. And what we...
Step up and show what true leadership is all about
Does this sound familiar? You are a leader in a dynamic environment surrounded by bright minds and groundbreaking ideas. You have a diverse blend of young talent and seasoned experts who work tirelessly to make their mark in a very competitive market. However, despite...
Active Listening Part 2 of 8 — Non Verbal Cues
Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to part two in our eight part series of shorts on active listening in. In part one, we covered full attention. Part two is nonverbal cues. If you recall in part one, we discussed body language, which is...
Part 1 of 8 on Active Listening — Full Attention
Hi everyone, Scott Munden here from the Huntleigh group. Welcome to part one of our eight part series of shorts on active listening. We had gotten some feedback from our previous posts related to active listening, so we decided to do a little bit more of a deep dive....
Some Guidelines on Preparing to obtain Cyber Insurance
Wondering how to prepare your business to obtain Cyber Insurance? Here are some general guidelines: Understand Your Risk Profile: Assess the cyber risks specific to your business. This includes understanding the type of data you hold (personal, financial, etc.), your...
Part 4 — Key Elements of an Information Security Policy
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part four and the final sequence in this segment on the key elements of an information security policy. These are elements 10, 11, and 12, which are awareness and training, review and audit,...
Distinguishing Between Collaborative Management and Management by Committee
“Collaborative Management” and “Management by Committee" are terms that describe approaches to organizational decision-making and leadership. Despite seeming similar at a glance because both involve group participation, they have very different connotations and...
Part 3 of Key Elements in an Information Security Policy
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part three in our sequence covering the key elements of an information security policy. Parts one and two, we covered one through six. Today, we're going to cover seven, eight, and nine, which...