Alvaro Hoyos

Results 1 - 8 of 8
Post date: August 21, 2017
Traditional performance management, for better or for worse, hinges on the annual employee review. For years, managers have met with employees once a year to share feedback and criticisms collected over a 12-month period. But this slow-moving process tends to be a waste of time, and, in most cases...
Post date: October 27, 2016
There have been too many instances in 2016 of human error causing company data to be compromised, from the Snapchat breach, where an attacker posed as one of the company’s chief executives to trick an employee into releasing employee financial data, to the Seagate incident where a senior HR...
Post date: June 29, 2017
The gig economy is flourishing, and employers are eager to embrace the freelance community to supplement their existing teams. Freelancers today make up 35 percent of the American workforce, with that number expected to exceed 40 percent by 2020. As employees ditch the standard 9-to-5 workday in...
Post date: February 17, 2017
Successfully executing a merger or acquisition is a lot like starting a new restaurant–most fail soon after they begin. Executives and private equity experts already project a spike in 2017 deal activity. To ensure your organization isn’t another statistic, now is the time to rethink HR’s role...
Post date: April 19, 2017
In 2015, thousands of patients had their personal health data compromised when a former University of Oklahoma physician’s laptop was stolen. The university was unable to ascertain the extent of the damage or determine exactly what information was on the employee’s laptop. Exacerbating the problem...
Post date: October 30, 2017
When it comes to cybercrimes, businesses must constantly be iterating and improving their security protocols. Companies store valuable information, from personal employee data to corporate trade secrets, that can attract the attention of malicious criminals looking for profitable data to steal....
Post date: September 8, 2016
Cyberattacks are more common and more destructive than ever before, forcing companies to invest in advanced security systems to combat the increasing threat of a data breach. And yet, despite company’s best efforts to prevent an attack, cybercriminals are bypassing companies’ complex IT security...
Post date: January 12, 2017
Concepts like workflow automation and Identity Access Management (IAM) were once the exclusive purview of IT departments, but businesses’ increasing focus on agility has pushed HR professionals to the forefront of new tech experimentation and adoption. Especially where routine tasks like setting up...