Being laid-off is a challenging time. This is why I am writing a series of posts to help you get through it. In my last post I talked about properly using keywords in your resume. In the final post of this series, I’m going to talk about utilizing all the resources available to you to land your next job.
Being laid-off is a challenging time. This is why I am writing a series of posts to help you get through it. In my last post I discussed the importance of creating a Plan of Action. With that in-hand, it’s now time to shift your focus to your resume.
Being laid-off is a challenging time. This is why I am writing a series of posts to help you get through it. In my last post I discussed the importance of taking an honest assessment of your finances. In this post, I will show you how to create a Plan of Action.
Being laid-off is a challenging time. This is why I am writing a series of posts to help you get through it. In my last post I discussed the importance of taking an emotional assessment. This time, I’m talking about something more concrete: a Financial Assessment.
It’s once again that time of the year: office holiday party season. It’s a time where companies thank their employees for a year of hard work with a festive event. But this “party” is no run-of-the-mill party. While these parties can be a lot of fun and a great way to connect with co-workers outside of your day-to-day, there are plenty of social and professional landmines you will need to side step.
Tell me if this sounds familiar: You’re wrapping up another busy day at work. You’re packing your things away, firing off a couple emails, and saying ‘good night’ to your coworkers. As your computer screen turns black, you lean back in your chair and take a deep breath when a question pops into your head: “What did I accomplish today?”
Since 2004, October has been designated as National Cyber Security Awareness Month (NCSAM). This year, cybersecurity seems more important than ever. Hardly a day goes by without news sources reporting some type of new cybersecurity data breach or threat. The recent Equifax data breach has left many of us concerned about our personal data and threat of identity theft. In an era of rampant cyber hooligans and criminals, all of us need to diligently adhere to safe computing practices.
A large-scale application implementation is a daunting project with a lot of moving parts. How are you going to prepare your people to use the application? When the update involves new work processes, users generally need some kind of training for even the most intuitive and well-designed application. Do you have the bandwidth to design and develop the training your users need?
As the healthcare industry continues to move from a fee-for-service model to an outcome based model, properly trained medical review professionals are becoming ever more crucial. Healthcare professionals, insurance companies, and patients are now working together to find the most cost and medically effective treatments. This is where the Health Effectiveness Data Information Set (HEDIS) comes into play.