Call Now: (866) 967-7046


Resource Center


Business & Leadership

Building a High Performance Team

Despite how skilled an employee is in a particular area, there's simply no substitute for the power of a team. Tips for building a high-performance team.

The Time is Now to Build an Executive Coaching Practice

Formal training in best coaching practices is the foundation of any successful executive coaching business. Qualifications obtained through masterís level executive coaching courses offer the skills and credibility necessary to be successful in this field.

Effective Employee Training Methods

A company is only as strong as its employees and proper training methods are necessary in cultivating strong team members. This article will examine ideas for effective training methods.

Systems Thinking: Building Organizations that Last

The future of a company and its success is often determined by its leadership and development. Initiating sustainable practices and strategies early on help a company to reach its fullest potential and go beyond the boundaries.

Team Building as a Resource for Company Success

Through the use of different team building techniques, and creating a precedent for open communication, companies are able to bring employees together to accomplish business goals and objectives.

The Benefits of Nonprofit Organizations

A nonprofit organization offers its own set of benefits in the business world and the advantages for its employees are numerous. In looking at how a nonprofit operates, the benefits for both the organization and its employees are worth a second look.

Engineering & Technology

Lewis University Offers New Online Master of Science in Data Science Degree

Lewis University proudly announces the addition of its latest online degree program, a Master of Science in Data Science.

Certified Information Systems Security Professional Exam: The Basics

Becoming a Certified Information Systems Security Professional is one of the soundest avenues to obtain a competitive salary and job security.

NSA's Surveillance Program: PRISM

In May, Edward Snowden, a former contractor for the NSA, broke his confidentiality agreement and came forward to the American news press about the NSA's surveillance program, PRISM.

Information Security Jobs Outside of IT

There are many career paths available for individuals with MSIS degrees outside of traditional IT, such as security architecture, crime investigation and systems analysis.

Top 3 High Profile Information Security Breaches of the 21st Century

Here are three of the top high profile information security breaches in the 21st century, and what they tell us about our technological weaknesses.

How Big Data is Transforming Information Security

Big Data has changed the very nature of the information security field. It raises questions about privacy at public, private, consumer, government & business levels.

Security Concerns for Wireless Systems

As wireless networks and devices proliferate, so do wireless security threats and wireless vulnerabilities.

MSIS Students Take On Cyber Challenge

Three students in the MS in Information Security program participated in the Cyber 9/12 Student Challenge, a national competition that tests the ability to craft high-level policy recommendations for a major cyber threat.

Career Paths in Information Security

On a cyber-level, companies are at risk each day for being hacked or subjected to malware. To effectively protect essential information, one of their most important assets, companies must find qualified individuals to protect and secure data.

Insider Threat Detection

In many cases, the greatest cyber threats to companies originate inside their own system.

Security Concerns in the Cloud

New methods of data storage have been introduced in the past decade, and as the world of information technology moves forward, advanced security measures are being taken to ensure the protection of user identities and data.

The Evolution of the Computer Virus

With an increase in technological advances, society increasingly becomes at risk for hackers or other forms of cyber-attacks.

LWS_Website-header-Building.jpg LWS_Website-header-MattKwaitkowski.jpg LWS_Website-header-TimMcCarthy.jpg black-80.png black-95.png bg_nav_hover.png