The Refractive Thinker® series will help you integrate refractive thinking into your core strategies.Brian JudBook Marketing WorksAvon, CT
The Refractive Thinker Press is an established brand, doing an incredible job marketing the books and authors on social media. My colleagues expressed their admiration for my publications, seeing my books on Amazon, Barns & Nobles, & other websites/bookstores. I have been invited to several Think-Tanks, fellowships, and Visiting Scholar appointments, where different committee members cited seeing my books in blogs, press-releases, Google Scholar, and university libraries. The RT press increased … Read moreDr. Emad RahimEndowed Entrepreneur-in-Residence, Oklahoma State University Visiting Scholar, Rutgers University
“Dear Dr. Cheryl Lentz: As we are working towards completing my book, I find that your editing is very thorough and detailed. I wish many college professors can learn from your style”. Zack Hasan, Ph.D., P.E.
To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
My promotion to full Professor was just approved. According to the feedback I’ve received, my chapter in The Refractive Thinker was a factor in establishing my scholarship credentials.Dr. Joseph PughProfessor
The authors contributing to this series are some of the best critical thinkers in their field of study.Dr. Rich SchuttlerPro Progress AcademyPhoenix, AZ
Dr. Cheryl developed a totally new approach to publishing for The Refractive Thinker.®.Dr. Edward KnabEmbry Riddle UniversityPalm Springs, CA
Dr. Cheryl is a very brilliant woman, teacher, coach, friend, and a leader. I was attracted to her because of her unselfishness, and a willing heart to not only share the knowledge she has with those around her, but also to empower them to look beyond themselves. Dr. Cheryl, I thank you for everything, your wisdom, coaching, and for giving me a wing to fly on. You are an amazing strong woman and a great friend that shares all she has!Eva KatushabeLas Vegas, NV
Publishing is an expensive venture, time consuming, and most times heartbreaking just trying to get through the door. Who has an easy time with rejection of what may be potentially life changing theories? Join The Refractive Thinker® Family where academic writing is economically published.Dr. Beverly CarterNew Rochelle, New York
The Refractive Thinker® is a roadmap that discusses many dimensions of change management.Mary Beth HartlebPrism Global Management GroupHenderson, NV
RT Vol XII: Chapter 1: Cybersecurity in Human Resources on Multiple Fronts
From the Book: The Refractive Thinker® Vol XII: CYBERSECURITY
SummaryHuman Resources (HR), as a strategic business component, confronts security on multiple fronts. The concept of security in HR on multiple fronts is unconventional. Using a refractive thinking approach, this includes securing data and applications using cloud technologies, hiring, learning and development, and partnering with information technology(IT) groups to ensure information security of data and applications. Organizations confront a talent shortage in their cybersecurity workforce with HR professionals who may not fully understand the complexity and breadth of information security. Additionally, employees and contractors are likely the most valuable asset and biggest threat to an organization’s line of data defense.
Cyber-attacks increase on a daily basis requiring organizational leaders to prepare people, systems, and processes to cross-functionally handle security. Otherwise, organizations can suffer high cost losses of revenue, talent, data, property, and more. This chapter examines the role of data security in implementing cloud technology for HR, talent acquisition, and security awareness training and development. With senior executive support, HR and IT can partner to provide a solid line of defense for information security.