The Course Politics Active

The Course Politics Active

In recent years, ProDemos has reached hundreds of people with the Political Activity course. Many of them became politically active: as a counselor, as a member of a village council, a WMO council, a youth council or ‘just’ as an active member of a political party.

For whom?

The Political Active course is intended for anyone who thinks about becoming politically active but does not yet know exactly what the possibilities are. The course is also very suitable for people who want to know how they can exert more influence on local decision-making.

Tip: read the Political Activity Guide: How do municipalities increase the political involvement of their inhabitants?

Execution of the course

There are three ways to get this course in your municipality:

1. Course by ProDemos teacher (against payment)
This paid course consists of 6 meetings with interactive training courses, such as: ‘lobbying at the municipality’, ‘convincing debate’ and lectures by guest lecturers from political practice. The course is given by a guest teacher from ProDemos.

For this course please contact Jelmer van der, Zee.

Ready-to-use Toolbox Politically Active (for a fee)

Municipalities, political parties, and other organizations can also take care of the course itself. By means of a ready-made toolbox, complete with course folders and other required physical materials, you can carry out the course independently. If desired, we can provide a short training for the teachers you have in mind.

Read more about the Political Active toolbox

 Online course package Politically Active (free)
The online toolbox contains files that you can print out yourself. With a little bit of self-reliance, you can give the course independently to interested citizens.

Read more about the online course package:

More information

As far as we are concerned, activating citizens is not limited to the period before the elections. Do you have questions about the possibilities and content of this course? Contact Jelmer van der, Zee. We would be happy to visit you.

Guide:

In the Political Activity Guide, we give you an insight into the experiences municipalities have with organizing activities to increase political involvement. Here we distinguish two categories: informing activities and activities aimed at the recruitment of council members. An example of this is the Political Activity course, which has already organized 200 municipalities in collaboration with ProDemos, and where hundreds of residents have participated.

We hope that this publication inspires you to also carry out activities in your municipality to involve your residents more in local democracy.

Contents of the course:

The course usually consists of 6 meetings with interactive training sessions, such as: ‘lobbying at the municipality’, ‘convincing debate’ and lectures by guest lecturers from political practice. The theory is interspersed with practical assignments, interactive work forms, presentations by local guest lecturers and meetings with local politicians. This gives the participants a realistic picture of local politics.

Meeting: Introduction and general government planning

Introduction
How is the Netherlands governed and what is the place of the municipality?
Elections
Political parties
How do you become politically active?
How do you propose your candidate?

Meeting: The municipality

How does the municipality work?
The decision-making within the municipality
Influence decision making
Meeting 3: The city council

Tasks and roles of the city council
The instruments of a councilor
Basic knowledge about municipal finances
Meeting 4: Lobbying at the municipality

Meeting: Attending a board meeting

Proven effective

At the start of 2017 31% of (former) course participants were on candidate lists for the city council. Two former students in De Fryske Marren have taken up a seat in the city council with their ‘De Burgerpartij De Fryske Marren’, which they have established themselves.

After the course, large groups of respondents became active or more active in local politics.
About half to two-thirds of the respondents indicate that they would not have taken the activity started after the course if they had not followed the course.
Participants are, therefore:
Become more active
Their knowledge has increased

Thales Corporate Fares For Business Travel

Thales Corporate Fares For Business Travel

Thalys offers an attractive customer program for frequent travelers or organizations, of which employees travel regularly.

Corporate Fares:

Do your organization’s employees regularly travel with Thalys? Then use Corporate Fares from Thalys. This saves you on your travel costs and increases your flexibility.

3 turnover levels Thalys Corporate Fares:

Less than € 10,000 5% discount in Premium and Comfort on 2 routes of your choice
Between € 10,000 – € 75,000 8% discount in Premium and Comfort and 4% discount in Standard on 3 routes of your choice
More than € 75,000 the discount on Premium and Standard is negotiated with Thalys
More flexibility for your travelers

Flexible access ** to all trains of the same day
Unlimited exchange
Full refund before and after departure, until the day after the trip
Access to the Thalys lounges in Brussels South, Paris Nord and the NS / Regus lounges in Rotterdam, Schiphol, and Amsterdam.
More benefits with Premium

Depending on the time of day, your business travelers can enjoy breakfast, lunch, dinner or savory or sweet treats.
Free faster Wi-Fi with more data
Free international newspapers and magazines
Taxi reservation on board Thalys (before arriving in Paris-Nord and Brussels-South)
TheCard

With Thalys TheCard, the loyalty program of Thalys, you as a business traveler get extra benefits. You can easily close this program in addition to Corporate Fares or Frequent Pass – subscription. By traveling with Thalys you earn Miles for free tickets on the Thalys network or gifts.

Ticketless service or mobile ticketing to travel without a paper ticket
Access to lounges at Paris Gare du Nord and Brussels South
Discount on hotels and car rental
Save miles for free tickets or gifts
Thalys Frequent Pass abonnement

As a frequent traveler, it may be interesting to purchase a Thalys Frequent Pass subscription. With this, you receive a discount on your preferential rate in Standard, Comfort or Premium.

If you book up to 7 days before departure, you will receive a 50% discount on your train ticket.
If you book your ticket 0 to 7 days before departure, you will receive a 30% discount.
You can opt for a one-year subscription for € 1050 or half a year for € 680. With a subscription from ThePass, you benefit directly from the TheCard loyalty program. This offers you all kinds of extra benefits and discounts.

Does your meeting end? No problem:

Free access flexibility for the surrounding trains: the train just before or after the train you reserved for the same day, in the same direction (subject to availability on board, without warranty or catering in Premium).

The Lot Creates Headaches For IT Security Staff

The Lot Creates Headaches For IT Security Staff

Futurologists like to outline the possibilities of IoT. They talk about a future in which cities, cars, households, companies, etc. become ‘smart’. Sounds great, but IT security guards look at it differently. They see dangers. By connecting more and more devices to each other, the number of access points on a network increases.

It is difficult for network administrators to secure all those access points. There are a number of reasons for this: IoT devices are not always properly protected, devices do not always receive updates, and unknown IoT devices can also become active on the network. Think of the employee who walks into the company with a hacked Fitbit on his wrist. It is not inconceivable that this way business data will be put on the street.

Entrance gates:

These types of risks will only increase in the coming period. By way of comparison: there are now around three billion smartphones worldwide, but the number of IoT devices exceeds twenty billion within a few years! The more access ports, the more possibilities for hackers. That is no longer a theory. Already in 2016, there was the Mirai botnet that had IoT devices in sight. Some 300,000 devices were infected.

Recent research by Fortinet shows that hackers are increasingly able to abuse IoT devices:

Recent research by Fortinet shows that hackers are increasingly able to abuse IoT devices. In the Global Threat Landscape Report, the security company warns that malware makers are focusing on agile development. By constantly adapting the malware a bit, they make the malicious software difficult to trace.

For example, many IoT devices in consumers have been the victim of crypto jacking over the past period. The devices were misused to search for crypto coins. The hackers focused mainly on media players because they have a lot of computing power and are constantly connected to the internet. As long as a device does not become noticeably slower, the owner will not immediately sound an alarm.

Bitcoin’s price against crypto jacking malware China, USA, Russia:

Where do malware attacks come from? According to F5 Labs, the research branch of F5 Networks, much from the Far East. The risk analysis The Hunt for IOT states that nearly half of all brute force attacks originating from China. There are also many numbers from the United States and Russia.

The number of attacks increased as much as 249 percent. If we look at which countries are most frequently attacked, the US, Singapore, Spain, and Hungary are at the top, but F5 Labs notes that actually, every country has to deal with it.

The researchers suspect that many attacks are not detected. They point out that IoT developers are not sufficiently concerned with securing IoT equipment. The result is obvious: vulnerable devices continue to appear on the market. The problems will, therefore, increase if consumers and companies use more IoT devices.

The number of Telnet attacks on IoT devices (source: F5 Labs)
As the threats increase, you would expect companies to be extra alert to IoT security. Nothing is further from the truth, points out research by security company Trend Micro. For many large companies, security is only a side issue. The company interviewed 1,150 IT and security managers worldwide and a grim picture emerges.

63 percent of respondents said they had seen more incidents in the past year. On average, companies suffered three cyber attacks on connected devices.

Significant impact:

IDC expects that 1.2 trillion dollars will be spent on IoT in 2022
Yet companies do only minimal tests before IoT technology is implemented. Moreover, the security manager is involved in just 38 percent of the cases. The Trend Micro report notes that significantly many companies are unknowingly opening up to online threats.

The surveyed managers say they are worried about that. They fear mainly loss of consumer confidence (52 percent) and financial loss (49 percent). Despite the introduction of the AVG, they are less afraid of fines by violating data protection rules (28 percent).

In the research, we read that companies invest heavily in IoT. They spend 2.1 million euros per year on average. Given this kind of substantial amounts and the significant impact of a cyber attack, Trend Micro writes that security must have the same priority to reduce IoT risks.

The Difference Between Human Resources And Human Resources

The Difference Between Human Resources And Human Resources

Everyone recognizes that you start talking to someone on birthdays and you are asked what you do for a living. That is the question that is regularly asked to me. I proudly tell you that I am an HR Manager. Often, the question immediately follows: “But what is that then?”

I usually reply that I work in the Human Resources department. This often gives a clearer picture, but it does not completely cover the load of my tasks and responsibilities. In order to clarify my position, I give my view on the difference between Human Resources (HR) and Personnel Affairs in this blog and I tell you how my role in Inside has been fulfilled.

Difference between hr and human resources:

Ask this question to Google and you will find many different articles about the difference between HR and Human Resources. Over the years I have developed my own perspective on this, which I like to share with you:
The executive work is usually done in the Personnel Department. Administrative actions are carried out, such as changes to the workforce and payroll administration (very important :)).

Personnel cases include recruitment and selection and having the knowledge of the various legislations.
HR (management) has a more advisory and supporting role towards managers and therefore works closely with the managers. In addition, HR mainly deals with strategic issues. Strategic issues concern, for example, the personnel policy and how employees can contribute to the growth and development of the organization.

How is this filled in at Inside?

At Inside, no clear distinction is made between HR and Human Resources. Because we are a fairly small company, this is not really possible. My work as an HR Manager, therefore, consists of both executive and strategic tasks. For example.

I give shape to the recruitment & selection policy, but I also conduct selection interviews. Training, as you have read in my previous blog, we find very important inside. Developing opportunities for training, as well as arranging these courses, is, therefore, an important part of my work.
These are just a few examples of the activities that I do, in which I combine the strategic aspects of HR and the executive of Human Resources. HR and Human Resources have a lot to do with each other. They are certainly not separate from each other but complement each other.

These are the trends within business travel

These are the trends within business travel

BCD Travel has asked its technology and business experts about their predictions for business travel in the future. Although there are more and more reasons to travel less for work, the number of business trips seems to increase.

times of digitization and international terrorism in which organizations are increasingly paying attention to their costs and their ecological footprint, there seem to be the only reasons to travel less for work. Nevertheless, we travel more and more often, says Jean-François De Mol (photo), sales development leader at BCD Travel. And that will not change soon in the future.

BCD Travel helps organizations to use their travel budgets in the most effective way. This means concretely: ensuring that passengers can travel safely, be productive on the road and make the right choices. BCD Group is the market leader in the Benelux and active worldwide in more than 108 countries. It has more than 14,000 employees and a total turnover of 26.4 billion dollars.

‘For many people, there is also a certain status associated with traveling for work’

Human contact and status:

‘Our sector is undeniably subject to political changes and climate change and as a result, the company will start asking questions about their distant trips: is it really necessary for us to fly? Do we have to go with three people or can someone do it too? ‘ says De Mol, who knows the world of business travel through and through with over twenty years of experience at BDC Travel.

‘Organizations mainly pay attention to travel less internally and opt for web conferences, whose quality always improves, as an alternative. For contact with clients, for business development and prospecting, human contact is still necessary and we will, therefore, continue to travel, ‘says De Mol. ‘But companies are increasingly looking at the train for shorter trips. If you want to go from Brussels to the center of Frankfurt, the work is better off with the high-speed train than with the plane. The journey takes longer than the flight, but the entire journey time is much shorter by train. ‘

‘For many people, a certain status is also associated with travel for work. Our attitude is double, we sigh and complain about traveling and see it as a waste of time, but they can not take it all away from us either. ‘

The future has already begun:

Technological changes also have an impact on business travel and especially on how we organize it. ‘We can fully book our trips digitally, 24 hours a day, on online platforms that fully integrate both booking a flight and reserving a hotel or a car on the spot,’ says De Mol. “You see the industry changing before your eyes. Airport buses, mobile check-in at hotels, AI-driven signposts in transfer zones: the future has begun, ‘predicts Miriam Moscovici, Emerging Technologies Director at BCD Travel.

‘While a holidaymaker usually only has a contract with a travel agency once or twice a year, that is for a business traveler and his travel management company (TMC) several times a year.

This repeated and valuable contact is an important reason for TMCs to invest in personalizing the experience of business travelers. ‘ Airports also respond to this. ‘Brussels Airport, for example, is a very modern airport and does a lot to personalize the journey. But it continues to seek a balance between digitization and personalization on the one hand and security and the protection of personal data on the other, ‘De Mol adds.

“The search for a personalized travel experience translates into travel planning solutions with more relevant options that respond more accurately to the needs of the traveler,” says Moscovici. ‘It’s all about functionality and relevance. A business traveler does not want a hundred options when planning his trip. He wants the few best options based on previous bookings, other travelers in similar situations and current market conditions. ‘

Trends in the near future:

For the near future, BCD Travel predicts some trends in business travel. ‘KLM and Lufthansa are testing how they can provide WiFi on long flights. That’s going to happen anyway, “says De Mol. ‘Where the time in the air is currently seen as rest or relaxation, work in flight will continue in the future.’

Furthermore, business travel and private travel are getting closer together: in the end, we are all consumers. Business travelers expect the same booking experience, hotel options and service for private trips as for their business trips.

Digitization and the Internet of Things also offer many opportunities to simplify business travel. Conferma, the market leader in virtual payments, sees the number of bookings with a virtual credit card doubling each year. ‘Virtual payments are becoming more and more common and at the same time payments with credit cards are being scrutinized for security reasons,’ says De Mol.

At Uber or Lyft you pay invisibly, and automatic check-in at a hotel means that you no longer have to go to reception to collect your key or pay the bill. Moscovici: ‘Integrated technology is becoming smarter and more connected, especially in the field of transfers, travel, and logistics. Sensors and beacons on important transfer hubs such as train stations and airports simplify navigation and improve the flow of people. You see more luggage with smart tags so you can trace where your suitcase is … The possibilities are endless. ‘

The Cyber ​​Security Specialists Who Know About Mitts

The Cyber ​​Security Specialists Who Know About Mitts

Business network security is an important subject that many CIO spend on the necessary hours. For many companies, cybersecurity is also an area that receives too little attention. The Dutch company NFIR has recently integrated industry peer True-xs Cyber Security from The Hague and is now a Dutch organization that controls many aspects of the cyber security profession. Reason for an in-depth discussion with Arwi van der Sluijs, who was the founder of True-xs in 2016 and has been active in the world of cybersecurity since 2006.

NFIR (Dutch Forensic Incident Response) is experiencing a major growth spurt and the broadening of the scope was appropriate. Industry peers True-xs was a valuable addition and thus an even more powerful player emerged in the Dutch security market. Arwi van der Sluijs, the general director and co-founder of True-xs, is convinced of the strength of the newly formed organization: “Perhaps the greatest strength of our organization is that we are completely Dutch. NFIR is completely Dutch and only has to deal with Dutch laws and regulations. “

‘If a pentester hits patient records within 15 minutes, then it’s wrong’

It seems subordinate, but essential to cybersecurity is cryptography. Documents that are managed are encrypted. The Dutch government then entrusts state secret information to environments where foreign powers may have access through a back door. You should not want that as a company. It has already caused a boom in the market in the past. Access to environments via backdoors is a problem throughout the industry.

The American security service demands support for this in products from American manufacturers and therefore refuses Chinese infrastructure on the American market. It is and will remain a topic that concerns the mood.

NFIR built on different pillars

Arwi van der Sluis:

NFIR rests on solid pillars: the group of companies that NFIR is part of is a total of 300 FTEs. True-xs introduced the knowledge and specializes in the field of cybersecurity, Intermax the knowledge and infrastructure for cloud environments and Legian is the secondment branch that has access to a large range of IT specialists.

With these components, an organization has been built that is particularly sound in terms of knowledge and scalability. With every cybersecurity problem, one can offer the helping hand. Van der Sluijs: “We are the digital fire brigade and have forensic researchers. In the event of incidents, our digital forensic researchers can carry out thorough research, whether or not supported by a judicial mandate.

For example, is an employee suspected of stealing trade secrets and a competitor makes use of it, then we have the permit to be able to investigate this. Companies that think internal data is stolen give our forensic researchers access to their own infrastructure after which the search starts. If it has been proven that data has indeed been stolen and there is a strong suspicion that the competitor makes use of it, we can be given the mandate through the judiciary to have our forensic investigators also investigate at the competitor.

After all, it is a punishable economic crime to use stolen data/knowledge. Files, log files, e-mail boxes and other tracks can then be investigated by NFIR’s forensic investigators to confirm abuse or to identify abuse. ” give our forensic researchers access to their own infrastructure after which the search starts. If it has been proven that data has indeed been stolen and there is a strong suspicion that the competitor makes use of it, we can be given the mandate through the judiciary to have our forensic investigators also investigate at the competitor.

After all, it is a punishable economic crime to use stolen data/knowledge. Files, log files, e-mail boxes and other tracks can then be investigated by NFIR’s forensic investigators to confirm abuse or to identify abuse. ” give our forensic researchers access to their own infrastructure after which the search starts. If it has been proven that data has indeed been stolen and there is a strong suspicion that the competitor makes use of it, we can be given the mandate through the judiciary to have our forensic investigators also investigate at the competitor.

After all, it is a punishable economic crime to use stolen data/knowledge. Files, log files, e-mail boxes and other tracks can then be investigated by NFIR’s forensic investigators to confirm abuse or to identify abuse. ” then we can be given the mandate through the judiciary to have our forensic investigators also investigate with the competitor. After all, it is a punishable economic crime to use stolen data/knowledge.

Files, log files, e-mail boxes, and other tracks can then be investigated by NFIR’s forensic investigators to confirm abuse or to identify abuse. ” then we can be given the mandate through the judiciary to have our forensic investigators also investigate with the competitor. After all, it is a punishable economic crime to use stolen data/knowledge. Files, log files, e-mail boxes and other tracks can then be investigated by NFIR’s forensic investigators to confirm abuse or to identify abuse. “

‘NFIR is completely Dutch and only has to deal with Dutch laws and regulations’

Pentest as a preventive measure:

A pen test (penetration test) is a widely used technique to test the safety of an environment (company network, website, etc.). Healthcare institutions and web shops use it frequently. Certainly, at healthcare institutions (where there is a constant need to pay strict attention to the costs due to the tight budget), such a test is relevant.

Academic hospitals generally have better security, especially the smaller healthcare institutions that require extra attention. Due to the nature of the company, the healthcare organization is reasonably open and visitors can easily access the network from access points rather than in a company. Van der Sluijs: “If you come across a patient file with a pen test within 15 minutes, then the clear improvement is needed.”

An annual pentest is therefore not a luxury. At web stores, it is the way to test whether the processes behind the webshop are in order. The SME managed services are increasingly taking off. It is precise with this pen test that the quality of such a service can be tested. Given the costs – most pent costs between 5 and 50k – it is the slightly larger SMEs and the government that can afford this approach.

The Strategy Consulting In Human Resources

The Strategy Consulting In Human Resources

Strategy consulting, also known as strategy consulting, strategic advice or boardroom consulting, is seen by the majority of consultants as the most high-end and prestigious segment within business services.

A strategy is defined as “a plan with the aim of realizing long-term objectives”, and organizations regularly hire strategy consultants to support the drafting and implementation of business strategies. The strategy consulting domain focuses on supporting clients in the private sector in the development of corporate, organizational or functional strategies and helping public institutions and organizations to draw up their economic policy.

Strategy consulting market:

In 2011, the value of the market for strategy consultancy services was estimated at $ 26.5 billion. The recovery of the American and European markets – the most important and largest markets in the global consulting industry –

In the aftermath of the financial crisis caused slow global growth in market value. From 2014, however, growth picked up again, with a growth of 4.7% in 2015 and forecast growth of 5.8% for 2016, which means that the market will reach a value of just over $ 30 billion by the end of 2016. Strategy consulting represents about 12% of the total consultancy market and is therefore comparable in size to the HR consulting segment.

The strategy consulting segment is more dependent than other segments for its development on general economic growth, with high growth ratios in times of prosperity, and declining growth in times of recession and economic contraction.

Strategy consulting services:

The market for strategy consulting services consistency of eight disciplines: Corporate Strategy, Business Model Transformation, Economic Policy, Mergers & Acquisitions, Organizational Strategy, Functional Strategy, Strategy & Operations, and Digital Strategy.

Corporate strategy, also known as strategic management, concerns the formulation of strategies and goals for entire companies and separate business units. Strategy consultants are regularly called on to support the design of their vision and mission, the development of strategic plans and the implementation of implementation roadmaps, which provide an outline of the activities and resources needed to implement the plans.

Common examples of strategic advisory projects include assessing strategic options, supporting business planning processes and developing growth plans, such as strategies for market entry (when companies want to expand into new regions or bring new products to the market).

Just like corporate strategy, Business Model Transformation (BMT) focuses on the design and development of future-proof strategies, with the main difference that BMT concerns fundamental changes in the way business is done, often as a result of major changes in the external market.

circumstances. Moreover, BMT has a broader definition of strategy, because it also considers a range of organizational and operational elements and their mutual relationships for achieving a common goal, such as value propositions, customer segments, cost structures, and organizational structures. Due to the disruptive, disruptive nature of technology in recent years, BMT consultants often work at the intersection of IT and strategy.

The Economic Policy discipline consists of a collection of economic advisory services to support governments and international institutions in policy formulation. The range of services generally consists of fiscal policy, government policy in the field of taxes, budgets, and expenditures, monetary policy, for the actions of central banks in the field of money supply and interest rates, and government interventions in the labor market, national property, housing, and many other topics.

Other components of the service offerings within this segment include impact assessments (such as socio-economic benefit research), financial valuation analyzes in economic disputes, economic investigations for antitrust cases, or competition investigation and merger procedures,

Strategy consultants are also active in the M & A domain, together with corporate finance advisors, M & A lawyers and investment bankers. The strategy consultants focus on the strategic and commercial activities in the phase before the agreement can be closed, although they are often hired to manage the first period of post-merger integration.

For example, strategy consulting firms serve companies and investors to build business cases to provide insight into the economic drivers behind mergers or acquisitions, and later in the process, supporting clients with due diligence work for potential acquisition targets. Other areas where M & A strategy consultants can play a role include setting up alliances and joint ventures, carve-outs and divestments,

Organizational strategy is concerned with the buttons that organizations have to run in order to fulfill their business strategies in time. The service offering in this area generally includes designing organizational structures and corporate governance, assessing competitiveness, developing human capital strategies and supporting strategic change management programs. Functional Strategy involves the development of strategic plans and roadmaps for departments within organizations, such as sales & marketing, finance, HR, supply chain, R & D and purchasing.

Over the past decade, the boundaries between strategic management and operational management have become increasingly blurred, partly due to the growing importance of process management, operations, and technology as elements of the implementation of strategies.

As a result, the range of services that originally ran on strategic advice was expanded with operational considerations, making the Strategy & Operations domain increasingly important. In this segment, not only strategy consultancy firms are active that have expanded their range of services with operations services, but also operations specialists who have developed their strategic skills and large technology consultancy firms that use their technological expertise to distinguish themselves.

With the advent of technological development and digitization, digital strategies have also become increasingly important in the work of strategy consultants. Not only do digital strategies enable companies to realize their digital ambitions, but more than ever they are the determining factor between the success and failure of strategies.

As a result, the growth in the Digital Strategy market has never been as high as in recent years. The discipline combines elements of strategy with IT organization and includes services such as developing strategies for digital business operations, designing a business IT or online strategy, developing transition approach to analytics and cloud technology, as well as high-quality technological services in the field. area of architecture,

The importance of business travel

The importance of business travel

How do you prepare your business trip well?

A successful business trip starts with a good preparation. This way you can keep the costs low and respond to possible incidents. In this article, you will find a number of tips for the business traveler.
Sponsored

How well are you secured? Do not become a victim!

Like every organization, your company also wants to continue to grow, innovate and innovate. At present, every organization is threatened by cyber attackers. Large and small companies in the care, education, government, and commercial sector: everyone is prey. The danger is also lurking at your organization. Time to get into action! Be secured!>>> More info security risks

Packing up:

The preparation of a business trip is in part no different from that of a holiday. There are plenty of sites where you can find checklists to overlook the typical travel things (medicine, toilet bag, visa, passport, enough clothes, etc.)
If you only leave a few days, it is a good idea to bring only hand luggage: it saves time at the airport.

Create a program:

Yet a business trip is not called a business trip for anything. You do not go (alone) for pleasure, but you travel with a goal. Therefore prepare well. These points can help you:
1. Write down your expectations. What do you want to do, what do you want to achieve and how much time do you want to spend on it?
2. Make a budget. Be aware of the costs and set a limit. This can help you save money.
3. Create a program. Make a provisional program, possibly together with a business partner. This way you can get the most out of your time. Be open to adjustments.
4. Take care of the reservations. Print them out and take them with you, in case of misunderstandings you can check the facts and show them to third parties.

TIP: send yourself an e-mail with important information (booking number, flight number and times, important telephone numbers from home and from partners you visit etc.). If you lose everything, you have at least something to fall back on.

5. Make sure all papers are in order (passport, visa) and look at the health risks. Do you still need vaccinations or do you have to take other precautions?

Determine the purpose of your trip:

Your business trip can have different goals:
• Meet existing customers
• Expansion of clientele
• Get to know networks and culture

Meet existing customers:

When you meet existing customers, preparation is easy. You make clear agreements with the customer and you make a program together. As a result, you book the tickets and the hotel.

Take travel distances and strategic sensitivities into account when you meet multiple customers. Limit your travel time as much as possible and plan time free for working out your appointments and for socializing with your customer. You can also immerse yourself in the culture you visit: what is usual in business visits?

Expand customer base:

You will see more when expanding your customer base. Before you travel, you first want a clear picture of possible customers or partners abroad. You can realize this in various ways:
• You can, of course, inform yourself in your own network, with acquaintances or business contacts, whether they have information that you can use.
• In addition, a visit to the website of Agentschap NL, the agency of Economic Affairs that stimulates international business, is worthwhile.

The site is a good source of information for international business and cooperation.
• The Trade Information System (HIS) of the Chamber of Commerce can also provide information about foreign markets.

Get to know networks and culture:

Often an important motive is to go on a business trip to network and to get to know the other culture. Pure business interests are then subordinate. Business interests play a role in the second instance; First, you create a mutual benevolence by showing your interest in the culture and the people you want to do business with. It is good to find some information about the culture and maybe learn some words of the language.

Health and diplomacy:

A handy site for information about business travel and health is that of De Travel clinic

It is also useful to write down the address and telephone number of the Dutch embassy or consulate in the country of destination. One of the functions of a consulate is to represent the Netherlands, also in the business area. A consulate can therefore also provide information in the business area. More information about embassies and consulates can be found on the website of Foreign Affairs.

Your employees on a business trip:

A quarter of companies pay a general allowance of up to 50 percent of the salary for business travel, in addition to the reimbursement of the costs.
The differences in Dutch business are large in this. So consult with your employees about the reimbursements they receive when traveling abroad for the business.

The Secure Transmission For Equipment Via The Internet

The Secure Transmission For Equipment Via The Internet

When using security cameras, it is undesirable if images can be intercepted or manipulated. With a standard camera system that certainly can not be ruled out. PG Security Systems has therefore launched Safe Connections on the market. With this service, the distributor makes it possible to connect devices, such as security cameras, to the Internet via a highly secured and controlled connection.

Safe Connections is volts PG Security Systems designed and developed with a view to optimum safety. That is also badly needed: hackers take advantage of the fact that the internet is not designed for ‘high security’ applications. For example, it is relatively easy to find IP addresses, scan the ports of the modem and crack the network password.

The connection from the outside can also easily be overloaded to prevent alarms from reaching an emergency service. The use of Safe Connections is not limited to surveillance cameras. Almost all IP-based devices can be connected to it. The connection is made via a secured Virtual Private Network (VPN). This can be regarded as a tunnel for data from security equipment, computer systems, payment terminals, but also smart thermostats and smart TVs.

Cold trick:

“It is not a sales pitch”, emphasizes Peter Gatowinas of PG Security Systems. “Images of tens of thousands of security cameras are displayed on public websites because the installer or user has not changed the factory password. Dutch security cameras have also been hacked in this way. We are not talking about cameras that are not known to be hacked.

Moreover, it is not just about cameras. Everything is now connected to the internet and not always is security considered. The network password can be found via a wireless printer, after which it is a breeze to take over computers and other devices, without the user immediately noticing. “

No ICT knowledge required:

Safe Connections is designed in such a way that no IT knowledge is required for installation and use. The basis is the Safe Connections Box, which is placed between the modem and the equipment. If you want to manage the equipment remotely, you need PC software or a smartphone app. This ensures that the signals are decrypted again. Without software or app, it is not possible to establish a connection.

This is not enough for good security. That’s why Safe Connections offers a number of extra options. Vital components of the equipment are monitored, such as the status of the hard disk. You can also see if any firmware or software updates are needed in the cameras.

Now only for Hikvision, but soon also for other brands. With the same ease, an update can be installed remotely. This method of monitoring always works, but the user decides if and when the installer can enter the network. Users can therefore safely leave the work to their installer. He will then receive temporary access.

Commercial opportunities:

The installer also does not need specific knowledge. Complicated work, such as port forwarding, is a thing of the past with Safe Connections. It also offers nice commercial opportunities. Installers can monitor the systems remotely for their customers and offer preventive maintenance before something breaks down.

The 10 Most Important Priorities And Focus Areas Of HR

The 10 Most Important Priorities And Focus Areas Of HR

Working conditions are again top of the agenda of HR managers. This is due to the threat of ‘war for talent’ and the consequences of this for recruitment and retention, according to research by ADP Netherlands, Berenschot, and Performa Uitgeverij. On the basis of the research, the partners have drawn up a list of the ten most important priorities and focus areas of HR.

The HR Trend research of ADP Netherlands, management consultancy Berenschot and Performa Publishing was held among more than 1,000 Dutch HR professionals. The research looks at different human resource issues every year, including strategic priorities, recruitment and selection, labor mobility, market expectations and salaries, and employment conditions.

One of the most important research questions of the annual HR Trends survey is: “what are the themes that will determine the HR policy agenda this and next year”. The answers show that adapting working conditions was the most important policy theme of 2016.

The increasing shortage of talent in combination with economic recovery ensured that HR professionals had more room to adjust the employment conditions policy. The renewed attention, however, seems to quickly decline again – for 2017 it is expected that this agenda item will drop to third place.

10 most important HR policy themes:

The second most important priority in 2016 was setting up and/or adjusting remuneration and performance interviews, followed by setting up or adjusting new training policy. As with the employment conditions policy, the respondents expect that these areas will also have less priority in 2017 – both points drop two places in the predicted priority list for the current year.

The sustainable employability policy is expected to increase in importance. In 2016, sustainable employability was still in fourth place with key HR priorities. In 2017, according to respondents’ expectations, this is at the top of the agenda. In 2016, the top five was closed due to issues surrounding the applied approach to absenteeism and reintegration. For 2017, however, this point seems much less important.

The respondents put this theme for 2017 in tenth place in the priority list. A newcomer in the top five of 2017 is the strategic staff planning, which was the sixth priority in 2016, but is expected to be in second place in 2017.

The rest of the top 10 in 2016 consisted of (partially) automating the personnel and/or salary administration, strengthening labor market communication and employer branding, guiding or implementing reorganizations and setting up or adjusting talent management policy. It is expected that only the policy theme ‘ reorganizations’ will disappear from the top ten of these points. The ninth place is expected to be taken over in 2017 by giving substance to the Participation Act.

What is striking, according to the researchers, is that it remains difficult to accurately predict HR priorities in advance. Hans van der Spek, Senior Managing Consultant at Berenschot and co-author of the research, says: “If we look at the top 10 HR policy themes of 2016 and compare them with the estimates made by the respondents last year, we see that only three of the ten in 2016 are at that position that was assessed by the respondents in 2015.

The themes employment conditions policy and the assessment cycle are considerably more prominent than were estimated in 2016. This also applies to strengthen the labor market communication/employer branding that has entered the top ten. “

HR focus areas:

In addition to the HR policy themes, the respondents also indicated which issues they think demand the most every day. At the top of the list are absenteeism and reintegration – 93% of the respondents indicate that they are working on this every day. Immediately below are employment law matters with 92% and primary and secondary employment conditions with 91% of the respondents. 87% spend a lot of time taking care of the personnel administration, while 86% mention recruitment and selection (including testing and assessment) as a time-consuming activity.

10 most important HR focus areas:

Job evaluation is the last activity of which more than 80% of the respondents indicate that they are working on it daily, by 81%. This is followed by action as a sparring partner for (line) management and working conditions and well-being, both with 79%. At the bottom of the top 10, but still with more than 70%, are training policy and management (73%) and external mobility, outplacement and dismissal (72%). Internal mobility, career counseling and coaching fall just outside the top 10 with 71% spending time on this every day.

What is striking is that there is a mismatch in some areas, according to Van der Spek. “If we look at the overview of the facets of HR existence then (b) the policy themes seem to receive less attention than you would expect based on the prioritization.”

Change in function:

As in previous years, a large proportion (60%) of HR professionals expect their function to change in the coming year. This aggravation mainly involves an expansion of the range of duties and a change in the tasks to be performed.

It is expected that especially the advisory function (HR advisors and HR business partners) and the managerial position (HR Manager / HR Manager) will make a radical change. The functions of a personnel officer, employee payroll and employee human resources have the greatest chance of disappearing predict the respondents, as their tasks are increasingly automated.