Author: amadmin

6 Tips for Copilot

1. Using Mnemonic Devices for Better Prompting

Using mnemonic devices like ICE (Intent, Context, Example), RISEN (Role, Instructions, Steps, End Goal, Narrowing), or COSTAR (Context, Objective, Structure, Tone, Audience, Result) can help you craft effective prompts. They remind you to include essential elements, making your prompts clear and comprehensive:

ICE:

  • Intent: Clearly state what you want to achieve.
  • Context: Provide background information to set the stage.
  • Example: Give an example to guide the AI.

RISEN:

  • Role: Assign a role to the AI.
  • Instructions: Be specific in your instructions.
  • Steps: Outline the steps to follow.
  • End Goal: State the desired outcome.
  • Narrowing: Provide constraints to focus the response.

COSTAR:

  • Context: Provide the background information.
  • Objective: Specify what you want to achieve.
  • Structure: Define how the information should be presented.
  • Tone: Dictate the manner the response should be delivered.
  • Audience: Specify who the response is intended for.
  • Result: State the expected result.

These frameworks help ensure your prompts are clear, comprehensive, and effective, leading to more accurate and relevant responses from #Copilot and other GenAI tools on the first try, reducing the need for multiple iterations.

2. Zero-shot vs. Prompt-stacking vs. Prompt-chaining​

There are many prompting techniques you  can use to improve the responses from #Copilot and other GenAI tools—these are the three I use  daily. Knowing when to use zero-shot, prompt-stacking, or prompt-chaining will absolutely enhance  your AI interactions. 

Zero-shot involves giving the AI a task without any prior examples, ideal for straightforward queries. 

Prompt-stacking combines multiple prompts into one to refine the AI’s response, useful for  complex tasks. Prompt-chaining links several prompts in a sequence to handle complex tasks in  stages. Each prompt builds on the output of the previous one, allowing for a more detailed and  refined response. This method is particularly useful for larger tasks that require step-by-step  instructions or multi-layered analysis. For example: 

  • Step 1 Prompt: “Summarize the key facts of the case Smith v. Texas using bullet points.” 
  • Step 2 Prompt (using Step 1 output): “Identify the main legal issues presented in the case  Smith v. Texas.” 
  • Step 3 Prompt: “Provide a detailed analysis of the court’s decision in Smith v. Texas,  including the reasoning behind the ruling.” 
  • Step 4 Prompt: “Draft a conclusion summarizing the implications of the court’s decision in  Smith v. Texas for future cases.” 
The Benefits of Prompt Chaining
  • Improved Accuracy: By breaking down a complex task into smaller, manageable steps,  prompt chaining helps ensure that each part of the task is addressed accurately. This reduces  the risk of errors and enhances the overall quality of the response. 
  • Enhanced Clarity: Prompt chaining allows for a more structured approach to problem solving. Each step can be clearly defined and executed, making it easier to follow the logic  and reasoning behind the AI’s response. 
  • Flexibility: This technique provides the flexibility to adjust and refine each step based on the  output of the previous one. If a particular step needs more detail or a different approach, it  can be modified without affecting the entire process. 
  • Efficiency: By handling tasks in stages, prompt chaining can save time and effort. It allows  for a more efficient workflow, as each step can be completed and validated before moving  on to the next.
  • Scalability: Prompt chaining is scalable and can be applied to a wide range of tasks, from  simple queries to complex projects. It is particularly useful for tasks that require a high level  of detail and precision. 

Choosing the right prompt for the job is just another aspect of learning how to get the most from  #Copilot and other GenAI tools. 

3. Talk to AI Like a Human

When interacting with #Copilot and other GenAI tools, treat it like a  conversation with a human, not a Google search. Be polite and clear in your requests.  

Example:

Imagine you need to draft a non-disclosure agreement (NDA) for a new business  partnership. Instead of typing “NDA template,” you could say, “Hi, I need to draft a non-disclosure  agreement for a new business partnership. Can you help me create a template that includes clauses  for confidentiality, duration, and mutual obligations? Thank you!” 

By providing context and being polite, you make it easier for the AI to understand your specific  requirements and deliver a more tailored response. This approach not only improves the accuracy of  the output but also makes the interaction more pleasant and efficient. 

Statistics on Politeness: Research has shown that being polite to AI can lead to better responses. A  study conducted by Future Publishing revealed that more than 55% of respondents consistently use  polite language when interacting with AI, up from 49% in the previous survey[1]

Additionally, a report from TechRadar highlighted an experiment where polite interactions with  ChatGPT resulted in higher quality responses[2]. The study found that politeness encourages the AI  to provide more thoughtful and accurate answers, creating a positive feedback loop where users  continue to be polite, leading to even better responses over time. 

References 

[1] Tom’s Guide: New survey reveals how polite we are to AI assistants ahead of new …

[2] TechRadar: The Impact of Politeness on ChatGPT Responses

4. Validate Information

Always validate the information provided by #Copilot and other GenAI tools.  There have been instances where lawyers cited fake case law due to relying solely on AI-generated  content. Remember, if it’s wrong to do something without AI, it’s wrong to do it with AI. Double check facts and sources to maintain your credibility and avoid potential pitfalls.

Examples of AI-Generated Errors: 

  1. Mata v. Avianca, Inc. (2023): Lawyers cited six non-existent cases generated by ChatGPT.  The court fined them $5,000 and required them to send letters to six judges who were falsely  identified as the authors of the fake opinions[1]. 
  2. Monk v. Goodyear Tire & Rubber Co. (2024): Lawyer cited two non-existent cases and  multiple fake quotations. He was sanctioned $2,000 and required to take Continuing Legal  Education (CLE) on AI[1]. 
  3. Wadsworth v. Walmart (2025): Lawyer cited eight non-existent cases. The fine is pending,  the lawyer was replaced by his supervisor, and the firm paid opposing counsel’s fees and  expenses for the court filing[1]. 

While the monetary sanctions might not be steep, the hit to one’s reputation is. Relying solely on AI generated content without verification has consequences. Always cross-check facts and sources to  ensure accuracy and maintain credibility.

5. Use AI as a Content Accelerator

Think of #Copilot and other GenAI tools as a content accelerator,  not a finished product generator. It can help you brainstorm ideas, draft content, and refine your  writing, but always review and edit the output. This ensures the final product aligns with your voice  and meets your standards. 

Benefits of Using AI as a Content Accelerator: 

  1. Idea Generation: AI can help you come up with new ideas and perspectives that you might  not have considered.  
  2. Drafting Content: AI can assist in drafting initial versions of your content to provide a solid  foundation that you can build upon, saving you time and effort. 
  3. Refining Writing: AI can help you refine and polish your writing. You can use it to check for  grammar and spelling errors, improve sentence structure, and enhance the overall readability  of your content.  
  4. Consistency: AI can help maintain consistency in your writing style and tone (particularly  useful for large projects or collaborative efforts) to standardize the language and format for a  cohesive final product. 
  5. Efficiency: Using AI as a content accelerator can significantly increase your productivity so  you can focus on higher-level tasks. 

By using #Copilot and other GenAI tools as a content accelerator, you can streamline the content  creation process, enhance the quality of your output, and ultimately deliver more value to your  clients and your organization.

6. Avoid the "AI Accent"

The “AI Accent” refers to the telltale signs of AI-generated content, such as  overly formal language, repetitive phrases, or unnatural sentence structures. To avoid this,  personalize and humanize the output by adding your unique touch. This makes the content more  engaging and relatable to your audience. 

Tips to Avoid the “AI Accent”: 

  1. Review and Edit: Always review and edit AI-generated content to ensure the content flows  naturally and sounds human. 
  2. Add Personal Touch: Incorporate your unique voice and style into the content. Add  anecdotes, examples, or personal insights to make it more engaging and relatable. 3. Use Natural Language: Write like you talk. Use contractions, casual language, and  conversational phrases for authenticity. 
  3. Vary Sentence Length: Mix short and long sentences to create a natural rhythm, keep the  reader engaged, and make the content feel more dynamic. 
  4. Read Aloud: Read the content aloud to check for awkward phrasing or unnatural sentence  structures to ensure the content sounds natural. 

We hope these tips help you connect better with your audience while accelerating your work.

Transformative Impact: Reflections on My Trip to Zimbabwe with World Vision’s Strong Women Strong World

Written By: Gina Buser, CEO & Founder, Traveling Coaches Inc. & Alterity Solutions, Inc.

My recent trip to Zimbabwe with World Vision’s Strong Women Strong World Beyond Access programs was an eye-opening experience. Witnessing firsthand the transformative impact of these intentional initiatives on women’s lives was both inspiring and humbling. This article aims to share my reflections, particularly focusing on the incredible work being done and the powerful stories of the women involved.

The Importance of Equality

From the beginning, it was clear that the foundation of these projects is rooted in the belief that men and women are created as equals. This principle is essential for fostering a supportive environment where both genders can thrive. The projects emphasize the need for empowering women as well as strong men to support strong women, creating a harmonious and flourishing community.

Beyond Access: A Holistic Approach

World Vision’s Beyond Access initiative is a comprehensive program that integrates various elements, including Biblically Empowered Worldview training, WASH (Water, Sanitation, and Hygiene) programming, and Channels of Hope training. By sequencing women’s empowerment training, WASH, and economic empowerment with leadership training, the program addresses the multifaceted challenges women face.

One of the standout aspects of the program is its focus on the economic use of water. Women are taught to sustain family use and then leverage water for economic activities, such as community gardens, goat farming, and other small businesses, which can diversify their income sources. These income sources allow them to have more nutritious food and pay school fees for their children.

Social Barriers and Cultural Challenges

The trip highlighted the deep-rooted social barriers that hinder women’s progress. In rural communities, ownership of assets is heavily skewed in favor of men. For instance, while owning a cow is a status symbol for men, women typically own chickens and, in rare cases, goats. Cultural norms prevent women from storing their goats with their husband’s cattle, and the bride price system further exacerbates gender inequality.

Women own less than 12% of the wealth in Zimbabwe, and their decision-making power within households is limited. World Vision’s introduction of savings groups and efforts to improve access to loans are crucial steps toward helping women expand their business and achieve economic empowerment. These women are humble, hungry, and smart.

Gina’s Reflections

Reflecting on the trip, I was struck by the dedication and resilience of the women involved. 90% of World Vision’s work is in the most vulnerable places, and starting with training that addresses mindset challenges makes a significant difference. The intentional sequencing of women’s empowerment training, WASH, and economic empowerment with leadership training is proving to be very effective.

I personally saw the impact of transformational training in these women. It reminded me of our Alterity purpose, which is to provide training that transforms by educating, empowering, and elevating. I am passionate about empowering others through training that transforms and being a part of women’s empowerment to end extreme poverty.

Putting women at the center of these initiatives accelerates outcomes and results. The transformational training helps women understand their worth, equality, and potential. Leadership training builds confidence and skills, enabling women to dream big for themselves and their children. They are implementing every aspect of what they are learning.

Early results show that the programs and training cadence, combined with access to clean water, are working. Women are flourish once they learn about hygiene and how to use clean water for household and income-generating activities. They are starting or growing businesses, lifting themselves out of poverty, and positively impacting their local economies and communities. They are experiencing enriched relationships with their husbands, children, and communities. They are consistently stepping into volunteer leadership roles and sharing what they have learned with others.

Encouragement to Support Women’s Empowerment

I encourage everyone to lean in, learn more, and provide support for women’s empowerment and gender equality. The work being done by World Vision’s Strong Women Strong World Beyond Access is making a tangible difference in the lives of women and their communities. It is accelerating the journey to end extreme poverty. By supporting these initiatives, we can help create a world where women are empowered, equal, and able to achieve their full potential.

Conclusion

My trip to Zimbabwe was a powerful reminder of the importance of supporting women’s empowerment and gender equality. The stories of resilience, strength, and transformation I witnessed are a testament to the impact of World Vision’s work. Let’s continue to support and uplift women around the world, ensuring they have the resources and opportunities they need to thrive.

The Hidden Costs of Inaction: Why Process Alignment and Training are Crucial for Business Success

In today’s fast-paced business environment, the cost of doing nothing can be far greater than the cost of implementing change. One of the most significant areas where this is evident is in the alignment and adoption of key business processes. When businesses fail to ensure that their processes are uniformly understood and followed by all employees—whether they are new hires, existing staff, or those acquired through mergers—the repercussions can be severe. This blog will explore the opportunity costs associated with neglecting process alignment and training, and how process-specific, custom content development can help mitigate these risks.

The Opportunity Cost of Misaligned Processes

Opportunity cost refers to the potential benefits that are forfeited when one alternative is chosen over another. In the context of business processes, the opportunity cost of not having aligned and well-adopted processes can manifest in several ways:

  1. Decreased Efficiency and Productivity: When employees are not on the same page regarding how tasks should be performed, it leads to inconsistencies and inefficiencies. For example, if different teams use different methods to achieve the same goal, it can result in duplicated efforts, wasted time, and ultimately, lower productivity.
  2. Increased Error Rates: Misaligned processes often lead to errors and rework. For instance, if a company does not have a standardized process for handling customer complaints, some issues may be resolved promptly while others are neglected, leading to customer dissatisfaction and potential loss of business.
  3. Higher Training Costs: Without a unified approach to process training, companies may find themselves repeatedly training employees on the same tasks, leading to higher training costs and longer onboarding times for new hires.
  4. Lost Competitive Advantage: Inconsistent processes can hinder a company’s ability to innovate and respond quickly to market changes. Competitors with streamlined, well-adopted processes can outpace companies that struggle with internal misalignment.
Real-World Examples

Consider a large retail chain that recently acquired a smaller competitor. Without a standardized process for integrating the new employees, the company faced significant challenges. The lack of alignment led to confusion among staff, inconsistent customer service, and ultimately, a decline in sales. This scenario highlights the importance of having a robust process training and enablement strategy in place.

Another example is a tech company that failed to adopt a unified project management process across its departments. As a result, projects were often delayed, budgets were exceeded, and client satisfaction plummeted. The opportunity cost here was not just financial but also reputational, as the company struggled to maintain its market position.

The Solution: Process Training and Enablement

To avoid these pitfalls, businesses must invest in process training and enablement solutions that ensure all employees are aligned and equipped to follow key processes. Alterity Solutions offers a comprehensive Process Training and Enablement Solution designed to address these challenges. Our solution includes:

  • Custom-Designed Training Materials: Tailored to your organization’s specific processes, ensuring relevance and effectiveness.
  • Interactive Learning Modules: Engaging and easy-to-understand modules that facilitate better retention and application of knowledge.
  • Ongoing Support and Reinforcement: Continuous support to reinforce learning and adapt to any process changes over time.
By implementing these solutions, businesses can:
  • Enhance Employee Performance: When employees are well-trained and understand the processes they need to follow, their performance improves. They can execute tasks more efficiently and with greater accuracy, leading to higher productivity and better outcomes.
  • Improve Consistency and Quality: Standardized processes ensure that all employees perform tasks in the same way, which enhances consistency and quality across the organization. This is particularly important in customer-facing roles where consistent service quality can significantly impact customer satisfaction and loyalty.
  • Accelerate Onboarding: New hires can get up to speed more quickly when there are clear, well-documented processes in place. This reduces the time and resources needed for training and allows new employees to become productive members of the team sooner.
  • Increase Agility and Innovation: With well-aligned processes, companies can more easily adapt to changes in the market or industry. Employees who understand the core processes can innovate within those frameworks, leading to new ideas and improvements that drive the business forward.
  • Reduce Risk and Compliance Issues: Effective process training helps ensure that all employees are aware of and adhere to regulatory requirements and company policies. This reduces the risk of non-compliance and the potential for costly fines or legal issues.

Don’t let the cost of doing nothing hinder your business’s success. Reach out to Alterity Solutions today to learn how we can help you create custom learning assets that support the alignment and training of your company’s processes. Together, we can ensure that your team is equipped to perform at their best, driving your business forward.

Alterity+: Use Cases in Action

Throughout the coming year, Alterity will highlight use cases from our clients that illustrate how Alterity+ can help develop workforce skills. Each case will describe a specific role, objective, and results tied to the autonomous organizations and feedback that Alterity+ provides. If you are looking to upskill your organization, these use cases are a must-read.

Use Case: Enhancing Trial Preparation with Alterity+

Let’s consider a scenario where a lawyer, Sarah, is preparing for an upcoming trial. Sarah works at a mid-sized law firm that recently implemented Alterity+ to improve their training and skill development processes.

The Challenge: Effective Trial Preparation

Sarah is getting ready to go to trial, so she must ensure she is thoroughly prepared. This includes mastering her opening statements, cross-examinations, and closing arguments. Traditional preparation methods, such as practicing in front of colleagues or mentors, are time-consuming and may not always provide the detailed feedback she needs.

The Solution: Leverage Alterity+

Sarah decides to use Alterity+ to enhance her trial preparation. Here’s how:

  1. Video Demonstrations: Sarah records herself delivering her opening statement and uploads the video to Alterity+. The AI Coach analyzes her performance and provides instant feedback on her delivery and the clarity of her arguments.
  2. AI-Powered Feedback: The AI Coach highlights areas where Sarah can improve, such as adjusting her tone for better impact and refining her questioning techniques. This feedback is specific and actionable and allows Sarah to make precise adjustments.
  3. Iterative Practice: Sarah continues to practice and upload new videos. Each time, she receives detailed feedback that helps her to refine her skills progressively. The automated smart scoring system tracks her improvement over time, giving her a clear sense of her progress.
The Results: Improved Performance and Confidence

By using Alterity+, Sarah experiences several benefits:

  • Enhanced Skill Mastery: Detailed, real-time feedback helps Sarah master her trial skills more effectively than traditional methods.
  • Increased Confidence: Iterative practice and validation of her skills boost Sarah’s confidence, ensuring she is well-prepared for the trial.
  • Time Efficiency: Alterity+ streamlines the preparation process, saving Sarah valuable time that she can allocate to other critical tasks.
Conclusion: A New Standard for Trial Preparation

Alterity+ proves to be an invaluable tool for Sarah that transforms her trial preparation process. The AI-driven feedback and personalized coaching enabled her to achieve a higher level of performance and confidence, ultimately contributing to a more successful trial outcome.

This use case illustrates how Alterity+ can significantly enhance preparation for critical tasks, setting a new standard for training and skill development.

Find out how Alterity+ can help your organization.

The Evolving Landscape of Data Privacy: A Mandate for All

Data Privacy used to be that “bolt-on” topic added to the far more enticing conversations around cyber and information security. Protecting information from the bad guys was far more interesting than protecting information because it was “required.” However, the topic of data privacy has now captivated discussions among leaders of organizations. It is a mandate that is now reaching everyone and demands our attention.

From the European Union’s GDPR mandate that had global reach to the growing list of states in the US that have enacted data privacy laws, it is a topic that must be a part of the education and direction given to all employees.

Current State of Data Privacy Laws

As of now, 20 states in the US have enacted comprehensive data privacy laws[1]. These state laws have set the precedent for others to follow. The momentum for comprehensive privacy bills is at an all-time high, with several more states expected to implement similar laws in the near future[2].

Foundational Principles of Data Privacy

Understanding data privacy begins with recognizing its core principles:

  1. Lawfulness, Fairness, and Transparency: Data must be processed lawfully, fairly, and in a transparent manner.
  2. Purpose Limitation: Data should be collected for specified, explicit, and legitimate purposes.
  3. Data Minimization: Only data that is necessary for the purposes should be collected.
  4. Accuracy: Data must be accurate and kept up to date.
  5. Storage Limitation: Data should be kept in a form that permits identification of data subjects for no longer than necessary.
  6. Integrity and Confidentiality: Data must be processed in a manner that ensures appropriate security.
  7. Accountability: Organizations must be able to demonstrate compliance with these principles[3].
What Everyone Should Know

Data privacy is not just a legal requirement but a fundamental right. Everyone should be aware of the following:

  • Consent: Individuals must give explicit consent for their data to be collected and used.
  • Transparency: Organizations must be transparent about how they collect, use, and share data.
  • Security: Protecting data from unauthorized access and breaches is crucial.
  • Rights: Individuals have the right to access, correct, and delete their data[4].
What Everyone Should Do

To ensure compliance and protect data privacy, organizations and individuals should:

  • Educate: Regularly train employees on data privacy principles and practices.
  • Implement Policies: Establish clear data privacy policies and procedures.
  • Use Technology: Employ data protection technologies and practices.
  • Monitor and Audit: Continuously monitor and audit data practices to ensure compliance[5].
Conclusion

Data privacy is no longer an afterthought but a critical component of organizational strategy. As laws evolve and the importance of data privacy grows, it is imperative for all employees to be educated and vigilant. By understanding and implementing the foundational principles of data privacy, organizations can protect themselves and their clients, ensuring trust and compliance in an increasingly data-driven world.

[1]: Bloomberg Law [2]: National Law Review [3]: IBM [4]: Harvard Business Review [5]: Pew Research Center

References
[1] US State Privacy Legislation Tracker – International Association of …
[2] Which States Have Consumer Data Privacy Laws? – Bloomberg Law
[3] What are the US States with Data Privacy Laws? | DataGrail
[4] The State of Consumer Data Privacy Laws in the US (And Why It Matters)
[5] Key findings about Americans and data privacy – Pew Research Center

About the Author

Kenny Leckie

Alterity | Senior Technology & Change
Management Consultant

In his role as Senior Technology and Change Management Consultant, Kenny provides thought leadership and consulting to organizations in areas of information security/cybersecurity awareness, change management, user adoption, adult learning, employee engagement, professional development, and business strategy. He also works with clients to develop and deploy customized programs with an emphasis on user adoption and increased return on investment. Kenny is a Prosci Certified Change Practitioner, a Certified Technical Trainer and has earned the trust of organizations across the US, Canada, The UK, Europe and Australia.

Kenny has more than thirty years of combined experience as an business Chief Information Officer, Manager of Support & Training, and now consultant providing him with a unique point of view and understanding of the challenges of introducing change in organizations. He combines his years of experience with a strategic approach to help clients implement programs that allows focus on the business while minimizing risk to confidential, protected, and sensitive information. Kenny is an author and speaker and a winner of ILTA’s 2018 Innovative Consultant of the Year.

Company Success: Six Key Processes

When you think about the success of your company’s projects and programs—the planning, execution and measurement—how much of that success depends on everyone following your core processes? Following processes is one of the most important variables that determine your success.

When it comes to employee training, are there universal processes any company can adopt to increase the effectiveness of their programs? The short answer is yes! We asked our education experts and here are six key processes to consider:

1. New Hire Onboarding:

Onboarding new employees is crucial for integrating them into the company’s culture and ensuring they understand their roles and responsibilities. Effective onboarding programs reduce the time it takes for new hires to become productive and they also improve employee retention. Studies show a direct correlation between longevity at a company and the quality of an employee’s onboarding experience. Onboarding should cover company policies, job-specific tasks, and an introduction to the team and organizational structure, serving up the right information at the right time during the first days, weeks, and months of employment.

2. Leadership Development:

Developing current and future leaders is vital for the long-term success of any company. Leadership training programs help employees, managers, and executives enhance their skills in areas such as strategic planning, team management, and decision-making. By investing in leadership development, companies can build strong leadership pipelines and ensure they are prepared for future challenges.

3. Technology-Related Processes:

As technology continues to evolve, it is important for employees to stay up-to-date with new software tools and IT systems. Training programs help staff learn how to use new technologies effectively, troubleshoot common issues, and apply cybersecurity best practices. This ensures that the organization can leverage technology to improve productivity and maintain a competitive edge.

4. Records Management:

Proper handling, storage, and retrieval of records are essential for compliance and operational efficiency. Training employees on records management processes can help ensure documents are organized, accessible, and secure. This training covers retention policies, electronic records management systems, and legal and regulatory requirements.

5. HR Investigations:

Conducting thorough and compliant HR investigations is critical for addressing workplace issues and maintaining a positive work environment. Training HR staff on investigation processes can help them handle complaints, gather evidence, and document findings effectively. This ensures that HR conducts investigations fairly and takes appropriate actions based on the results.

6. Marketing Processes:

Consistency and effectiveness in marketing activities are key to building a strong brand and reaching target audiences. Training marketing teams on processes such as campaign planning, content creation, and performance analysis can help ensure that marketing efforts are aligned with business goals. Important skills also include using marketing automation tools and data analytics to optimize campaigns.

By focusing on these six key processes, you can enhance your team’s overall efficiency, consistency, and effectiveness. Implementing a structured and supportive training approach ensures that your employees are well-equipped to perform their roles and contribute to the company’s success. Learn how Alterity can support your process training. 

Keeping Security Awareness Relevant

There is a tried-and-true principle that helps guide a successful cybersecurity awareness program – until something matters to someone personally, they will never change. This speaks to an important part of all security awareness efforts – answering the question: why should they care. That’s why there is an ongoing need to keep your cybersecurity awareness program RELEVANT to the individuals in your organization.

Part 2 of this series: Keeping Security Awareness Relevant.

Practical Ways to Keep Your Program Relevant:

  • Make it personal. Tie all security awareness communiques to their personal application for the individuals in your organization.
  • Give people what they need to be successful. Don’t just tell them scary stories or things not to do. Provide practical, actionable guidance on what they can do in the face of ever-changing security threats.
  • Use current events – without driving fear. The news (industry-specific, regional, national, and international) is full of current events that can help drive awareness of the need for good security hygiene. The challenge is not to “scare people straight” with the information, but rather relate it to why security best practices should be on people’s mind as they do their job and live their lives.
  • Audience you message. Not everything matters to everyone the same way. Along these lines, consider who should send the message. Not everyone listens to the same people the same way. 
  • Get testimonials and stories from your organization. This brings the message of security awareness closer to home and closer to front of mind. 
  • Use specific stories that are relevant to organizations and their personnel. While some generic security guidance is helpful, tailoring the messages and information to organizations and their personnel gets their attention more quickly. 
  • Empower your people to respond. Remind them that EVERYONE is part of the organization’s security effort. Remind them regularly who to call, who to email, and what to do in the event of an incident or a security-related question. 
  • Deal with resistance. Invariably, there will be pushback on participation in a cybersecurity awareness program. This is most noticeable when you are asking people to DO something (like attend an event or consume learning content). Keep in mind that resistance is not bad. It is an indication of something. Listen to them and ask why.
  • FINALLY, the pièce de ré·sis·tance. Give them practical tips and useful information to help them in their personal lives. Give them advice for their home, travel, family, and finances. Give them best practices for protecting their identity and the things that matter in their lives. This will win the hearts of your people and not just the minds.

Next will be the final in the 3-Part series – Part 3: Keeping Security Awareness Sustainable.

Reminder: If you need help getting your security awareness efforts off the ground or achieving all three goals with your cybersecurity awareness program mentioned in this series, we’re here to help.

About the Author

Kenny Leckie

Alterity | Senior Technology & Change Management Consultant

In his role as Senior Technology and Change Management Consultant, Kenny provides thought leadership and consulting to the community in areas of information security/cybersecurity awareness, change management, user adoption, adult learning, employee engagement, professional development, and business strategy. He also works with clients to develop and deploy customized programs with an emphasis on user adoption and increased return on investment. Kenny is a Prosci
Certified Change Practitioner, a Certified Technical Trainer and has earned the trust of organizations across the US, Canada, The UK, Europe and Australia.

Kenny has more than thirty years of combined experience as a Chief Information Officer, Manager of Support & Training, and now a consultant, providing him a unique point of view and understanding of the challenges of introducing change in organizations. He combines his years of experience with a strategic approach to help clients implement programs that allows focus on the business while minimizing risk to confidential, protected, and sensitive information. Kenny is an author and speaker and a winner of ILTA’s 2018 Innovative Consultant of the Year.

Exploring the Future of Work with Microsoft Copilot

Exploring the Future of Work with Microsoft Copilot: A TechCon365 Recap

Attending the Microsoft TechCon365 Conference in Seattle was an enlightening experience, particularly with the spotlight on Microsoft Copilot. Here’s a recap of my top six standout sessions.

Next Level Productivity with Microsoft Copilot
The journey began with Andy Huneycutt’s all-day workshop which showcased Copilot’s vast capabilities. Key takeaways from the workshop included the detailed overview of Copilot plus the ROI Calculation to measure Copilot’s cost-effectiveness (ROI= Time per iteration × Number of iterations × Hourly rate); a deep dive on Microsoft Graph integration, and an overview of the many Prompt Engineering techniques available.
Process Mining and AI Integration

The Process Mining session showcased the innovative integration of process mining with AI capabilities and how Copilot can analyze data to identify inefficiencies and trends, and then make actionable recommendations. The use of Power BI for creating monitoring dashboards and the anticipation of Copilot for PowerAutomate going live were also significant points of discussion. This integration represents a leap forward in process optimization, offering a glimpse into the future of automated workflow management and data-driven decision-making.

Enhancing Collaboration with Teams Premium
The session on Teams Premium highlighted its advanced features designed to enhance collaboration and meeting experiences. The session covered the add-on license, improved meeting experiences, advanced protection, richer engagement, and the creation of custom meeting templates. Intelligent Teams meetings and recaps were introduced, including automatic generation of meeting notes and tasks from transcriptions, personalized timeline markers, and mentions. The recap tab, available post-meeting, and intelligent speaker recognition were also discussed, emphasizing the need for transcription activation. The meeting underscored Teams Premium’s potential to revolutionize meeting dynamics with its innovative capabilities.
Overcoming Barriers to Copilot Adoption

Stephen Rose’s “Garbage In Garbage Out” session shared the top 10 blockers for Copilot adoption, including data overload and the need for enhanced security opportunities, providing insights for organizations aiming to streamline their technological infrastructure. His recommendations included suggestions around storage that caught the attention of digital hoarders:

  • Outdated information in archives, necessitating the purging of emails older than 12-18 months.
  • Obsolete documents in OneDrive over 3 years old and unused in the last 90 days should be moved to Azure cold storage.
  • Integration of data across platforms, ensuring all data is in the M365 Cloud.
  • Removal of non-integrated third-party apps like Box, Slack, Zoom, and Blue Jeans.
Adaptive Cards: Bringing Tools to Users
Later in the week, Derek Cash-Peterson covered Adaptive Cards, highlighting their integration with Viva Connections and the new Adaptive Card Extensions (ACE). These cards are designed to bring tools directly to users within their work context, serving as a hub for news and resources across Microsoft 365. They offer extensibility for custom functionality, presenting a collection of features accessible through an app bar, the Connections app, and a dashboard in SharePoint. The updated Teams app and mobile-friendly design ensure that Adaptive Cards cater to a wide range of users, including those on the go. With various development options, including no-code, low-code, and pro-code, Adaptive Cards empower many vendors to create web plugins, making them accessible to HR and Marketing professionals who may not be familiar with JSON. The cards are theme-aware, offer different layouts, and provide quick view options, enhancing user experience with efficient navigation and personalized content.
Copilot in OneDrive: Streamline Workflows

My last session of the conference was with Ben Truelove on the new (coming soon) Copilot in OneDrive. His moto: Spend less time doing the work to get your work done. He broke features down into 6 categories.

  • Discover allows users to quickly find information within their files.
  • Catch Up to provide summaries of file updates.
  • Organize to automate content organization,
  • Create to transform existing files into more meaningful content.
  • Banish Busywork to reduce preliminary tasks.

He shared ways to conduct Q&A on files without opening them, compare images for insights, and convert Copilot responses into documents. This final session really emphasized the continuous evolution of Copilot across the Microsoft 365 ecosystem.

Conclusion

TechCon365 offered a glimpse into the future where Microsoft Copilot and its suite of tools will play a pivotal role in the way we work, collaborate, and create. The conference was a testament to Microsoft’s commitment to innovation and productivity, providing a wealth of knowledge and a vision of a more empowered workforce.

Author: Carolyn Humpherys, Learning and Change Management Consultant, Traveling Coaches

Ready to take the next step in AI adoption? Contact us today to learn how Alterity can help you fully unlock the potential of Microsoft 365 Copilot in your organization.

Keeping Security Awareness Sustainable

A good and effective Cybersecurity Awareness Program is not a ‘set it and forget it’ kind of thing. It takes constant care and feeding. If it is important to the organization (and it is), to our clients (and it is), and to our people (and it must), then planning for its sustainability is critical.

Part 3 of this series: Keeping Security Awareness Sustainable.

Practical Ways to Keep Your Program Sustainable:

Let’s remind ourselves of the big picture of the Cybersecurity Awareness Program journey.

  • Stay the course. Don’t stop just because something doesn’t work as you expected.
  • The cybersecurity awareness program MUST be agreed to and modeled by LEADERSHIP. 
  • EQUIP Leadership (at all levels) to be successful in supporting Security Awareness.
  • Bake it into Onboarding. Start a new hire off with an understanding of the importance of security and security awareness at this organization.
  • Keep the tone POSITIVE. There’s only so much negative that people can take. Even negative stories/issues can reinforce the positive actions and awareness people need.
  • Deweaponize your Cybersecurity Awareness Program. If your program just catches people doing the wrong thing or just emphasizes what not to do, it will sour quickly in the minds of your people. 
  • Be mindful of who sends the message. It can’t just be the IT Department. Here are some suggestions:
    • Use multiple voices to get the message out.
    • Leverage top executives for messages or information that is organization-wide or strategic in nature.
    • Leverage direct supervisors to get more specific information to individuals on how this impacts them in their day-to-day work.
    • Use peer-to-peer messaging. It’s always good to hear from the “normal people” in the organization. People will often listen to their peers before they listen to IT or leadership.
    • Use outside experts to assist in your efforts. Sometimes, it takes an outside voice to get someone’s attention.
  • CLEARLY and REGULARLY state: Who to call/email; What to do if you have questions; What to do in the face of…
  • Use your metrics wisely.
    • What you do with metrics matters. Measure security awareness-related activities that show or measure changes in behavior (statistical and anecdotal). 
    • Continue to gather them. Metrics give you opportunities to tie changes in the program to trends in behaviors of your people.
  • Cadence is important. Security Awareness information can’t be a “once a year” thing. A sustainable program creates an environment that expects a steady flow of useful security information, education, and guidance. 
  • Leverage multiple learning opportunities or avenues:
    • On-demand content
    • Monthly topical emphases
    • Live Events
    • Be prepared to distribute “In the moment” communications and educational opportunities in the face of an incident that occurred, a new “Threat in the wild” for people to be aware of, or a testimonial of an organization or client event.
  • Invest in the program. It can’t be fully automated and requires time, attention, and resources.
    • Ask how big of a team the organization can afford or cannot afford.  
    • Know that you can’t do it all yourself.
    • Provide around-the-clock response.
    • Outsource elements of the program if needed.

Security Awareness is essential in today’s world. People are the target and the primary starting point for security incidents. Invest in a program that is Engaging, Relevant, and Sustainable. 

Reminder: If you need help getting your security awareness efforts off the ground or achieving all three goals with your cybersecurity awareness program mentioned in this series, we’re here to help.

About the Author

Kenny Leckie

Alterity | Senior Technology & Change Management Consultant

In his role as Senior Technology and Change Management Consultant, Kenny provides thought leadership and consulting to the community in areas of information security/cybersecurity awareness, change management, user adoption, adult learning, employee engagement, professional development, and business strategy. He also works with clients to develop and deploy customized programs with an emphasis on user adoption and increased return on investment. Kenny is a Prosci
Certified Change Practitioner, a Certified Technical Trainer and has earned the trust of organizations across the US, Canada, The UK, Europe and Australia.

Kenny has more than thirty years of combined experience as a Chief Information Officer, Manager of Support & Training, and now a consultant, providing him a unique point of view and understanding of the challenges of introducing change in organizations. He combines his years of experience with a strategic approach to help clients implement programs that allows focus on the business while minimizing risk to confidential, protected, and sensitive information. Kenny is an author and speaker and a winner of ILTA’s 2018 Innovative Consultant of the Year.

It’s All in How You Say It

When was the last time you were excited about going to a webinar? I have signed up for more webinars than I can count and about 5 minutes before each of them I find I am wrapped up in other things that I decide are more pressing. But what if it was not a webinar you were invited to, but a showcase?

A few times a year, the Alterity team rolls out enhancements to our learning portal. We send a few emails and then hold a webinar to show what we will be releasing. But this time I was not excited about holding yet another webinar. I decided we needed to change it up. We would hold a showcase instead. While it would feature essentially the same content, I wanted it to feel fresh and new.

How is a showcase different? I asked each member of the client support team to present their favorite enhancement. This meant that it was not just me talking for the entire time, it also gave the team a chance to flex their presentation skills and demonstrate their expertise.

The new format also allowed the team to inject their personal style. The team member who always enjoys showcasing new virtual backgrounds found us a fun red curtain spotlight image, so we were all coordinated with the showcase theme. I also had each person introduce themselves with the information they planned to share.

So, did this simple wording change work? Yes! We had the largest registration ever. We also had requests for the recording, even from those who attended.

Sometimes it’s as simple as how you word things from the beginning. Do you want to hold a training session or a technology showcase? Feel free to get a little creative! It’s amazing how a few simple word changes can grab someone’s attention.

 Author: Molly Wolfe, Director of Learning Development and Client Support