Friday, May 29, 2020

Legislation Take Center Stage at DC Fly-In

With multiple pieces of legislation coming, Bivens Collinson flagged a few that are worth tracking. Starting with a bill that aims to give the President more power. The bill says that if the President makes a positive determination then that has to come to Congress and if they don’t agree, they have to pass a disapproval resolution.

Another bill says that before the President can take action, he must send his intent to Congress and they have to approve before the action can be taken. Bivens Collinson said that this one may have some teeth.

In talking about Section 301 tariffs, she says that right now there’s not a process in place to try and get a product excluded from the third tariff list.

“If you don’t have a process because the product is unique and not made anywhere else but China, you can try to get it excluded. That doesn’t exist right now, but this bill is trying to put that into place,” she said.

During the State of the Union address, President Trump also talked about the ability to unilaterally impose tariffs on countries at the same rate at which they impose them on us. While the bill currently has 18 sponsors, Bivens Collinson admitted that she thought this would end up being a complicated mess.

More Info: comptia a+ salary

Thursday, May 28, 2020

DC Fly-In Attendees for Infrastructure

Technology leaders and business owners from across the nation converged on Capitol Hill for CompTIA’s 2019 DC Fly-In Feb 5-6. The two-day event kicked off with a series engaging panels, a Capitol Hill Speaker Series that featured current and former government officials, and more than 170 meetings with Members of Congress.

The central message delivered to members of the House of Representatives and the Senate concerned the role smart technologies should play in building the nation’s infrastructure. Because both Congress and the White House have prioritized infrastructure and a potential funding package for infrastructure, CompTIA wanted to make sure the technology industry was part of any discussions going forward.

“The annual Fly-In is an important opportunity to elevate our industry’s voice to policymakers in D.C.,” said Elizabeth Hyman, Executive Vice President of Public Sector and Advocacy (PSA) at CompTIA. “From rural electrification to the national highway system, America has a history of creating infrastructure milestones that have led to significant prosperity and national advantages. The future will no doubt rest on the next generation of infrastructure.”

A federal infrastructure funding package, which has been discussed but not introduced at this point, would help to modernize outdated infrastructure in a wide variety of sectors, including transportation, and energy.
More Info: comptia it fundamentals salary

Wednesday, May 27, 2020

Ethical Problems in Computing

Editor's Note: This is the third of a series of articles on Ethics from 1991 AITP President and faculty member of the University of Notre Dame, Lou Berzai, CSP, CCP. This article was a paper from some theories discussion in Lou's ethics classes.
The first two articles are:
How Ethical Theories Apply to IT Professionals
Ethical Decision Making and the IT Professional

Because of its constantly changing nature, the area of computer technology is one that is difficult to assign a specific set of moral codes, although it is necessary that ethics be considered when making decisions in this area. Computing creates a whole new set of ethical problems, unique unto itself.

Such problems include:

"…the unauthorized use of hardware, the theft of software, disputed rights to products, the use of computers to commit fraud, the phenomenon of hacking and data theft, sabotage in the form of viruses, responsibility for the reliability of output, making false claims for computers, and the degradation of work.” (Forester 4)

These problems engender a whole new set of ethical questions, including:

"is copying software really a form of stealing”
"are so-called ‘victimless' crimes… more acceptable than crimes with human victims”
"does information on individuals stored in a computer constitute an intolerable invasion of privacy?” (Forester 4 – 5)

These questions demand that ethical principles be applied to their resolution because without the consideration of ethics, these gray areas can easily become completely black.
More Info: a+ network+ security+ jobs

Tuesday, May 26, 2020

Does this skill relate to my current job

In my career, it has always been easier to prepare for a certification that covers technology that I am working with. When I’m labbing eight hours a day on the job, it means less time labbing at home and more time reading and studying notecards. #LabEveryday

Part-time or Freelance Jobs

Usually having a part-time job, freelance job or internship involves many of the same responsibilities a full-time job does – just on a smaller scale. This is something that potential employers absolutely want to see as it gives them tangible proof of the experience you’ve gained. The example below does a great job of promoting experience earned via an internship and a freelance gig.
Freelance Social Media Coordinator, Central Technology Solutions, Feb. 2017 – Dec. 2018
Managed social media accounts and created social media for daily postings
Analyzed and reported on performance of posts
Increased social media following and clicks by 200%
Web Developer Intern, Capitol Media, Apr. 2016 – Jan. 2017
Performed coding, testing and production support
Created design documents
Worked in a collaborative development environment

Taking on a side gig while you’re seeking a more permanent job situation not only shows that you are dedicated to your career, but it shows you take initiative as a go-getter.
More Info: comptia certified jobs

Friday, May 22, 2020

IT pro or aspiring pro start to gain these skills

CompTIA certifications can be a good place to start, and the CompTIA Infrastructure Career Pathway includes certifications that align with DevSecOps.

First, you have to understand the device you’re coding to, the endpoint—whether it’s a car, a crane, a PC, a fridge, a phone, a watch, etc. CompTIA A+ teaches the fingerprints of what a device does.

Once your device sends a transmission—to buy something or contact customer service or whatever—CompTIA Network+ helps professionals gain the skills needed to implement functional networks.

Because so much is being done in cloud, CompTIA Cloud+ is also important for network professionals. The skills covered by CompTIA A+, CompTIA Network+ and CompTIA Cloud+ apply to both DevOps and DevSecOps.

Are you ready to learn more about in-demand skills employers are seeking? Join cybersecurity and transformation strategist and evangelist Laszlo Gonc, co-founder and managing partner, Next Era Transformation Group, LLC and CEO and president, Gonc & Associates, LTD, for The Path to Modern DevSecOps, an informative and educational webinar on March 12 at 3 p.m. Central. During this webinar, you'll:
Find out what is DevSecOps and why it matters.
Understand what skills are required to be a DevSecOps engineer.
Learn six best practices for successfully practicing DevSecOps.
Discover online resources to upgrade your talent toolbox.

Finally, for DevSecOps, CompTIA Security+ helps IT pros make sure hackers can’t get in. These skills are fundamental for any security pro, and there can’t be any gaps in knowledge when it comes to protecting the network.


More Info: jobs you can get with a+ certification

Thursday, May 21, 2020

Make a Position Attractive Beyond Just Pay

Rockoff notes that regardless of the size or vertical of a business, few are going to be able to compete on salary with companies like Google, Facebook or Apple – for obvious reasons. So how can startups and others keep top talent from getting pulled into the gravity of the Silicon Valley giants?

“Work-life balance is big,” Rockoff said. “The ability to be a remote worker is big. Upward mobility is a massive one.”

And it’s a specific type of movement up in a company that Rockoff has seen as being most effective in drawing and retaining today’s tech employees: They don’t just want a promotion, they want a challenge.

“A problem with a lot of tech workers today is they get pigeonholed,” Rockoff said. “When I’m hiring tech talent into in the enterprises I work on I’m saying, ‘You have a primary responsibility but we also want to give you secondary and tertiary responsibilities, which you may not have as much familiarity with, but these things that will help you with your career.’ Where we can mentor them, where we can offer them exciting opportunities but also give them the opportunity to learn, we’re selling our experience – not just simply a job.”

With tech workers increasingly looking at jobs as places for skills expansion, Hensley has likewise seen offering career development resources – and covering the cost – as a way to compete.

“A question [job seekers] ask now in the interviews is they want to know what certs we pay for,” Hensley said. “People know we pay for certs, we pay for tests and training materials people in the community know that we invest. But we expect them to pass, too.”
More Info: comptia a+ jobs near me

Wednesday, May 20, 2020

CompTIA Cybersecurity Career Pathway

Unfortunately, given the many attack vectors that exist, and the fact that hackers are constantly finding new ways to use technology to exploit weak security practices, the odds are increasing for companies to experience some form of data loss or breach in 2019. Despite taking necessary precautions, mischief makers may still get beyond the company firewall. It is important to have an action plan in place to help deal with such an event before it happens. In fact, planning ahead could help your company mitigate damages.

Business disaster and continuity planning is just as important for cyber-threats as it is for physical threats. Similar to how businesses buy insurance policies to protect themselves from fires, hurricanes or floods, they can also purchase insurance policies to protect against loss from cyber-attacks. Cyber insurance policies, also known as cyber liability insurance coverage, provide a company with the necessary assistance to deal with the investigations, lawsuits or privacy violations that may have resulted from a data breach.

The cyber insurance market is estimated to double by 2020, with the boost to the market likely due to an increase in cyber risk awareness among C-level executives and high cyber-related losses. Consider whether a cyber insurance policy makes sense for your company.

The bottom line is, cybersecurity is a necessity that many businesses put on the back burner until they are in the middle of a crisis. However, this lapse can lead to severe financial losses and damage to a company’s reputation. By conducting an internal audit, training and monitoring employees, and planning ahead for how to respond to and recover, companies will be better prepared and protected, should threats come knocking in 2019.
More Info: entry level it certifications

Tuesday, May 19, 2020

Why Should I Get CompTIA Linux+

You get the industry brand recognition that comes with CompTIA. Many IT managers and human resources departments are very familiar with CompTIA certifications – they know that if the certification ends with a + symbol, it’s a good skills benchmark.

The added focus on security, troubleshooting, server configuration and cloud computing better aligns to the job roles that require proficiency in those areas, compared to other, similar Linux certifications on the market.

For most jobs involving Linux and/or UNIX, CompTIA Linux+ is the only Linux certification that you will need, as it covers the general administration tasks that most organizations seek when hiring for Linux/UNIX administration positions. Advanced topic areas not tested on Linux+ often involve specialized configuration that is specific to a particular organization and Linux distribution or UNIX flavor. Those who have a working knowledge of the general administration concepts tested on CompTIA Linux+ can easily research and perform these advanced configuration tasks as necessary.
Give honest yet constructive feedback.

Perhaps you felt a few steps in the onboarding process were confusing, or that interns had little direction. Perhaps you had hoped there would be a different way to communicate with other departments or hoped to see how programs were developed. All of it is helpful—if delivered properly and politely. Letting the HR department know of small things that could make a big difference would be helpful to their future internship program. Present the information graciously and without judgment, but framed as areas of improvement is not only helpful to the company, but good practice for you for learning to communicate constructive criticism in the future.

Monday, May 18, 2020

How to Use Git for Local Version Control

Git essentially takes snapshots (called commits) of the files that you have within a particular folder (called a repository, or repo) on your system.

Each commit contains the changes you’ve made to the files since the last commit, so you can easily rollback those changes (much like a Windows System Restore point).
git config

Before you use Git to create commits, you must first tell Git about yourself using the git config command, since that information must be added to each commit that you create:

[jason.eckert@csc-studev01 myscripts]$ git config --global user.name "Jason Eckert"

[jason.eckert@csc-studev01 myscripts]$ git config --global user.email "jasonec@trios.com"

To turn an existing folder into a Git repo, simply use the git init command.

For example, if you are in the myscripts directory under your home directory on a Linux system, you could run the following commands to turn the myscripts directory into a Git repo (this will also create a hidden .git folder underneath the myscripts directory):

During the two-day conference attendees discussed issues, concerns, and recommendations for the HS going forward. At the conclusion of the conference the WCO Secretariat and attendees agreed to propose to the WCO Policy Commission at its next meeting in June 2019 that it support the implementation of a project to further examine potential areas of change for the Harmonized System. The project would continue the consultation process, gather further information on issues, conduct a feasibility study, and make subsequent recommendations to the Policy Commission.
More Info: comptia it fundamentals jobs

Friday, May 15, 2020

How to Get into Cybersecurity

The CompTIA Cybersecurity Career Pathway helps IT pros achieve cybersecurity mastery, from beginning to end. The centerpiece is the CompTIA Security+ certification. It establishes the foundational knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. With performance-based questions, it emphasizes the hands-on practical skills used by junior IT auditors, systems administrators, network administrators and security administrators.

After earning CompTIA Security+, cybersecurity professionals can take the next step by pursuing an intermediate skills-level cybersecurity certification, such as CompTIA Cybersecurity Analyst (CySA+) or CompTIA PenTest+.

The CompTIA Cybersecurity Analyst certification assesses the skills needed to apply behavioral analytics to networks to improve the overall state of IT security. The certification covers tools such as packet sniffers, intrusion detection systems (IDS) and security information and event management (SIEM) systems. After the seminal Target attack of 2014, the security analyst job role has gained more importance, making these skills essential for most organizations.

While CySA+ focuses on defense through incident detection and response, CompTIA PenTest+ focuses on offense through penetration testing and vulnerability assessment. It involves launching attacks on systems, discovering the vulnerabilities and managing them and is intended for cybersecurity professionals tasked with identifying, exploiting, reporting and managing vulnerabilities on a network.

The progression from CompTIA Security+ to CompTIA CySA+ and/or CompTIA PenTest+ is logical because Security+ assesses the knowledge, skills and abilities (KSAs) an IT professional demonstrates after two years of cybersecurity field work, and CySA+ and PenTest+ assess three to four years of cybersecurity field work.
More Info: entry level a+ certification jobs

Thursday, May 14, 2020

Does Compliance Inhibit Cybersecurity

Finalizing the list required input from the broader community. At CompTIA’s Communities and Councils Forum in March, the attendees of the EmTech community meeting deliberated further, adding personal experiences to better define short- and long-term potential. After discussing all the evidence, the community cast their votes, and the 2019 Top 10 Emerging Technology list was set.

The new list represents many different aspects of emerging technology. Internet of things (IoT) and artificial intelligence (AI) have perhaps the greatest potential to blend technology initiatives with business objectives. 5G and blockchain are enabling technologies that could launch a brand new wave of applications. Robotics, 3D printing and drones are currently niche domains that are finding broader use cases.

I was lucky enough to have a very, very engaged audience. In fact, the discussion lasted long after my initial talk when I spoke with several folks at the CompTIA booth about a topic that I had mentioned quickly during my presentation.

I brought up the concept of compliance in a rather snide way. It’s one of the truisms in cybersecurity for people to take a bit of a dim view of compliance-based approaches. The general wisdom is that even though an organization might be, say, Payment Card Industry Data Security Standard (PCI) compliant, Health Insurance Portability and Accountability Act (HIPAA) compliant or even General Data Protection Regulation (GDPR) compliant, that organization can still get majorly hacked.

After all, compliant organizations have been hacked: Marriott, Equifax, British Airways, Managed Health Services of Indiana, Dunkin’ Donuts and many others were all compliant to various standards when they got hacked. The logic among some cybersecurity pros is that compliance can actually cause more harm than good.

I basically stated this idea, quoting a pen tester I know from MasterCard, who told me at RSA San Francisco 2019 that “the compliance industry has a lot to answer for.” Even though he ended his sentence with a preposition, I thought his statement was worth repeating. Quite a few folks at CyberUK agreed; I saw quite a few nodding heads.
More Info: jobs that require a+ certification

Wednesday, May 13, 2020

IoT and AI open new possibilities in ambient computing

As the Internet of Things (IoT) continues to grow, every object could become a computing device. Meanwhile, artificial intelligence (AI) will automate tasks to reduce complexity and scan the environment to understand context. The net result will be ambient computing, whereby activity that was once confined to a device will take place seamlessly with minimal user interaction. This will change IT support, which will move from tactical maintenance to strategic enablement.

An example of ambient computing in motion is smart lighting, which can automate itself, recognising when a device enters a room or operating on a schedule built through pattern recognition. For example, lights will turn on earlier or later as the seasons change and the sun is in a different position.

Join CompTIA Chief Technology Evangelist Dr. James Stanger for the next IT Pro Webinar as he speaks with Linux expert Denise Dumas from Red Hat. We’ll also be talking to Stetson Blake from OmniSci, who has years of experience with Linux and is currently working toward his CompTIA Linux+ certification.

This, however, creates potential security risks as even the humble lightbulb becomes connected to the internet. This puts the onus on channel partners to help customers understand their security vulnerabilities and how to address them.


More Info: a+ certification near me

Tuesday, May 12, 2020

How to Become an IT Training Specialist

Colleges and universities often require their instructors to have a teaching degree and/or teaching certification . But training positions with other organizations or corporations may not require a teaching degree.

For example, CompTIA Training Strategies Group (TSG) hires IT trainers to teach its fast-track, short-term classes. About 85% of TSG classes are currently offered in person instead of online. The topics range from industry-recognized certifications offered by CompTIA, Microsoft and Cisco, for example, to soft skills, Salesforce and business analysis.

“We look for men and women who are passionate about technology and passionate about people,” says Turner said. TSG trainers come from a variety of backgrounds and typically don’t have to develop their own course material.

When it comes to training for IT certifications, an instructor is generally required to hold the certification that they are teaching to, and most training companies also prefer experience as a tech worker. Holding a certification specifically in training, such as CompTIA Certified Technical Trainer (CTT+), can go a long way toward proving IT training skills. In addition, successful instructors assume the student role quite often to stay up to date on knowledge and skills, as tech is always growing and evolving. The most successful instructors love to learn new things constantly.

Those with non-technical teaching experience can get started in IT instruction by earning CompTIA CTT+ as well as technical certifications such as CompTIA IT Fundamentals (ITF+) and CompTIA A+. Check out the CompTIA Career Roadmap to see what other IT certifications can help you build a portfolio of knowledge to impart on others.
More Info: comptia a+ certification jobs

Monday, May 11, 2020

Here Are the Top Reasons IT Pros

Thinking about putting down roots in a new city? If you’re a tech pro, then you’re not alone.

Tech on the Move, a new study from CompTIA, found that 78% of tech workers would consider leaving their current city for a new job, citing affordability (60%) and local economy (56%) as major factors driving the decision.

With more than 260,000 new IT jobs opening in the United States last year alone, it’s no secret that tech talent is in high demand. But have you thought about where an IT salary goes the furthest? Or what matters most to you when it comes to making decisions about where to live and work?

As housing costs continue to rise in pricey coastal hubs, the study found more tech pros are considering jobs in areas where cost of living is lower, the climate is desirable and traffic is less of a headache.

Tech pros ranked three factors as most important when choosing where to live:
Cost of living (82%)
Weather and climate (64%)
Commute times (62%)

When it comes to choosing an IT job, they ranked job security (73%) and income/salary (69%) as most important.

“It's definitely a multifaceted approach,” said Ptak. “Looking at the middle school age range, we can say, ‘Here’s this whole entire toolkit up for you,’ and that’s really helpful. For those in the high school to college range, we tie it into the mentorship and shadowing program and say, ‘Who is currently graduating that we can promote a career in technology to?’”

The biggest message, according to Ptak, is that tech is for everyone, and an approachable education that starts early will push the industry forward by providing exciting and rewarding career paths and opportunities. Last year, BYTE worked with TSA to bring the program to ChannelCon, CompTIA’s premier conference for tech leaders and companies. Students had the opportunity to shadow a professional, ask questions and see the behind-the-scenes of what a career in tech could be like.

“The ChannelCon experience is by far my favorite because [the students] were just mind-blown about being at ChannelCon and being able to see and speak to everybody. They got to pick the attendees’ brains about working in tech and the different areas and fields that you can go into. It was amazing.”

More Info: jobs that require comptia a+ certification

Friday, May 8, 2020

Linux and Cybersecurity

Now once you’ve got that basic understanding, keep building on that. Start playing with different distributions of Linux. Start looking at things like Kali Linux. Kali Linux is a great little hacker’s toolkit.

I know some people consider people that use Kali as basically just kind of script kiddies, in other words, people that only really know how to use the pre-made tools. But there are some things that Kali does really well. And I’m not going to sit here and reinvent the wheel when I’ve already got a tool that will do part of the job for me.

A couple of months ago on this podcast, we featured Todd’s speech to members of the TSA, the Technology Student Association, as he shared his journey from tinkering with toys to running an organization that serves the world’s $5 trillion IT industry.

How did Todd grow from Lincoln Logs to leadership, teamwork skills, especially the ability to collaborate across perceived boundaries of age and experience? In this conversation from CompTIA’s ChannelCon, he breaks it down for us.

TODD: Today we have people from baby boomers all the way down beyond millennials in the workforce at the same time. And one of the important things that needs to happen in the tech industry, in particular, is to get a good generational transfer of knowledge because things change, but a lot of things stay the same, too.
History is a good educator, so we need to make sure that people are able to work effectively with people older than them who have different values and different perceptions and that the people at the other end of the scale can work effectively with people who are younger than them, who have different values and different expectations.
More Info: computech a+ certification

Thursday, May 7, 2020

Saying About CompTIA IT Certifications

CompTIA Security+ is one of the most popular IT certifications for 2019, according to Global Knowledge. It said that 4.5% of IT pros intend to earn the cert this year. Many employers require tech professionals to acquire CompTIA Security+ before they can be considered for non-entry-level IT positions of all types.
Global Knowledge noted that CompTIA Security+ can help tech professionals earn up to $110,321 per year. Now that’s a certification that pays for itself.

Other popular IT certs for 2019, as mentioned by Global Knowledge:
Amazon Web Services (AWS) Certified Solutions Architect
Certified Information System Security Professional (CISSP)
Cisco Certified Network Associate (CCNA) Routing and Switching

Business News Daily also listed CompTIA Security+ in its top 5 information security certifications for 2019. It stressed that the cybersecurity skills gap is soaring, with almost 302,000 cybersecurity jobs vacant in the United States today.

Business News Daily touted CompTIA Security+ as a valuable IT certification due to its vendor-neutral nature and ability to equip IT pros with high-level tech skills and expertise in a variety of disciplines related to security.

Other top IT certifications, as listed by Business News Daily:
Certified Ethical Hacker (CEH)
Certified Information Security Manager (CISM)

Lack of training and resources. All too often technology staff find it difficult to attend conferences and seminars. While in some cases tech staff feel they are too busy and don’t have the time – more often than not they are told there is no or little money for training and travel to meetings. When one realizes the many millions of dollars in hardware, software and program budgets that staff are asked to maintain and manage, it is almost negligent not to insist that staff stay abreast of the latest trends and developments by participating in professional/technical programming and events - beyond the use of online resources and tools.

Added to the list is the lack of certified CIOs were the need has never been greater. Any recognized professional certification program requires the obligation of recertification as there are always changes going on impacting all levels of hardware and software systems. If local government are unwilling or unable to invest in the required competencies then they should seriously consider outsourcing. I am always disheartened to learn how few staff are certified in network and cybersecurity.

More Info: a+ certification jobs

Wednesday, May 6, 2020

Myths About Drones in Business

The business value of drone technologies is increasing, according to CompTIA’s new Drone Market report, along with the opportunity for solution providers to create innovative solutions around unmanned aerial systems (UAS) that solve real business problems.

But there are still a lot of myths and misconceptions about what drones do and how they do it. All it takes is one sensationalistic story to undo all the good (and potentially life-saving) things drones can accomplish. It’s a challenge that members of CompTIA’s Drone Advisory Council, comprised of drone technology business leaders, see every day. Here’s are five myths identified by several council members, and the truth behind each one:
Myth 1: Drones are Spying on You

Many businesses shy away from drone technology because of negative portrayals in the media that drones are just noisy nuisances that invade privacy. That’s simply not fair, said Douglas Spotted Eagle, director of education and training programming at Las Vegas-based Sundance Media Group and vice-chair of CompTIA’s Drone Advisory Council.

“You can’t make those generalizations. The vast majority of industries are not familiar with what drones bring to the table. Because of what they don’t know, they don’t turn a blind eye; they simply don’t have an eye on it at all,” Spotted Eagle said.

AviSight, a Las Vegas-based drone solution provider, produced an educational video to share with customers that may have concerns. “This helps change the perceptions that some might have,” said Mike Frechette, co-founder.
More Info: what jobs can i get with a comptia a+ certification

Tuesday, May 5, 2020

The Value of Cybersecurity Analysts

In the past, perimeter network solutions such as firewalls were adequate. Firewall rules were set, and bad network traffic was blocked. Anti-virus software was installed, and malware was contained.

But traditional security tools alone can no longer protect networks. While they are still required, cybersecurity analysts play a critical role in robust cybersecurity strategies.

Skilled cybersecurity pros add the following capabilities to traditional security tools:
Apply behavioral analytics to IT networks
Identify network anomalies that indicate bad behavior
Focus on network behavior in an organization’s interior network

The intermediate-level job role of cybersecurity analyst addresses the above capabilities and the following skills:
Threat management
Vulnerability management
Cyber incident response
Security and architecture tool sets

Cybersecurity analysts filter network traffic in real time to find bad behavior. For example, if a temporary account with administrative rights downloads sensitive information, the threat should be identified and managed. All cybersecurity professionals need these skills.

One of the biggest dilemmas for cybersecurity analysts is, “How do we identify an APT once it breaches our systems?” I worked with a cybersecurity analyst in Austin, TX, who identified anomalies on a network that indicated bad behavior. When he checked the security information and event management (SIEM) solution, he found 90,000 high-risk security alerts in one day.
More Info: jobs for a+ certification entry level

Monday, May 4, 2020

How Can SMBs Attract Gen Z Employees?

Business managers, hiring managers, recruiters, CEOs and anyone looking to tap into this fresh, vibrant talent pool—and you certainly should be—would be well served to listen to the Gen Z candidates’ long-term goals. Flashy signing bonuses and in-office office perks like round-the-clock access to snacks and ping-pong tables, aren’t as novel to the Gen Z employee. They want to talk about their autonomy, their ambition, growing their tech skills, and the positive impact of a company is making.

Also, Gen Zers want you to trust them. Shaara Roman, founder and managing partner of The Silverene Group, recently said on the Top Employers Institute podcast, “Millennials are tech savvy; Gen Z are tech native.” Gen Zers have always known a world that includes social media, smartphones and smart appliances, apps, and online infiltration of real-world events—whereas Millennials grew up parallel to those innovations, learning as it happened. As a result, Gen Zers are hyper-efficient about finding information, navigating the Internet and resources, and multitasking effectively. While there’s always a learning curve to a new job and company, Generation Z employees want their supervisors to know that they know what they’re doing when it comes to technology.

Another important takeaway is that hiring practices and company culture is not one-size-fits-all. In fact, a healthy company will evolve with the mainstream culture, adapting to be inclusive, equal and diversified in background, education, ability and emotional intelligence.

According to a Glassdoor report about Gen Z workers, “The competition to catch the attention of the newest generation of workers and potential applicants will likely favor employers who can demonstrate—via their job descriptions, interview processes and other online forums—that they value culture, career opportunities and trust in senior leadership, along with a balance of benefits that appeal to Gen Zers.”
More Info: comptia jobs