Building a Strong Tutoring Relationship

A senior security consultant with Verizon Communications, Emblez Longoria earned his bachelor’s degree in business management summa cum laude from Rosemont College. Alongside his career, Emblez Longoria has volunteered as a tutor.

Helping students as a tutor can be a rewarding opportunity. In order to achieve success in this area, it helps to build a good relationship, following these three strategies:

1. Help Students Relax
Encourage them to talk by being friendly, asking questions, and listening carefully. Avoid showing any impatience or other negative emotions in your body language when they struggle to learn a concept. When you respect their efforts, even if they make a mistake, they will learn to trust you.

2. Make Learning Fun
You can include related interesting facts or make humorous quips as you go through the material. The more engaged students become, the better they will learn.

3. Encourage Independence
When students struggle, you may be tempted to give them the answers, but instead help them work through the problem. You can rephrase questions to give them a different perspective. They need to see you as a trusted aid in their learning process rather than as the source of answers. Then, they will gain valuable learning skills for continuing their studies.

Advertisement

Three Tips for Reducing the Potential for Security Breaches

Reducing the Potential for Security Breaches pic
Reducing the Potential for Security Breaches
Image: new.iatric.com

A Certified Protection Professional (CPP), Emblez Longoria plays a vital role in managing risk as a senior security consultant at Verizon Communications. Emblez Longoria reduces loss by implementing measures that reduce the potential for employee misconduct, acts of sabotage, and security breaches.

Those measures include the following:

1. While experience in the information technology sector is useful, a company should consider establishing relationships with colleges to train the next generation of security experts. Creating internship and training programs for new professionals is an opportunity to groom young employees to handle future responsibilities.

2. In addition to data-loss-prevention technologies, an employer should invest in a system monitoring program that evaluates insider behavior. In doing so, a company can create rules to block content from leaving internal networks.

3. Instead of conducting vulnerability assessments once a quarter, a business should perform them once a week. This alerts management about potential internal and external network breaches, so they can take precautionary measures to reduce the risk sooner.