Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
Duration: 1:59 Minutes
This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle.
This social engineering module teaches a three-step method to add clarity to a confusing conversation, verify suspicious requests and identity theft prevention prescribed by the Red Flags Rule.
Use the WORKed Teaser video to draw attention to your campaign and preview what's to come.