Need to Know: Business Email Compromise
Karen is asked to process an unusual request, but it's not her department. Is it business as usual, or is there something more sinister going on here?
Malware and PHI for Managers
This training outlines steps healthcare managers can take to proactively keep PHI secure. Suggested security policies and staff communication strategies are also introduced in this module.
Need to Know: Downloading Suspicious Files
When a suspicious file arrives, Anthony helps Erica figure it out … sort of.