This micro-learning module highlights the importance of using secure connections when conquering a mountain or sending sensitive data over the Internet.
Duration: 0:35 Minutes
The Art of Cyber War: Data Retention
Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.
Secure Data Storage Assessment
Handling SSA Provided Information
This module will review basic safe, federally-required practices for safely using and storing SSA-provided data, including best practices, review of certain applicable laws, and civil and criminal penalties for PII loss.