Social Engineering for Healthcare Managers
This module will explain the various social engineering methods hackers use, review HIPAA requirements regarding external requests for PHI, and teach managers how to work with staff to prevent PHI breaches and leaks.
Don't Be a Target: Your Trust
Social engineering requires contact and trust, and frequently occurs over the phone or through text messages.
Core Concepts: Multi-factor Authentication
It takes more than passwords to keep your data safe. Dive into the world of multi-factor authentication and explore text tokens, biometrics and more.