Hackers often target protected health information (PHI) using malware, or malicious software. Malware infections are considered a HIPAA security incident and can lead to severe penalties, as well as loss of information and patient trust. This module will teach healthcare professionals how to identify malware, and outline preventative actions organizations can take to avoid malware infections.
This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.
This brief video extrapolates on how many people are authorized to access one person's health records.
The Red Flags Rule requires financial institutions and creditors to develop written programs, or an Identity Theft Prevention Program, to detect and avoid identity theft. This module will explain the program requirement, define key areas of the regulation and detail the four required steps of an Identity Theft Prevention Program: identifying red flags, detecting red flags, responding to red flags and updating the program.
We believe you'll improve the reach and integrity of your security awareness training with insights from Gartner. Build and empower your squad of security champs today!