Using E-mail
Duration: 20 – 30 Mins
Description:
E-mail is a fundamental part of everyday life for most people – not only at work, but also at home. Security concerns aren’t reasons to stop using e-mail. Instead, we would like to make you aware of what the issues are and how to deal with them. This course will tell you about some of the dangers and suggest measures that you should take to minimize the risks.
Learn More
Dealing with Documents
Duration: 20 – 30 Mins
Description:
These documents often contain sensitive information that requires our protection. So it is important that we all understand how documents are to be protected, when they should and shouldn’t be released, how long they need to retained, and how they should be destroyed once they’re no longer needed.
Learn More
Securing Your Computer – Part 2
Duration: 20 – 30 Mins
Description:
In this course we will look at passwords – shows main line of defense against many attacks. We will talk about how attackers could “crack" your passwords, and how you can help to prevent this by choosing strong passwords and protecting them well.
Learn More
Securing Your Computer – Part 1
Duration: 20 – 30 Mins
Description:
In this course, you will get introduced to some simple measures that you can take to make sure that your computer and all of the data stored on it – remain secure.
Learn More
HIPAA and Electronic Patient Information
Duration: 20 – 30 Mins
Description:
This course will help you understand your role in protecting and securing electronic patient information as required under the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Learn More
Information Retention and Destruction
Duration: 20 – 30 Mins
Description:
This course discusses the reasons why information should be kept and destroyed, how the retention period is affected by the nature of the information and the storage media, and examines some key factors in secure destruction of information.
Learn More
HIPAA Security for Healthcare Staff
Duration: 20 – 30 Mins
Description:
This course is designed for healthcare workers who create, process or otherwise manage electronic patient information as a core function of their regular duties.
Learn More
Understanding Copyright
Duration: 20 – 30 Mins
Description:
Copyright is a complicated issue and not many people understand its complexities. But, failing to follow copyright laws can quickly land individuals and organizations in court. This applies to information on paper such as books, magazines and newspapers, and electronic materials such as web pages, music CDs, DVDs and software.
Learn More
Dealing with Spyware
Duration: 20 – 30 Mins
Description:
Spyware has become a very real problem – both at work and for home users. Spyware can slow down computer performance, generate annoying pop-up windows, send confidential information to hackers or even make a computer unbootable.
Learn More
Social Engineering
Duration: 20 – 30 Mins
Description:
Although sometimes neglected in favor of technical security measures, social engineering can often be the Achilles’ heel of an organization. Hackers and other criminals may well find it easier to trick unsuspecting employees out of sensitive information than to break through other security systems.
Learn More
Avoiding Identity Theft
Duration: 20 – 30 Mins
Description:
In this course students are introduced to some of the ways that identity theft can happen, what preventative steps can be taken to minimize the risks, and what to do should the worst happen.
Learn More
Safe Surfing
Duration: 20 – 30 Mins
Description:
The number of people now accessing the internet – both at home and at work – is staggering. But few of them seem to realize that they are connecting themselves to a huge, unregulated and insecure computer network. And that brings with it a large number of risks.
Learn More
Information Security and Mobile Devices
Duration: 20 – 30 Mins
Description:
Mobile devices such as laptop computers, cell phones and PDAs can make life much easier. But they also create serious information security risks that need to be considered since users may be taking sensitive information outside the carefully controlled office environment.
Learn More
Secure Use of E-mail
Duration: 20 – 30 Mins
Description:
These days, email is a critical part of everyday life for most people. But it also brings with it a host of problems including viruses, spyware and spam, and the potential for problems if sensitive information is not handled and stored correctly, or if the email system is misused.
Learn More
Physical Security
Duration: 20 – 30 Mins
Description:
“Physical Security" is designed to heighten students’ awareness of physical security, and to remind students about the steps that they can take to support their organization’s security policies.
Learn More
Best Password Practices
Duration: 20 – 30 Mins
Description:
One of the most fundamental security measures that any organization can implement is a sound password policy. But getting users to comply with the policy is often the stumbling block to success. It’s difficult to make staff understand the importance of the measures, and help is seldom offered to make it easier for people to create and remember strong passwords.
Learn More
Defend Yourself against Viruses
Duration: 20 – 30 Mins
Description:
Nowhere is the need for education more acute than in the field of viruses and malicious software (or ‘malware’). The damage resulting from viruses each year runs into billions of dollars.But, even if you’ve installed sophisticated perimeter defenses, one user circumventing these precautions can mean that you’re in trouble.
Learn More
An Introduction to Information Security
Duration: 20 – 30 Mins
Description:
The basic aims of any information security program can be summarized by these 3 principles: Confidentiality, Integrity and Availability. This course defines these 3 terms, provides examples of security breaches and explores how an organization’s policies, standards and procedures impact safety and security.
Learn More