Online Training and Education Cyber-Criminals and Hackers go after the Easy Targets or the “Low Hanging Fruit” which is often the personnel or employee on the inside. In an environment where collaboration is part of the workday like in many organizations, working together and trusting each other or comradery are crucial elements in the any workplace. N2CyberAwareness.com The problem is with others, outside of your organization that takes advantage of this trust and comradery. These are the cyber criminals and Hackers who are exploiting a strength but also a weakness that of the trust that exists within the organization community. Custom Online Training & Assessment Programs Our Training & Assessments focus on following types of threats Protect your Organization with Computer-Based Online Training & Assessments 1. Data Theft: Cyber criminals can steal our patient’s highly confidential information by hacking your computer or compromising your work accounts. 2. Identity Theft: Cyber criminals can steal and commit fraud with your personal information, including your credit card data, medical history or bank accounts. 3. Attacking Others: Cyber criminals can use your computer to harm others, including hacking other computers and launching attacks on other computers, as well as distributing malicious software to other computer networks. N2 Cyber Security Consultants, LLC United States Phone: (352)-215-9040 Fax: (847)-890-6559 N2cyberawareness.com N2consultinginc.com [email protected] Social Engineering Phishing Emails and Phishing Scams Data Leakage Intellectual Property Theft Social Media Security and Malware Bring Your Own Device (BYOD) Mobile Malware and Rogue Mobile Applications Advanced Persistent Threats (APT) and Advanced Attacks Our online computer-based training consists of the following three modules: Module 1: Data loss through People: Phishing, Social Engineering and Theft of Devices Module 2: Viruses, Malware and Rogue Mobile Applications Module 3: Advanced Attacks Who & What is At Risk? Economy Defense Transportation Medical Government Telecommunications Energy Sector Critical Infrastructure Privacy and Security of Electronic Health Records (EHR) Security program components and regulatory requirements (HITECH, HIPAA, Breach Notification Laws, State Laws) Mandatory Privacy and security awareness training for all staff The Electronic Healthcare Network Accreditation Commission (EHNAC) and The Health Information Technology for Economic and Clinical Health Act (HITECH) make mandatory that all candidates must provide, at a minimum, annual job training for all employees and contractors with access to Protected Healthcare Information (PHI). This training must include breach reporting and notification, privacy, confidentiality, and security. {581} 45 C.F.R. § 164.308(a)(5)(i); HITECH § 13402 The Federal Information Security Management Act (FISMA) 44 USC 3544(b)(4) mandates that each federal agency provide periodic training in computer security awareness and accepted computer practices for all employees, contractors, and volunteers Personally Identifiable Information (PII) Information that permits the identity of an individual to be inferred directly or indirectly PII includes any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, a legal permanent resident, or a visitor to the United States N2 Cyber Security Consultants, LLC United States Phone: (352)-215-9040 Fax: (847)-890-6559 N2cyberawareness.com N2consultinginc.com [email protected]
© Copyright 2024