Tagged - HIPAA

What a Doctor’s Access Levels Have to Do With Everyone’s Health (Data)

Securing on-premises and remote access for doctors and other healthcare professionals is imperative to keep hospitals out of the paper and all of our health data protected.

Government Agencies Running for the Cloud May Find It Easy to Stumble

Technical leaders in the public sector are not immune to the undeniable trends and the irresistible pull of cloud platforms promising to deliver cutting-edge capabilities...

Beware the Cloud Contract Trapdoor for Healthcare Applications

Cloud-based contracts usually contain terms and conditions that heavily favor the vendor. If not properly negotiated, these damaging contract clauses can place your...

Training Materials – Phishing

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on phishing.

Security Training Program Manual

This training program manual will allow you to document key information and provides an overview of your new training program.

Security Awareness and Training Gamification Guide

This gamification guide will help you create a gamification strategy for security awareness and training by running through six simple steps.

Training Materials – Physical Computer Security

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on physical computer...

Training Materials – Cyber Attacks

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on cyber attacks.

Training Materials – Incident Response

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on incident response.

Training Materials – Mobile Security

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on mobile security.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us