Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Removable Media and PHI for Executives

This module details best practices healthcare executives can implement across their organizations to safeguard protected health information and avoid infection from removable media. 9:13 minutes

Removable Media and PHI for Healthcare Managers

This module details best practices healthcare managers can follow to safeguard protected health information and avoid infection from removable media. 9:59 minutes

Physical Security and PHI for Healthcare Managers

This module reviews best practices for physical security as it relates to HIPAA compliance, including facility access, device storage, physical record management and electronic record transmission. 12:14 minutes

Physical Security and PHI for Healthcare Executives

This module reviews best practices for physical security as it relates to HIPAA compliance, including facility access, device storage, physical record management and electronic record transmission. 11:42 minutes

Physical Security and PHI

HIPAA includes specific requirements for physical safeguards that every organization should have in place to secure protected health information (PHI). 10:19 minutes

Ransomware and HIPAA

This short module will teach learners the risks of ransomware in the healthcare industry, including whether a ransomware infection is considered a HIPAA data breach. 6:20 minutes

Malware and PHI for Managers

This training outlines steps healthcare managers can take to proactively keep PHI secure. Suggested security policies and staff communication strategies are also introduced in this module. 10:25 minutes

Malware and PHI for Executives

This training outlines steps healthcare executives can take to proactively keep PHI secure. Suggested security policies and staff communication strategies are also introduced in this module. 9:11 minutes

Malware and PHI

Malware infections are considered a HIPAA security incident. This module teaches healthcare professionals how to identify malware and actions organizations can take to avoid malware infections. 9:36 minutes

Mobile Security for Healthcare Managers

This security awareness module covers best practices for ensuring HIPAA compliance when using mobile devices to store or access protected health information. 7:32 minutes

Mobile Security for Healthcare Executives

In this module, we review the risks of conducting business on mobile devices and public networks, and share best practices for working remotely at home and abroad. 6:49 minutes

Mobile Security for Healthcare Professionals

This security awareness module covers best practices for healthcare professionals to ensure HIPAA compliance when using mobile devices to store or access protected health information. 7:02 minutes

Who Can You Trust? (Social Engineering)

This video highlights the risks of disclosing patient information without first verifying requester identity. 1:00 minutes

HIPAA Minimum Necessary Standard (Video)

This brief video extrapolates on how many people are authorized to access one person’s health records. 1:54 minutes

HIPAA/HITECH for Healthcare Executives

This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees. 14:06 minutes

HIPAA/HITECH for Healthcare Managers

This module defines protected health information (PHI), outlines best practices for handling PHI and the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.

14:21 minutes

Consequences of PHI Release

This brief video shows the possible consequences of a PHI breach at your organization. 1:45 minutes

PHI Policy (Video)

This video shows the importance of formulating and implementing organizational policy regarding PHI. 1:25 minutes

PHI Life Cycle (Video)

This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle 1:59 minutes

PHI Definition (Video)

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information. 1:14 minutes

Introduction To HIPAA (Video)

This module briefly covers the main points of HIPAA compliance. 1:23 minutes

HIPAA HITECH

Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI. 14:16 minutes

Breach Notification for Healthcare Managers

This module details HIPAA’s definition of a breach, breach disclosure requirements (including an overview of the concept of safe harbor) and recommended breach detection and notification methods. 8:54 minutes

Social Engineering for Healthcare Managers

This module explains the social engineering methods hackers use, review HIPAA requirements regarding external requests for PHI, and teach managers to work with staff to prevent PHI breaches and leaks. 8:49 minutes

Social Engineering for Healthcare Executives

This module covers social engineering techniques, reviews HIPAA requirements regarding external requests for PHI, and how healthcare executives support policies to prevent social engineering attacks. 7:33 minutes

Social Engineering for Healthcare Professionals And Providers

Healthcare professionals are targeted by hackers via social engineering. This module will explain social engineering techniques in detail, and review HIPAA requirements regarding external requests for PHI. 9:33 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started