Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Malware and PHI for Managers

This training outlines steps healthcare managers can take to proactively keep PHI secure. Suggested security policies and staff communication strategies are also introduced in this module. 10:25 minutes

Malware and PHI for Executives

This training outlines steps healthcare executives can take to proactively keep PHI secure. Suggested security policies and staff communication strategies are also introduced in this module. 9:11 minutes

Malware and PHI

Malware infections are considered a HIPAA security incident. This module teaches healthcare professionals how to identify malware and actions organizations can take to avoid malware infections. 9:36 minutes

Malware for Executives

Executives are often targeted by hackers via malware, or malicious software. This module explains malware risks in detail and outlines steps executives can take to proactively keep their data secure. 7:23 minutes

Security Awareness for IT Professionals

This module explains fundamental concepts of information security and the important role IT professionals play in protecting organizational data assets. 10:37 minutes

Malware for Managers

This module will help managers understand the risks of malware, how to prevent installation and provide guidance on how managers can help their team and comply with internal security policies. 8:41 minutes

Protecting Mobile Devices (Video)

This video covers the steps you can take to protect your device from prying eyes and theft. Topics include screen locks, encryption and frequent software and firmware updates. 1:17 minutes

Where Is Your Device? (Backups)

This 60-second video details the importance of physical security and frequent data backups. 1:00 minutes

Mobile Security for Educators

This module identifies the security risks educational institutions face from business-based mobile device use. 6:00 minutes

Mobile Security for Financial Institutions

This module identifies the security risks financial institutions face from business-based mobile device use, malicious applications designed to attack financial accounts and possible FINRA violations. 6:31 minutes

Mobile Security for Healthcare Managers

This security awareness module covers best practices for ensuring HIPAA compliance when using mobile devices to store or access protected health information. 7:32 minutes

Mobile Security for Healthcare Executives

In this module, we review the risks of conducting business on mobile devices and public networks, and share best practices for working remotely at home and abroad. 6:49 minutes

Mobile Security for Healthcare Professionals

This security awareness module covers best practices for healthcare professionals to ensure HIPAA compliance when using mobile devices to store or access protected health information. 7:02 minutes

Mobile Security for Managers

This module will explain the risks of mobile devices and public networks in detail, and provide guidance on how managers can work with their teams to keep sensitive data secure. 7:03 minutes

Mobile Security for Executives

In this module, we review the risks of conducting business on mobile devices and public networks, and share best practices for working remotely at home and abroad. 6:05 minutes

Check Yourself (BEC)

This module emphasizes the need to verify wire transfers. 1:00 minutes

H@ckj0b Season 1 Episode 1 “Recon”

h@ckj0b is your security team’s worst nightmare come to life. Will TechniCorp Dynamix survive Vermintooth’s assault, or will Tim leave them to deal with the mess they’ve gotten themselves into? 5:28 minutes

Every Step You Take (Mentoring)

After you’ve learned good security practices, you should share your knowledge with others. 0:35 minutes

Double Check (Verifying Wire Transfers)

This micro-learning module emphasizes the importance of verifying wire transfers. 0:35 minutes

Knowledge Is Power (Security Training)

Security training should be a part of your daily life. 0:35 minutes

Identifying Social Engineering (Video)

This brief overview covers the hallmarks of social engineering attacks and how to prevent them. 1:29 minutes

Social Engineering Defenses (Video)

This brief video shows you how to recognize and prevent social engineering attacks. 1:31 minutes

Who Can You Trust? (Social Engineering)

This video highlights the risks of disclosing patient information without first verifying requester identity. 1:00 minutes

GDPR for Data Processors

This security awareness training covers privacy and EU General Data Protection Regulation for data processors. 11:08 minutes

GDPR for Managers

This security awareness training covers Privacy and the General Data Protection Regulation for Executives. 14:53 minutes

GDPR - Breach Notification (Video)

This brief video covers the next steps for an organization should a breach occur. 1:43 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started