Is Your Data Secure?
Information security involves the networks and computer systems that connect us to each other and the outside world. Data privacy refers to the data on that network, as well as physical records, and how we handle them. As technology advances and increases the availability of data, the challenges and threats to firms increase. Technology advances and the exponential increase in access to information raise additional challenges and threats to firms. Threats are generally assumed to be external, but often it is the employee’s lack of knowledge or awareness and the subsequent actions that opens firms to security risks.
This course explains the concepts of data privacy, information security and asset protection in clear, understandable terms and examples. Employees gain a stronger understanding of their roles and responsibilities in protecting personal and confidential information, and keeping information systems secure.
Topics covered include:
- Protecting Personally Identifiable Information (PII)
- Working with Confidential Information
- Overview of key privacy regulations –
- Health Insurance Portability and Accountability Act (HIPAA)
- Gramm-Leach-Bliley Act
- CAN-SPAM Act
- General Data Protection Regulation (GDPR)
- Physical Safeguards
- Cyber Risks (methods used to compromise information security) –
- Social Engineering
- Sharing Passwords
- Spear Phishing
- Watering Hole
- Social Media Posts
- Preventing Cyber Risks
- Encryption Practices
- Password Practices
- Software Tools
- Protecting Physical Assets
- Identity Theft
- Reporting Incidents
Experience Traliant today!
Training your employees on Data Privacy and Information Security has never been more important and easier. For a free trial of our course, fill out this form: