EVERYONE has a role to play in preventing cyberattacks.

Techguard Shield logo

Enable your “human firewall” with our award-winning S.H.I.E.L.D. Cybersecurity Awareness Training. Read More

Search Courses

 
 
 
Reset

PHI Life Cycle (Video)

This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle 1:59 minutes

PHI Definition (Video)

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information. 1:14 minutes

Introduction To HIPAA (Video)

This module briefly covers the main points of HIPAA compliance. 1:23 minutes

HIPAA HITECH

Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI. 14:16 minutes

Breach Notification for Healthcare Managers

This module details HIPAA’s definition of a breach, breach disclosure requirements (including an overview of the concept of safe harbor) and recommended breach detection and notification methods. 8:54 minutes

Social Engineering for Healthcare Managers

This module explains the social engineering methods hackers use, review HIPAA requirements regarding external requests for PHI, and teach managers to work with staff to prevent PHI breaches and leaks. 8:49 minutes

Newsletter

Get all the latest TechGuard Updates!

Trending Courses
Most Popular Courses
Recently Added Courses

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started