Designed to meet the information security challenges present in the healthcare industry.

Information Security Awareness for Healthcare is designed for all employees or contractors that have access to information systems.

Navigation options:

  • Quiz only: (optional) students may skip content and proceed directly to the quiz. Failing the quiz redirects student to content.
  • Unrestricted navigation: Students can navigate freely forward or back. This option is suitable if a passing quiz score or user acknowledgment is required for completion.
  • Restricted navigation: Students can navigate back, but forward only to the last visited page. This ensures all required content is presented.

Completion options:

Completion behavior is as important as the course content, especially when reporting for an IT audit. Completing an online security awareness course should be simple, straightforward, and self-explanatory so students have no trouble understanding how to satisfy the training requirement.

  • Set a passing quiz score between 0% – 100%
  • Acknowledgment of responsibility statement (optional), which must be accepted for course completion. This may contain a complete policy statement or abridged summary.

Customization options:

  • This course is available, branded with your logo, ready for hosting on your intranet, or SCORM/AICC Learning Management System.
  • Content customization is available at reasonable rates.
  • Hosting available (annually.) Our LMS hosting environment offers FIMSA-compliant student completion reporting.
  • Foreign translations available
  • We can provide printed certificates of completion that include student name, date, course title, and company or division logo.
Information Security Awareness For Healthcare Training Modules

We have a variety of modules available and can write custom modules to meet any need.

  • SOCIAL ENGINEERING
  • EMAIL AND MESSAGING
  • BROWSING
  • SOCIAL NETWORKING
  • BYOD
  • PASSWORDS
  • ENCRYPTION
  • PROTECTING INFORMATION
  • PII
  • PHI
  • PCI
  • DATA DESTRUCTION
  • WI-FI
  • APPROPRIATE USE
  • REMOTE COMPUTING
  • INSIDER THREAT
  • PHISHING
  • PHYSICAL SECURITY
  • PERSONAL COMPUTING
  • RANSOMWARE
  • RECOGNIZING A COMPROMISED COMPUTER
  • REPORTING INCIDENTS
  • ADVANCED PERSISTENT THREAT
  • CLOUD COMPUTING
  • DATA LEAKAGE