Online Training | 800‑258‑3837
Back to Course List

Data Security Compliance: Data Breaches and ID Theft

Preview video
Preview Video
Product ID
itundbit_vod
Training Time ?
25 to 30 minutes
Language(s)
English
Video Format
High Definition
Required Plugins
None
Number of Lessons
6
Quiz Questions
5
Question Feedback
Wrong Answer Remediation
Lesson Bookmarking
Course screen Course screen Course screen
Overview

As the connectivity of our world increases, so too does our vulnerability to an attack on data. Since 2005 there have been 5,593 reported breaches with over 828 million records affected. If you are not seeing data breach attempts, you are not looking hard enough. So what kinds of attempts are being made on your private data, and what can you do about it? This course explores the threats to data security, the costs a company incurs with a data breach, how the law comes into play, and what employees can do to prevent data breaches.

A common way private information can be breached is through insider theft or, in other words, from inside the business itself. Other threats come from outside the business, such as hackers or subcontractors/third parties hired by your company. Your data can also be compromised as it is transmitted from place to place. Another common way is through sheer negligence; in fact, it is estimated that 30% of all data breaches are due to human error. Therefore, it is imperative you are aware of the scenarios where your data can be compromised and act accordingly. This training video provides you with the best practices to protect your data.

Utilize the materials presented in this course to better understand the threats your private data faces, as well as how to better protect it from those threats.

Video on Demand   This course is in the Video On Demand format, to read about Video On Demand features click here.

  • Install on any SCORM LMS
  • Full-screen video presentation
  • Print certificate and wallet card
  • You have 30 days to complete the course
Audience

All employees

Topics
The course presents the following topical areas:
  • The Threat
  • Most Common Ways Data is Breached
  • The Cost
  • The Law
  • Beyond the Law
  • Where You Come In

© Mastery Technologies, Inc.