Building Amazing Organizations
Got Questions? 800‑258‑3837
Back to Course List

Data Security Compliance: Data Breaches and ID Theft

Preview video
Preview Video
Product ID
itundbit_vod
Training Time ?
24 to 29 minutes
Language(s)
English
Video Format
High Definition
Required Plugins
None
Number of Lessons
6
Quiz Questions
5
Closed Captioning
Question Feedback
Wrong Answer Remediation
Lesson Bookmarking
Downloadable Resources
Course screen Course screen Course screen
Overview

Data security is all about keeping private data private. Malicious attacks on data are not new, and they are also not going away. So long as there are computers, the Internet, and stored personal data, the threat of an attack will exist. In fact, since 2005 there have been 5,593 reported breaches with over 828 million records affected. If you are not seeing data breach attempts, you are not looking hard enough.

This course explains the most common ways data is breached, including insider theft, hackers, or simple human error. Remember, your data is sent over the internet, and while there are protocols you can implement to protect it during the transfer, the internet itself is public and unprotected. Learn about other ways your data can be breached, as well as who these attackers are, through the information presented here.

It is estimated the average cost of a major data breach is 38 million dollars, which includes fines, fixes, and recovery funds. This course explains the laws regarding data breaches and identity theft, and what you can do as an employee to prevent a data breach from occurring. Use this course to help employees get in the mindset of why cyber security is critical and what their part is when it comes to protecting data.

Video on Demand   This course is in the Video On Demand format, to read about Video On Demand features click here.

  • Install on any SCORM LMS
  • Full-screen video presentation
  • Print certificate and wallet card
  • You have 30 days to complete the course
Audience

All employees

Topics
The course presents the following topical areas:
  • The Threat
  • Most Common Ways Data is Breached
  • The Cost
  • The Law
  • Beyond the Law
  • Where You Come In

© Mastery Technologies, Inc.