Discuss each method with an example of how the method could be used in the organization. Then discuss how you will evaluate the method and learning.
Healthcare continues to be a lucrative target for hackers with weaponized ransomware, misconfigured cloud storage buckets, and phishing emails. Discuss how an organization can protect patients’ information through:
. Security mechanisms
. Administrative and Personnel Issues
. Level of access
. Handling and Disposal of Confidential Information
. You are providing education to staff on phishing and spam emails. Using the different educational methods discussed in Chapter 12:
. Provide examples of how each method can be used
. How will the method and learning be evaluated?