Protecting your information and devices from unauthorized access and data theft requires your vigilance, especially with the evolving nature of cyber crime. Watch the brief video below to help you protect your stuff and avoid being a victim.
This month we focus on Cloud Computing and Protected Health Information (PHI). In this video we cover general guidelines for using cloud service providers.. Please visit https://www.securingthehuman.org/resources/votm to view the video.