Brochure (8 1/2 x 11, landscape, 2-fold)

Online Training and Education
Cyber-Criminals and Hackers go after the
Easy Targets or the “Low Hanging Fruit”
which is often the personnel or employee
on the inside. In an environment where
collaboration is part of the workday like in
many organizations, working together and
trusting each other or comradery are
crucial elements in the any workplace.
N2CyberAwareness.com
The problem is with others, outside of
your organization that takes advantage of
this trust and comradery. These are the
cyber criminals and Hackers who are
exploiting a strength but also a weakness
that of the trust that exists within the
organization community.
Custom Online Training
&
Assessment Programs
Our Training & Assessments focus on
following types of threats
Protect your Organization with
Computer-Based Online Training &
Assessments
1.





Data Theft: Cyber criminals can steal
our patient’s highly confidential
information by hacking your
computer or compromising your work
accounts.
2. Identity Theft: Cyber criminals can
steal and commit fraud with your
personal information, including your
credit card data, medical history or
bank accounts.
3. Attacking Others: Cyber criminals can
use your computer to harm others,
including hacking other computers
and launching attacks on other
computers, as well as distributing
malicious software to other computer
networks.



N2 Cyber Security Consultants, LLC
United States
Phone: (352)-215-9040
Fax: (847)-890-6559
N2cyberawareness.com
N2consultinginc.com
Dan@N2Consultinginc.com
Social Engineering
Phishing Emails and Phishing
Scams
Data Leakage
Intellectual Property Theft
Social Media Security and
Malware
Bring Your Own Device (BYOD)
Mobile Malware and Rogue
Mobile Applications
Advanced Persistent Threats
(APT) and Advanced Attacks
Our online computer-based training
consists of the following three modules:
Module 1: Data loss through People:
Phishing, Social Engineering and Theft of
Devices
Module 2: Viruses, Malware and Rogue
Mobile Applications
Module 3: Advanced Attacks
Who & What is At Risk?

Economy

Defense

Transportation

Medical

Government

Telecommunications

Energy Sector

Critical Infrastructure
Privacy and Security of Electronic
Health Records (EHR)

Security program components
and regulatory requirements
(HITECH, HIPAA, Breach
Notification Laws, State Laws)

Mandatory Privacy and security
awareness training for all staff

The Electronic Healthcare
Network Accreditation
Commission (EHNAC) and The
Health Information Technology
for Economic and Clinical Health
Act (HITECH) make mandatory
that all candidates must provide,
at a minimum, annual job
training for all employees and
contractors with access to
Protected Healthcare Information
(PHI). This training must include
breach reporting and notification,
privacy, confidentiality, and
security. {581} 45 C.F.R. §
164.308(a)(5)(i); HITECH §
13402

The Federal Information Security
Management Act (FISMA) 44
USC 3544(b)(4) mandates that
each federal agency provide
periodic training in computer
security awareness and accepted
computer practices for all
employees, contractors, and
volunteers
Personally Identifiable
Information (PII)

Information that permits the
identity of an individual to be
inferred directly or indirectly

PII includes any information
that is linked or linkable to that
individual, regardless of
whether the individual is a U.S.
citizen, a legal permanent
resident, or a visitor to the
United States
N2 Cyber Security Consultants, LLC
United States
Phone: (352)-215-9040
Fax: (847)-890-6559
N2cyberawareness.com
N2consultinginc.com
Dan@N2Consultinginc.com