IT security for hospitals 

Cyber security in the medical sector

Cyber Security E-Learning-Kurse speziell für medizinisches Personal und für Klinken.

 

Discover content   Let's talk

Cyber Security im Krankenhaus, Kliniken und medizinischen Bereich

2.000+ trust in our cyber security trainings – from startups to large companies

Custom solutions

Choose your own course content

The e-learning courses have been developed by real cyber security specialists, with content and examples from the clinical environment. You can either choose one of our "best practice" compilations or customize your cyber security training - both of course adapted to your guidelines and corporate design.

You can run the finished online training course in your own learning management system in the company or in our cloud, naturally from a German data center in accordance with the EU GDPR.

The right e-learning solution for each case

 

Need another language?

You can watch the video above in German. Our e-learning courses however are available in many other languages on request - from Spanish and French to Chinese or Russian. Which language do your employees need? Feel free to contact us - we will find the right solution for your team!

Let's talk

Really great training! Super videos! Short, concise and very easy to understand explanations. My compliments!

Clinic management

Very valuable. 
Sensitizes the entire team!


Owner of a private practice

Learned a lot plus interactive and exciting exercises! Thumbs up!
 

Intensive care nurse

The chapters to choose from

  • The importance of cyber security in the hospital environment
  • The potential impact of an attack
  • The role of each individual in protecting information
  • Tips on correct behaviour

  • Film: Anatomy of a cyber attack
  • Who are the attackers?
  • What are their targets?

  • Recognising and fending off phishing
  • Encrypting sensitive information
  • Viruses and Trojans in emails

  • Recognising and fending off Microsoft 365 phishing
  • Microsoft 365 Safe Link
  • Typical Microsoft 365 phishing scams
  • Multi-factor authentication in Microsoft 365

  • What is ransomware and why is it so dangerous?
  • Tips for protection in the company
  • Tips for protecting private IT

  • Which file extensions tend to be harmless and which are bad?
  • Tip: Display file extensions
  • Dealing with macros

  • How do virus scanners work and what can they recognise?
  • Residual risks
  • Malware on different platforms
  • Which protection software for the home?

  • What is a cyber incident?
  • What should you do in the event of a cyber incident?
  • Spectacular cases of cyber security attacks
  • Who should you contact in an emergency?

  • How does password cracking work?
  • Create and remember strong passwords
  • Keep passwords safe

  • What are the benefits of password managers?
  • Differences between commercial and free offerings
  • Functions using the example of KeePass

  • What does multi-factor authentication mean?
  • Why is it so good?
  • What types are there?
  • Residual risks

  • What is social engineering?
  • Unmasking attacks on employees
  • Social engineering attacks on private individuals

  • How do CEO fraud attackers proceed?
  • React correctly
  • Expose attacks

  • Clean Desk: Locking down PCs and offices
  • Disposal of sensitive information
  • Dealing with visitors

  • Sensitive information in public
  • Secure working on the move
  • Loss of mobile devices
  • Use of non-company devices

  • Differences in cloud solutions
  • Which ones can be used?
  • Secure exchange of large files
  • Copyright and image sources

  • Social media business model
  • Behaviour as an employee in social media
  • Privacy in social media
  • Social media as a source of information for attackers

  • Which devices should you use antivirus protection for?
  • Difference between iOS and Android
  • Tips for dealing with company devices
  • Tips for dealing with private devices

  • Company data only on company devices
  • Secure handling of IT in the home office
  • Do not use public cloud services
  • Web meetings or telephone tips

  • Confidentiality classes
  • Roles and responsibilities
  • Need-to-know principle
  • Handling sensitive information

Wie funktioniert E-Learning?

Hier erfährst Du es

Falls Sie erst einmal verstehen möchten, wozu ein Lernmanagement-System überhaupt da ist und warum diese Systeme alle Scorm sprechen, empfehlen wir Ihnen unseren Know-How-Artikel E-Learning Grundlagen. 

Illustration basics e-learning, scorm and lms

In this article, we explain the technical terms Scorm, LMS and e-learning course.

Read more

 

Prices? Questions? References?

Get a free demo account for the other chapters and let's talk about your company's needs in a web meeting.


Yes, let's talk

Other e-learning courses you might be interested in

Datenschutz-Schulung Preview

Unsere top-aktuellen und modernen Datenschutz Online-Schulungen machen Deine Mitarbeitenden fit für die DSGVO.

Read more
Arbeitsschutz Schulung Preview

Arbeitsschutz im Unternehmen einfach erklärt und auf den Punkt gebracht. Als E-Learning mit Zertifikat. Jetzt informieren und Schulung buchen!

Read more
Test löschen Preview Bild

IT-Security-Training für Administratoren mit interaktiven E-Learnings und eigener Hacking-Umgebung.

Read more

E-learning knowledge from our blog

E-Learning
Ein Bild auf welchem die Mitarbeiter ihre Daumen hoch zeigen

Wir zeigen, wie man Mitarbeitende richtig motiviert.

Read more
Datenschutz
data protection refresh

So werden bekannte DSGVO-Inhalte in spannenden Online-Kursen neu verpackt.

Read more
E-Learning
Illustration basics e-learning, scorm and lms

In diesem Artikel erklären wir die Fachbegriffe Scorm, LMS und E-Learning.

Read more