1. The textbook discusses several education methods. Discuss each method with an example of how the method could be used in the organization. Then discuss how you will evaluate the method and learning.2. Healthcare continues to be a lucrative target for hackers with weaponized ransomware, misconfigured cloud storage buckets, and phishing emails. Discuss how an organization can protect patients’ information through:o Security mechanismso Administrative and Personnel Issueso Level of accesso Handling and Disposal of Confidential Information3. You are providing education to staff on phishing and spam emails. Using the different educational methods discussed in Chapter 12:o Provide examples of how each method can be usedo How will the method and learning be evaluated?