Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1

Hospitals and the healthcare community as a whole have become the most common and lucrative target for...
CHF 24.42
CHF 24.42
SKU: 9781519161505
Product Type: Books
Please hurry! Only 198 left in stock
Author: James Scott
Format: Paperback
Language: English
Subtotal: CHF 24.42
10 customers are viewing this product
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1 by Scott, James

Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1

CHF 24.42

Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1

CHF 24.42
Author: James Scott
Format: Paperback
Language: English
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated. Bad actors come in all forms with a multitude of methods, motivations and exploits but virtually all of them start with a phishing attack. All it takes is one click on a malicious link and an entire organization can be infected. The initial goal of a hacker is to obtain legitimate admin credentials then move laterally throughout a network escalating the level of privileges for access. Exfiltration of sensitive information and injecting falsified content are easy with the right access. Strangely, the health sector as a whole offers virtually zero training on social engineering or even basic standards for a cybersecurity-centric organizational culture. Continuous education on the latest exploits and techniques used by hackers is a mandatory prerequisite to initiating an environment conducive to security. Regularly patching vulnerabilities in applications used industry wide are crucial as vulnerabilities lead to exploit kits designed to infiltrate and corrupt distracted organizations. The most organized risks to the health sector in the United States come from State Sponsored and Hacker for Hire groups, primarily out of China. Platforms such as Elderwood offer a plethora of new Zero Days to organizations such as Deep Panda, Axiom and Hidden Lynx etc. whose sole purpose is to breach networks, exfiltrate data and corrupt critical infrastructure networks. The intention of this series is to introduce the basics in both Healthcare Informatics and Cybersecurity as a proper comprehension of both is the first step to a more secure environment. Cybersecurity should be part of the curriculum for students studying healthcare informatics and healthcare as a whole but sadly Academia has yet to catch up with the fast paced initiatives of hackers. True patient health record privacy and network security can only be realized if hospitals and the health sector take an aggressive and blatant approach to a cybersecurity-centric culture with continuous attention to proper cybersecurity hygiene.

Author: James Scott
Publisher: Createspace Independent Publishing Platform
Published: 11/07/2015
Pages: 116
Binding Type: Paperback
Weight: 0.36lbs
Size: 9.02h x 5.98w x 0.24d
ISBN: 9781519161505

This title is not returnable

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products