As a crucial component of our Nation’s critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of anyone studying health IT, HIPAA and healthcare informatics as these are the first victims that will be under cyber-attack in any organization in which they are employed.
Xerox State healthcare, Anthem, AvMed, BlueCross BlueShield of Tennessee, The Nemours Foundation and others experienced breaches that have affected millions of innocent victims but little is being done to solve the issue of educating gatekeepers of the information. Sloppy cybersecurity hygiene stems from minimal standards for information security in the workplace. The kneejerk reaction to a breach is typically restricted to chaotic chatter while actual strategies to thwart future attack are hardly mentioned therefor the attack surface continues to go unprotected as the IoT (Internet of Things) continues to evolve.
Sophisticated and determined bad actors such as PLA Unit 61398, Topsec, Blackvine and Hidden Lynx are only a few of the multitude of Chinese initiatives to infiltrate, exfiltrate and corrupt the networks of America’s healthcare sector. The shocking truth is that we are virtually voluntary victims as there is no cybersecurity hygiene and zero cybersecurity-centric culture being taught in hospitals, insurance companies, nursing schools or text books. Cybersecurity basics should be taught in every nursing school and healthcare informatics class yet this topic remains eerily absent from current curriculum.
The topics of Healthcare IT, health informatics and cybersecurity go hand in hand yet academia has yet to merge these concepts in their lectures, certifications and degree programs. This book series merges these crucial concepts to expedite the reader’s path to proper cybersecurity hygiene which is intended to enhance their work place cybersecurity culture. The reader will find that traditionally intimidating technical concepts have been authored in an easy to understand manner.
The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.
Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!
Please also note that certain items cannot be imported, these include Alcohol, Animals, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.
Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.