LiveZilla Live Chat Software
Importitall
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Security & Encryption > B017UNVWII
  1. Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3

    [B017UNVWII]
    Delivery: 10-20 Working Days
    Not Available / Digital Item

     pinterest 
Additional Information

As a crucial component of our Nation’s critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of anyone studying health IT, HIPAA and healthcare informatics as these are the first victims that will be under cyber-attack in any organization in which they are employed.

Xerox State healthcare, Anthem, AvMed, BlueCross BlueShield of Tennessee, The Nemours Foundation and others experienced breaches that have affected millions of innocent victims but little is being done to solve the issue of educating gatekeepers of the information. Sloppy cybersecurity hygiene stems from minimal standards for information security in the workplace. The kneejerk reaction to a breach is typically restricted to chaotic chatter while actual strategies to thwart future attack are hardly mentioned therefor the attack surface continues to go unprotected as the IoT (Internet of Things) continues to evolve.

Sophisticated and determined bad actors such as PLA Unit 61398, Topsec, Blackvine and Hidden Lynx are only a few of the multitude of Chinese initiatives to infiltrate, exfiltrate and corrupt the networks of America’s healthcare sector. The shocking truth is that we are virtually voluntary victims as there is no cybersecurity hygiene and zero cybersecurity-centric culture being taught in hospitals, insurance companies, nursing schools or text books. Cybersecurity basics should be taught in every nursing school and healthcare informatics class yet this topic remains eerily absent from current curriculum.

The topics of Healthcare IT, health informatics and cybersecurity go hand in hand yet academia has yet to merge these concepts in their lectures, certifications and degree programs. This book series merges these crucial concepts to expedite the reader’s path to proper cybersecurity hygiene which is intended to enhance their work place cybersecurity culture. The reader will find that traditionally intimidating technical concepts have been authored in an easy to understand manner.

Similar Products

Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume - 5Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector - Volume 4Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information TechnologyThe Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information TechnologyCybersecurity 101: What You Absolutely Must Know! - Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and much more!Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering Book 1)Healthcare Information Security and Privacy
Specifications

Country
USA
Author
James Scott
Binding
Kindle Edition
Format
Kindle eBook
IsAdultProduct
NumberOfPages
106
PublicationDate
2015-11-10
ReleaseDate
2015-11-10
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this product is based in the USA, and is designed and labelled to be used in the USA. If the unit is powered and plugs into an electrical socket, we cannot import the unit for you due to local regulations, as a permit is required for electrical goods. Please check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Agricultural Remedies, Animals, Batteries, Flammable Materials, Farm Feeds, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Poisons, Seeds, Supplements, Nutrients, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, information displayed above is for reference/informational purposes only and the item will not be imported. All content is generated and displayed from an automated USA product feed, and if the item cannot be imported for any reason, including carrier restrictions and/or import or sales restrictions under South African or American law, we do reserve the right to cancel and refund the order in full. If you are not sure if we are permitted to bring in an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.