Gratuit avec l'essai de 30 jours

  • Cybersecurity Hygiene for the Healthcare Industry

  • The Basics in Healthcare IT, Health Informatics, and Cybersecurity for the Health Sector
  • Auteur(s): James Scott
  • Narrateur(s): Kelly Rhodes
  • Durée: 59 min

Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.
Page de couverture de Cybersecurity Hygiene for the Healthcare Industry

Cybersecurity Hygiene for the Healthcare Industry

Auteur(s): James Scott
Narrateur(s): Kelly Rhodes
Essayer pour 0,00 $

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 5,22 $

Acheter pour 5,22 $

Payer avec la carte finissant par
En confirmant votre achat, vous acceptez les conditions d'utilisation d'Audible et la déclaration de confidentialité d'Amazon. Des taxes peuvent s'appliquer.
activate_primeday_promo_in_buybox_DT

Description

With the hospital and health sectors' attack surfaces wide open, it's surprising that more isn't being done to educate staff on proper cybersecurity hygiene. The attack surface is compounded by the exponential expansion of the IoT and lack of up-to-date BYOD protocols. HIPAA and patient record privacy are a moot point when unpatched vulnerabilities in applications are exploited by bad actors. The health-care industry as a whole needs to move toward a more cybersecurity-centric culture as the physical and cyber environments continue to merge.

The point of this easy to intellectually digest book series is to introduce basic cybersecurity with nursing informatics, hospital information technology, HIPAA compliance, and health IT. When health sector staff can more easily identify spear phishing, spoofed browsers, and other malicious enticements by hackers, each organization will be less prone to breaches. Bad actors are becoming more targeted, stealthy, and creative with their exploit kits and zero days. Ransomware, RATs, Droppers, and drive-by downloads are just the tip of the iceberg when it comes to the adversaries' attack arsenals for invading the health-care division of our nation's critical infrastructure.

©2015 James Scott (P)2015 James Scott

Ce que les auditeurs disent de Cybersecurity Hygiene for the Healthcare Industry

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.