We are currently making improvements to the Audible site. In an effort to enhance the accessibility experience for our customers, we have created a page to more easily navigate the new experience, available at the web address www.audible.com/access .
Cybersecurity Hygiene for the Healthcare Industry Audiobook

Cybersecurity Hygiene for the Healthcare Industry: The Basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector, Volume 1

Regular Price:$6.95
  • Membership Details:
    • First book free with 30-day trial
    • $14.95/month thereafter for your choice of 1 new book each month
    • Cancel easily anytime
    • Exchange books you don't like
    • All selected books are yours to keep, even if you cancel
  • - or -

Publisher's Summary

Hospitals and the health-care community as a whole have become the most common and lucrative targets for cyberattacks. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities, and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated.

Bad actors come in all forms, with a multitude of methods, motivations, and exploits, but virtually all of them start with phishing attacks. All it takes is one click on a malicious link, and an entire organization can be infected. The initial goal of a hacker is to obtain legitimate admin credentials then move laterally throughout a network, escalating the level of privileges for access. Exfiltration of sensitive information and injecting falsified content are easy with the right access.

Strangely, the health sector as a whole offers virtually zero training on social engineering or even basic standards for a cybersecurity-centric organizational culture. Continuous education on the latest exploits and techniques used by hackers is a mandatory prerequisite to initiating an environment conducive to security. Regularly patching vulnerabilities in applications used industrywide are crucial as vulnerabilities lead to exploit kits designed to infiltrate and corrupt distracted organizations. The most organized risks to the health sector in the United States come from state-sponsored and hacker-for-hire groups, primarily out of China. Platforms such as Elderwood offer a plethora of new Zero Days to organizations such as Deep Panda, Axiom, and Hidden Lynx, etc., whose sole purpose is to breach networks, exfiltrate data, and corrupt critical infrastructure networks.

©2015 James Scott (P)2015 James Scott

What Members Say

Average Customer Rating

4.5 (2 )
5 star
 (1)
4 star
 (1)
3 star
 (0)
2 star
 (0)
1 star
 (0)
Overall
4.0 (2 )
5 star
 (0)
4 star
 (2)
3 star
 (0)
2 star
 (0)
1 star
 (0)
Story
5.0 (2 )
5 star
 (2)
4 star
 (0)
3 star
 (0)
2 star
 (0)
1 star
 (0)
Performance


There are no reviews for this title yet.

Report Inappropriate Content

If you find this review inappropriate and think it should be removed from our site, let us know. This report will be reviewed by Audible and we will take appropriate action.

Cancel

Thank you.

Your report has been received. It will be reviewed by Audible and we will take appropriate action.