We are currently making improvements to the Audible site. In an effort to enhance the accessibility experience for our customers, we have created a page to more easily navigate the new experience, available at the web address www.audible.com/access .
Cybersecurity Hygiene for the Healthcare Industry Audiobook

Cybersecurity Hygiene for the Healthcare Industry: The Basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector, Volume 4

Regular Price:$6.95
  • Membership Details:
    • First book free with 30-day trial
    • $14.95/month thereafter for your choice of 1 new book each month
    • Cancel easily anytime
    • Exchange books you don't like
    • All selected books are yours to keep, even if you cancel
  • - or -

Publisher's Summary

In recent years, the volume of hospitals and the health sector entities that have fallen victim to hackers has continued to rise at an alarming rate. With each breach, there are empty promises and finger-pointing while the organizations attempt to attribute the hack to a bad actor like Deep Panda based off of exploit kit components that were used in a previous breach. Where are they getting their information? Who knows and who cares because it's almost always wrong and attribution is typically a waste of time as it is an attempt to take the responsibility and public outrage off of the hospital or healthcare organization's lack of proper cybersecurity hygiene and non-existent cybersecurity culture.

When one takes a closer look at the actual problem in order to remedy a scalable solution the most profound reality is the pure lack of cybersecurity training in perfectly applicable environments where students are learning health IT, healthcare informatics, nursing, and HIPPA. The fact that cybersecurity hygiene is an afterthought rather than an academic course in the health sector should have the victims of these breaches rioting in the street, yet there is a deafening silence on this topic of educational reform. I'm not saying that a full on curriculum covering Advanced Persistent Threat intricacies such as hacker tool kits, exploits, droppers, remote access trojans or how to forensically investigate code. But, perhaps it may be useful, while studying a technical topic to add a few ingredients of cybersecurity to, keep tens of millions of innocent people from having their health records exfiltrated by bad actors wishing to do them harm.

This book series is intended to introduce the listener to healthcare informatics, health IT, and HIPAA, while simultaneously enhancing this information with cybersecurity content.

©2015 James Scott (P)2015 James Scott

What Members Say

Average Customer Rating

4.0 (1 )
5 star
 (0)
4 star
 (1)
3 star
 (0)
2 star
 (0)
1 star
 (0)
Overall
3.0 (1 )
5 star
 (0)
4 star
 (0)
3 star
 (1)
2 star
 (0)
1 star
 (0)
Story
4.0 (1 )
5 star
 (0)
4 star
 (1)
3 star
 (0)
2 star
 (0)
1 star
 (0)
Performance


There are no reviews for this title yet.

Report Inappropriate Content

If you find this review inappropriate and think it should be removed from our site, let us know. This report will be reviewed by Audible and we will take appropriate action.

Cancel

Thank you.

Your report has been received. It will be reviewed by Audible and we will take appropriate action.