Regular price: $6.95

Free with 30-day trial
Membership details Membership details
  • A 30-day trial plus your first audiobook, free
  • 1 credit/month after trial – good for any book, any price
  • Easy exchanges – swap any book you don’t love
  • Keep your audiobooks, even if you cancel
  • After your trial, Audible is just $14.95/month
OR
In Cart

Publisher's Summary

As hospitals and the health sector as a whole continue to take advantage of the conveniences provided by the latest IOT (Internet of Things) technologies, little attention is focused on the expansive and virtually completely unprotected attack surface evolving from use of these technologies.

A cybersecurity-centric culture and an evolving enforcement of proper cybersecurity hygiene are mandatory to create even the most basic secure environment. Conversations and training centering on HIPAA, health IT, and health-care informatics must include cybersecurity, but sadly they rarely do, and the victims are typically the patients.

Strangely, cyber-attacks such as the Anthem incident and others like it were not technically sophisticated, but rather the exact opposite. Spear phishing, spoofed URLs, and watering hole attacks are the primary means of obtaining legitimate admin credentials, thus offering up one's entire network to hackers on a silver platter. Including the position of CISO is pointless unless the staff is properly trained to identify the ingredients of basic social engineering and malicious attacks.

This series is meant to introduce cybersecurity into the curriculum of those studying HIPAA, health-care IT, and health informatics, as the topics go hand in hand. Yet the health sector and academia as a whole have continued to ignore this reality and therefore continue to be easy targets for hackers and bad actors. A cybersecurity-centric culture must be injected into every aspect of the health sector. Precise and determined effort must be introduced to initiate a mandatory cybersecurity hygiene standard throughout this crucial component of our nation's critical infrastructure.

This series has been authored to intentionally introduce cybersecurity and health IT simultaneously in hopes that the health sector will enforce the same concept to its academic partners.

©2015 James Scott (P)2015 James Scott

What members say

Average Customer Ratings

Overall

  • 3.0 out of 5.0
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Performance

  • 4.0 out of 5.0
  • 5 Stars
    0
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Story

  • 3.0 out of 5.0
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0