CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Book

Cybersecurity for eHealth

by Emmanuel C. Ogu

Reading Time: 2 mins read
in Book, Healthcare

The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry.

The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient.

It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book:

  • Distills foundational knowledge and presents it in a concise manner that is easily assimilated
  • Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights
  • Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity

Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including

  • Threat categories, agents, and objectives
  • Strategies and approaches deployed by various threat agents
  • Predisposing risk factors in cybersecurity threat situations
  • Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels

A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth.

Who should use this book?

  • Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies
  • Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners
  • Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals
  • Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare

 

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksCybersecurity for eHealthEmmanuel C. OguHealthcareHealthcare Books
ADVERTISEMENT

Related Posts

Countering Cyber Threats to Financial Institutions

Countering Cyber Threats to Financial Institutions

January 29, 2023
Hands-On Cybersecurity for Finance

Hands-On Cybersecurity for Finance

January 28, 2023
The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

January 28, 2023
Cybersecurity and Financial System Resilience Report: Report To Congress

Cybersecurity and Financial System Resilience Report: Report To Congress

January 28, 2023

More Articles

Book

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

December 20, 2022
Incidents

Amnesty International Canada Says It Was Hacked by Beijing

December 6, 2022
Definition

Software

November 14, 2020
Quotes

“The CCPA gives individuals the right to…”

March 17, 2022
Alerts

[Control Systems] ABB Security Advisory

October 26, 2021
Tool

Teh_s3_bucketeers

November 27, 2020
Course

Master Modern Security and Cryptography by Coding in Python

May 30, 2022
Book

Practical Threat Intelligence and Data-Driven Threat Hunting

June 29, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.