Hi, How Can We Help You?
  • Address: Street Name, NY, 54785
  • Email Address: support@excellentresearchers.com

Blog

September 8, 2022

Healthcare Cyber-attacks and Mitigation

Healthcare Cyber-attacks and Mitigation 
Advanced threats and attacks have developed by cyber criminals unaware of healthcare professionals. Address the latest threats and mitigation strategies that help healthcare organizations and patients secure their information. Cybercriminals believe the healthcare industry is a soft target. Cybercriminals routinely target healthcare organizations. Healthcare industry vulnerabilities can be linked to various issues, including a lack of security awareness among care personnel, reliance on old unpatched systems that are no longer supported, a broad attack surface, and a lack of staffing resources.
Qualitative and quantitative research methods address the problem by conducting interviews and an online survey with healthcare professionals. Factor Analysis Information Risk (FAIR) and Technology acceptance models (TAM) are utilized for this study.
Humayun, M. (2021). Industry 4.0 and cyber security issues and challenges. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2957-2971.
Research questions
What are the most common types of social attacks against humans encountered by healthcare organizations?
What policies and governance adopted by healthcare organizations have resulted in enhanced resilience?
How does an organization perform a cybersecurity risk assessment to identify the role of humans in the loop for enhancing cybersecurity?
What is the role of the training program in enhancing healthcare professionals’ awareness of cyber threats, and how can we measure the impact of training and awareness activities adopted within an organization?
What have cyber defense strategies been proposed by national and international organizations to strengthen cyber resilience?
Findings: The research aims to synthesize the recent literature on human behavior-related security weaknesses that compromise the cyber defense strategy used by healthcare organizations.

Leave a Reply

Your email address will not be published.

This field is required.

You may use these <abbr title="HyperText Markup Language">html</abbr> tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*This field is required.

Order Custom Essay

You can get your custom paper by one of our expert writers.

This will close in 0 seconds

error: Content is protected !!