Cybersecurity in healthcare: technology, data, and human behaviour-Introduction to the course
Introduction to the course
()
Cybersecurity in healthcare: technology, data, and human behaviour-Introduction to module 2
Introduction to the module
()
Cybersecurity in healthcare: technology, data, and human behaviour-What is cybersecurity?
What is cybersecurity?
()
Cybersecurity problems for healthcare
Cybersecurity in healthcare: technology, data, and human behaviour-Challenges and opportunities for healthcare
Challenges and opportunities for healthcare
()
Cybersecurity Ecosystem
Cybersecurity in healthcare: technology, data, and human behaviour-Types of data in healthcare
Types of data in healthcare
()
How to handle health data and personnel information
Cybersecurity in healthcare: technology, data, and human behaviour-Digital medical technologies
Digital medical technologies
()
Cybersecurity in healthcare: technology, data, and human behaviour-Threats to cybersecurity in healthcare
Threats to cybersecurity in healthcare
()
Case study: Boston Children's hospital (US)
Cybersecurity in healthcare: technology, data, and human behaviour-Conclusion to the module
Conclusion to the module
()
Social aspects of cybersecurity: social engineering and social media-Introduction to module 2
Introduction to module 2
()
Social aspects of cybersecurity: social engineering and social media-Human behaviour in cybersecurity
Human behaviour in cybersecurity
()
Human behaviour and cybersecurity in health and social care organisations
Social aspects of cybersecurity: social engineering and social media-Social engineering
Social engineering
()
What is social engineering?
Social aspects of cybersecurity: social engineering and social media-Social media use
Social media use
()
Doctors's use of social media - ethical guidance
Social aspects of cybersecurity: social engineering and social media-Conclusion to the module
Conclusion to the module
()
Data breaches, hackers, and malware in healthcare-Introduction to the module
Introduction to the module
()
THE AMCA case: Hacking and data breaches in healthcare
Data breaches, hackers, and malware in healthcare-Data breaches
Data breaches
()
What is a data breach?
Data breaches, hackers, and malware in healthcare-Hackers and hacking
Introduction to hacking
()
Who is hacking healthcare, and w?
The EVILNUGGET case: The potential for cyberespionage
Data breaches, hackers, and malware in healthcare-Malware
Malware
()
Quick guide to malware types
The WannaCry (UK) and ASP (Italy) cases: Holding medical data hostage through ransomware
Data breaches, hackers, and malware in healthcare-Conclusion to the module
Conclusion to the module
()
Cyber hygiene: practices to improve cybersecurity-Introduction to the module
Introduction to the module
()
Cyber hygiene: practices to improve cybersecurity-Introduction to cyber hygiene
Cyber hygiene
()
Internet security and cyber hygiene
Cyber hygiene: practices to improve cybersecurity-Digital communication and safe emailing etiquette
Digital communication and safe emailing
()
Cyber hygiene: practices to improve cybersecurity-Encryption
Encryption
()
Security of public Wi-Fi
Cyber hygiene: practices to improve cybersecurity-Device management
Device management
()
Cyber hygiene: practices to improve cybersecurity-Password management
Password management
()
Cyber hygiene: practices to improve cybersecurity-Software management, updates, and backups
Software, updates, and backups
()
Cyber hygiene: practices to improve cybersecurity-Conclusion to the module
Conclusion to the module
()
Security culture: creating positive environment to practice cybersecurity-Introduction to the module
Introduction to the module
()
Security culture: creating positive environment to practice cybersecurity-What is security culture?
What is security culture?
()
The Barbie case (NL): GDPR and the mishandling of patient information
Security culture: creating positive environment to practice cybersecurity-Policies, procedures, and workarounds
Policies, procedures, and workarounds
()
Policies and regulations
Security culture: creating positive environment to practice cybersecurity-General Data Protection Regulation
General Data Protection Regulation
Security culture: creating positive environment to practice cybersecurity-Building a (cyber)security culture
Building a (cyber)security culture
()
How to establish a cybersecurity culture
Security culture: creating positive environment to practice cybersecurity-Conclusion to the module
Conclusion to the module
()
Security culture: creating positive environment to practice cybersecurity-Course wrap up
Course wrap up
()