{"id":15438,"date":"2019-02-26T14:00:13","date_gmt":"2019-02-26T17:00:13","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=15438"},"modified":"2019-02-26T11:52:09","modified_gmt":"2019-02-26T14:52:09","slug":"health-industry-cybersecurity-practices-managing-threats-and-protecting-patients","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/health-industry-cybersecurity-practices-managing-threats-and-protecting-patients\/","title":{"rendered":"Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15439\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/02\/health-industry-cybersecurity-practices-managing-threats-and-protecting-patients.jpg\" alt=\"Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients\" width=\"145\" height=\"178\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/02\/health-industry-cybersecurity-practices-managing-threats-and-protecting-patients.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/02\/health-industry-cybersecurity-practices-managing-threats-and-protecting-patients-122x150.jpg 122w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Department of Health and Public Service<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Cyberattacks are an increasing threat across all critical infrastructure sectors. For the health sector, cyberattacks are especially concerning because these attacks can directly threaten not just the security of our systems and information but also the health and safety of American patients. We are under constant cyberattack in the health sector, and no organization can escape that reality. While innovation in health information technology is a cause for optimism and increasing sophistication in health IT holds the promise to help address some our most intractable problems, whether in clinical care, fundamental research, population health or health system design, our technology will work for us only if it is secure. Information systems are crucial to today and tomorrow\u2019s healthcare system, so we must take every step possible to protect them.<br \/>\nHHS has a holistic view of the intersection between cybersecurity and healthcare, including data protection and response to cyber threats. Cybersecurity remains a top priority at HHS and is reflected in recent cybersecurity initiatives, including the development of this publication, titled \u201cHealth Industry Cybersecurity Practices: Managing Threats and Protecting Patients.\u201d<\/p>\n<p><a href=\"http:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2019\/02\/health-industry-cybersecurity-practices-managing-threats-and-protecting-patients.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Department of Health and Public Service R\u00e9sum\u00e9: Cyberattacks are an increasing threat across all critical infrastructure sectors. For the health sector, cyberattacks are especially concerning because these attacks can directly threaten not just the security of our systems and information but also the health and safety of American patients. We are under constant cyberattack in the health sector, and no organization can escape that reality. While innovation in health information&hellip; <\/p>\n","protected":false},"author":3,"featured_media":15439,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-15438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":190,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=15438"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15438\/revisions"}],"predecessor-version":[{"id":15440,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15438\/revisions\/15440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/15439"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=15438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=15438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=15438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}