{"id":279,"date":"2025-03-21T02:05:49","date_gmt":"2025-03-21T02:05:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaronjones\/?page_id=279"},"modified":"2025-03-21T04:00:07","modified_gmt":"2025-03-21T04:00:07","slug":"research","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaronjones\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<p>This paper explores the cybersecurity challenges in healthcare, especially in keeping patient data safe and HIPAA compliant. It highlights the biggest threats, like ransomware, phishing, and insider attacks. The paper looks at six real-world cyber incidents during the COVID-19 pandemic to show the risks healthcare organizations face.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><\/h4>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/Cybersecurity-Challenges-in-Healthcare-Research-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cybersecurity-Challenges-in-Healthcare-Research-Paper.\"><\/object><a id=\"wp-block-file--media-d561e5b2-9405-4774-a199-60415b587fc1\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/Cybersecurity-Challenges-in-Healthcare-Research-Paper.pdf\">Cybersecurity-Challenges-in-Healthcare-Research-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/Cybersecurity-Challenges-in-Healthcare-Research-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d561e5b2-9405-4774-a199-60415b587fc1\">Download<\/a><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>This paper explores the cybersecurity challenges in healthcare, especially in keeping patient data safe and HIPAA compliant. It highlights the biggest threats, like ransomware, phishing, and insider attacks. The paper looks at six real-world cyber incidents during the COVID-19 pandemic to show the risks healthcare organizations face.<\/p>\n","protected":false},"author":25292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/users\/25292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/279\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/279\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/media?parent=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}