Cybersecurity for Coaches and Therapists A Practical Guide for Protecting Client Data

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data. Whether working with clients online or face to face, practitioners today increasingly rely on the cyberspace as part of their practice. Through a solutions-focused lens, the book provides easy-to-apply practical advice and guidelines using non-technical language, enabling practitioners to mitigate the rising threat of cybercrime, which can no longer be ignored. By the last page the reader will have knowledge and awareness towards: securing devices, spotting financial fraud, mitigating the risks of online communications, operating more securely from a home office and handling a cyber event if one occurs. Clear, concise, and easy to follow, this guide is a pivotal resource for coaches, therapists, researchers and all other practitioners protecting their clients and businesses.

Author(s): Alexandra J.S. Fouracres
Publisher: Routledge
Year: 2022

Language: English
Pages: 213
City: London

Cover
Half Title
Title
Copyright
Dedication
Contents
Foreword
Preface
Acknowledgements
Disclaimer
Creating a secure practice
Introduction
1 Cybersecurity is here to stay
2 Securing PCs and other devices
3 Networks, login credentials and embracing friction
4 Keeping communications confidential
5 Cyberattacks
6 Scams tailored to your profession
7 Payment fraud directed at your practice
8 Ethics and data
9 Case studies
10 Checklists and conclusions
Afterword
Index