<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article article-type="review-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i4e21747</article-id>
      <article-id pub-id-type="pmid">33764885</article-id>
      <article-id pub-id-type="doi">10.2196/21747</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Basch</surname>
            <given-names>Corey</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kruse</surname>
            <given-names>Clemens</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Phillips</surname>
            <given-names>Andelka</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>He</surname>
            <given-names>Ying</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2023-5547</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Aliyu</surname>
            <given-names>Aliyu</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4485-8087</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Evans</surname>
            <given-names>Mark</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8816-0556</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Luo</surname>
            <given-names>Cunjin</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <address>
            <institution>School of Computer Science and Electronic Engineering</institution>
            <institution>University of Essex</institution>
            <addr-line>Wivenhoe Park</addr-line>
            <addr-line>Colchester, CO4 3SQ</addr-line>
            <country>United Kingdom</country>
            <phone>44 7493622995</phone>
            <email>cunjin.luo@essex.ac.uk</email>
          </address>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3946-1093</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Computer Science</institution>
        <institution>University of Nottingham</institution>
        <addr-line>Nottingham</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>School of Computer Science and Informatics</institution>
        <institution>De Montfort University</institution>
        <addr-line>Leicester</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>School of Computer Science and Electronic Engineering</institution>
        <institution>University of Essex</institution>
        <addr-line>Colchester</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Key Lab of Medical Electrophysiology, Ministry of Education</institution>
        <institution>Institute of Cardiovascular Research</institution>
        <institution>Southwest Medical University</institution>
        <addr-line>Luzhou</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Cunjin Luo <email>cunjin.luo@essex.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>4</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>4</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>4</issue>
      <elocation-id>e21747</elocation-id>
      <history>
        <date date-type="received">
          <day>23</day>
          <month>6</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>17</day>
          <month>11</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>8</day>
          <month>12</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>21</day>
          <month>2</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Ying He, Aliyu Aliyu, Mark Evans, Cunjin Luo. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 20.04.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/4/e21747" xlink:type="simple"/>
      <related-article related-article-type="correction-forward" xlink:title="This is a corrected version. See correction statement in:" xlink:href="https://www.jmir.org/2021/4/e29877" vol="23" page="e29877"> </related-article>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>COVID-19 has challenged the resilience of the health care information system, which has affected our ability to achieve the global goal of health and well-being. The pandemic has resulted in a number of recent cyberattacks on hospitals, pharmaceutical companies, the US Department of Health and Human Services, the World Health Organization and its partners, and others.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this review was to identify key cybersecurity challenges, solutions adapted by the health sector, and areas of improvement needed to counteract the recent increases in cyberattacks (eg, phishing campaigns and ransomware attacks), which have been used by attackers to exploit vulnerabilities in technology and people introduced through changes to working practices in response to the COVID-19 pandemic.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A scoping review was conducted by searching two major scientific databases (PubMed and Scopus) using the search formula “(covid OR healthcare) AND cybersecurity.” Reports, news articles, and industry white papers were also included if they were related directly to previously published works, or if they were the only available sources at the time of writing. Only articles in English published in the last decade were included (ie, 2011-2020) in order to focus on current issues, challenges, and solutions.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We identified 9 main challenges in cybersecurity, 11 key solutions that health care organizations adapted to address these challenges, and 4 key areas that need to be strengthened in terms of cybersecurity capacity in the health sector. We also found that the most prominent and significant methods of cyberattacks that occurred during the pandemic were related to phishing, ransomware, distributed denial-of-service attacks, and malware.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p> This scoping review identified the most impactful methods of cyberattacks that targeted the health sector during the COVID-19 pandemic, as well as the challenges in cybersecurity, solutions, and areas in need of improvement. We provided useful insights to the health sector on cybersecurity issues during the COVID-19 pandemic as well as other epidemics or pandemics that may materialize in the future.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>health care</kwd>
        <kwd>security incidents</kwd>
        <kwd>root causes</kwd>
        <kwd>cybersecurity challenges</kwd>
        <kwd>cybersecurity solutions</kwd>
        <kwd>COVID-19</kwd>
        <kwd>pandemics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>COVID-19 has been an unprecedented challenge for the global health care system. It has further challenged the resilience of the health information system, which has affected our ability to achieve the global goal of health and well-being. The sector has become a primary target of adapted cybersecurity attacks [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. To manage the pandemic and this extraordinary situation, the health sector has shifted its focus from the security of their systems and practices to their primary duty of delivering health care in order to save lives, placing themselves in a vulnerable situation. Attackers are taking advantage of the COVID-19 pandemic and have launched a number of cyberattacks against health care organizations [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. Recent cyberattacks have impacted health care organizations such as Brno University Hospital [<xref ref-type="bibr" rid="ref3">3</xref>], the US Department of Health and Human Services [<xref ref-type="bibr" rid="ref4">4</xref>], the World Health Organization (WHO) [<xref ref-type="bibr" rid="ref5">5</xref>], Gilead Sciences, Inc [<xref ref-type="bibr" rid="ref6">6</xref>], hospitals in Romania [<xref ref-type="bibr" rid="ref7">7</xref>], as well as the general supply chain of the health sector [<xref ref-type="bibr" rid="ref8">8</xref>]. The health sector must be prepared to counteract cyberattacks in order to protect the availability of essential health care services as well as the confidentiality and integrity of health care information.</p>
        <p>Cybercrime adapts to changes in the world situation very quickly. At the beginning of an escalation in the COVID-19 pandemic, malware cyberattackers identified common vulnerabilities and adapted their attacks to exploit these vulnerabilities. The current situation in the United Kingdom and worldwide provides a fertile breeding ground for various cyberattacks [<xref ref-type="bibr" rid="ref9">9</xref>]. Cyberattackers are leveraging the increased reliance on remote working, decreased mobility, and the closure of borders between different countries, and the heightened demand for personal protective equipment (PPE) such as masks and gloves. The complex health care supply chain is also a target [<xref ref-type="bibr" rid="ref10">10</xref>]. As a result, greater fear, uncertainty, and doubt is being experienced by the general population.</p>
      </sec>
      <sec>
        <title>Rationale</title>
        <p>There is some research reviewing the literature on cybersecurity in the health sector. Jalali et al [<xref ref-type="bibr" rid="ref11">11</xref>] performed a systematic review of the literature on cybersecurity response plans in health care. Coventry et al [<xref ref-type="bibr" rid="ref12">12</xref>] conducted a narrative review on trends in cyber threats and ways forward in the health sector. Kruse et al [<xref ref-type="bibr" rid="ref13">13</xref>] systematically reviewed health care–related cyber threats and trends. Offner et al [<xref ref-type="bibr" rid="ref14">14</xref>] reviewed cyber threats and mitigation strategies among Australian health care organizations. Sardi et al [<xref ref-type="bibr" rid="ref15">15</xref>] performed a systematic review of cyber risk in health facilities. However, there is limited research on an in-depth review and analysis of key cybersecurity challenges and solutions, specifically in the health sector, in the context of a pandemic situation such as COVID-19.</p>
      </sec>
      <sec>
        <title>Objective</title>
        <p>Through a scoping review, this paper aims to identify the most prominent and significant methods of attack and threats that have affected the health sector during the COVID-19 pandemic, cybersecurity challenges, solutions, and areas that require further improvement. This research covers not only security-related matters as a result of the COVID-19 pandemic but also discusses inherent security challenges in health information systems that can be potentially exploited by attackers during the COVID-19 pandemic. It has implications for the whole spectrum of the health sector as a result of the increase in cybersecurity risks such as phishing, ransomware, and distributed denial-of-service (DDoS) attacks during the coronavirus crisis and in the long term.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Protocol and Registration</title>
        <p>The review was performed according to the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews) checklist, proposed by the Joanna Briggs Institute [<xref ref-type="bibr" rid="ref16">16</xref>]. The aim of this review is to identify health sector cyberattacks, security challenges, and solutions. Before undertaking this review, a protocol was created detailing sources of information, search strategies, eligibility criteria, source selection, and data charting processes. The PRISMA-ScR checklist is presented in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Information Sources</title>
        <p>A search of two major scientific databases (PubMed and Scopus) was performed to identify relevant articles. These include both original research articles and review articles.</p>
      </sec>
      <sec>
        <title>Search</title>
        <p>The search formula “(covid OR healthcare) AND cybersecurity” was used to search for articles. The articles identified should have either a COVID-cybersecurity core or a healthcare–cybersecurity core.</p>
      </sec>
      <sec>
        <title>Eligibility Criteria</title>
        <p>Only articles in English published in the last decade were included (ie, 2011-2020) in order to focus on current issues, challenges, and solutions. Reports, news articles, or websites were also included only when they are related directly to previously published work, or they were the only currently available information source at the time of manuscript preparation. Inclusion criteria were as follows: (1) relevance to health care cybersecurity and (2) coverage of well-discussed cybersecurity issues, challenges, and solutions.</p>
      </sec>
      <sec>
        <title>Selection of Sources of Evidence</title>
        <p>The selection process is illustrated in <xref rid="figure1" ref-type="fig">Figure 1</xref>. The results of the search were exported to the EndNote library. The title and abstract of each paper were analyzed by 2 of the authors to assess eligibility. In cases in which this was not obvious, all 4 authors examined the paper and, when necessary, read it to assess relevance. A total of 307 identified papers were screened and 53 duplicates were removed. An additional 57 papers were excluded for not focusing on the healthcare–cybersecurity core or the COVID-cybersecurity core in the abstract. Another 197 papers were excluded for lacking these cores in the full text. In total, 56 papers were included in the review.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Flowchart showing the article identification and selection process.</p>
          </caption>
          <graphic xlink:href="jmir_v23i4e21747_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Charting Process</title>
        <p>The data were extracted and stored in a standardized Microsoft Excel (Microsoft Corp) form. This was an iterative process whereby the charting table is continually updated. Data charting was carried out both independently and collectively by at least two authors to ensure the quality of the extracted key findings from the literature before being used in the analysis.</p>
      </sec>
      <sec>
        <title>Data Items</title>
        <p>Key data items, including title, abstract, authorship, aims, key findings related to the review objectives, evidence document, document type, year of publication, and location, were extracted.</p>
      </sec>
      <sec>
        <title>Critical Appraisal Within Sources of Evidence</title>
        <p>Although the Joanna Briggs Institute suggests that the critical appraisal is usually not needed for a scoping review, we had at least 2 authors check the quality of the source of evidence to ensure they were relevant, up to date, and from reputable sources. In cases in which this was not obvious, all 4 authors assessed the sources.</p>
      </sec>
      <sec>
        <title>Synthesis of Results</title>
        <p>By aggregating information from the selected literature, the results were analyzed and qualitatively presented in both tabular and descriptive formats (grouped into themes), which aligned with the objective and scope of the review.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Four themes were observed across the selected literature: (1) health sector condition changes due to COVID-19, (2) health care cyberattacks during the COVID-19 pandemic, (3) health care cybersecurity challenges, and (4) health care cybersecurity controls.</p>
      <sec>
        <title>Health Sector Condition Changes Due to COVID-19</title>
        <p>The findings pertaining to changes in conditions in the health sector as a result of COVID-19 are summarized in <xref ref-type="table" rid="table1">Table 1</xref>. The main changes to health services caused by the COVID-19 pandemic include decreased mobility, border closures, and the increasing reliance on remote work, often carried out with little previous experience and planning. These conditions have made the health sector more vulnerable to potential cyberattacks [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Health sector condition changes due to COVID-19.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Changes</td>
                <td>Reference</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>The decreased mobility and border closures, and the increasing reliance on remote work, create challenges to health sector</td>
                <td>Hakak et al [<xref ref-type="bibr" rid="ref1">1</xref>], Williams et al [<xref ref-type="bibr" rid="ref2">2</xref>], Schneck [<xref ref-type="bibr" rid="ref17">17</xref>]</td>
              </tr>
              <tr valign="top">
                <td>New technologies such as eConsultation services for patients and electronic multidisciplinary teams leave users open to a variety of attacks</td>
                <td>Weil and Murugesan [<xref ref-type="bibr" rid="ref18">18</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Health service staff often have limited experience in working remotely, leaving the sector vulnerable to cyberattacks, such as malwares</td>
                <td>Boddy et al [<xref ref-type="bibr" rid="ref9">9</xref>], Offner et al [<xref ref-type="bibr" rid="ref14">14</xref>], Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>], Hoffman [<xref ref-type="bibr" rid="ref20">20</xref>], Ronquillo et al [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
              </tr>
              <tr valign="top">
                <td>The health care industry significantly lags behind other industries in terms of cybersecurity and digital literacy is lacking among staff working from home, making it a prominent target</td>
                <td>Sardi et al [<xref ref-type="bibr" rid="ref15">15</xref>], Kim et al [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
              </tr>
              <tr valign="top">
                <td>The increase in demand for certain goods such as PPE<sup>a</sup> makes health services and governments exposed to digital scams such as luring emails with the intention of stealing sensitive information</td>
                <td>Schneck [<xref ref-type="bibr" rid="ref17">17</xref>]</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>PPE: personal protective equipment.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>As health staff and patients are restricted in terms of movement due to the lockdown, the decrease in mobility and border closures make individuals and organizations turn to technology to provide essential health services such as appointments, diagnosis, and even operations. Examples are the use of eConsultation (electronic consultation) services for patients and electronic multidisciplinary teams. Although these technologies have their advantages, they leave users and receivers of these technologies open to a variety of attacks such as phishing campaigns and ransomware attacks [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
        <p>Furthermore, health services staff often have limited previous experience with remote working and with planning for this change, which leaves the sector vulnerable to cyberattacks [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. As health services make use of a variety of medical devices, interconnectivity and interoperability create issues as they are now being accessed from outside health services’ internal network perimeter. The medium and mode of access creates problems as access to the sensitive parts of health services can be reached via unsecured network connections or unpatched systems by staff working remotely [<xref ref-type="bibr" rid="ref19">19</xref>]. In addition, some medical devices use off-the-shelf software, such as commercial operating systems (eg, older versions of Windows). These systems are vulnerable to a large variety of threats such as malware, ransomware, etc [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Overall, the health care industry significantly lags behind other industries in terms of cybersecurity and coupled with a lack of digital literacy among staff mostly working from home, makes it a prominent target [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Additionally, the increase in demand for certain goods such as PPE and other protective merchandise such as masks, gloves, etc, are exposing health services and even governments to digital scams, especially in the form of phishing attacks. As health services are in need of these essential items, they can be targeted by adversaries via luring emails with the intention of stealing sensitive information [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
      </sec>
      <sec>
        <title>Health Care Cyber Attacks During the COVID-19 Pandemic</title>
        <p>Multiple cyberattacks occurred at the beginning of the global COVID-19 pandemic (early 2020) in the health sector. We selected well-documented cyberattacks with detailed information available, including root causes and consequences. The main findings are summarized in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Security incidents during the COVID-19 pandemic.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="350"/>
            <col width="280"/>
            <col width="370"/>
            <thead>
              <tr valign="top">
                <td>Security incidents</td>
                <td>Type of attack</td>
                <td>Impact</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Brno University Hospital [<xref ref-type="bibr" rid="ref3">3</xref>]</td>
                <td>Ransomware</td>
                <td>Postponement of surgeries, appointments, etc</td>
              </tr>
              <tr valign="top">
                <td>US Department of Health and Human Services [<xref ref-type="bibr" rid="ref4">4</xref>]</td>
                <td>Distributed denial of service</td>
                <td>Disruption to COVID-19 pandemic responses</td>
              </tr>
              <tr valign="top">
                <td>World Health Organization [<xref ref-type="bibr" rid="ref5">5</xref>]</td>
                <td>Ransomware/phishing</td>
                <td>Defacement and misinformation</td>
              </tr>
              <tr valign="top">
                <td>Gilead Sciences, Inc [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>Phishing</td>
                <td>Impersonation and exfiltration</td>
              </tr>
              <tr valign="top">
                <td>Hospitals in Romania [<xref ref-type="bibr" rid="ref7">7</xref>]</td>
                <td>Phishing/ransomware</td>
                <td>Disruption and exfiltration</td>
              </tr>
              <tr valign="top">
                <td>Health care supply chains [<xref ref-type="bibr" rid="ref8">8</xref>]</td>
                <td>Malware</td>
                <td>Disruption of activities</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Brno University Hospital in the Czech Republic, which is one of the country’s main COVID-19 testing centers, was struck by ransomware, resulting in the postponement of surgeries. The ransomware infection was confirmed in the early hours of the day when the hospital decided to disconnect all computer networks. It was noticed that the ransomware infection was gradually replicating, and all the individual systems were failing. As a result, all computers had to be shut down. The hospital is reported to be still recovering capabilities, as it is not yet fully operational due to the attack [<xref ref-type="bibr" rid="ref3">3</xref>]. The attack had an impact on the activities of the hospital as there was no database systems, that is, means of storing data; hence, staff have had to write and transfer their notes manually. This leads to slow processes and can potentially endanger lives in these trying times.</p>
        <p>The US Department of Health and Human Services experienced a DDoS attack intended to disrupt the organization’s responses to the COVID-19 pandemic. This attack targeted its servers by overloading it with millions of hits over several hours [<xref ref-type="bibr" rid="ref4">4</xref>]. It was reported as a campaign of disruption aimed at hindering the response to the coronavirus pandemic as the targeted agency was tasked with protecting the health of citizens and delivering essential human services. Although the agency claimed the attack was not successful, and that the attackers did not infiltrate the internal network nor steal any data, this demonstrates that attacks like these can cause damage not just to the services of health agencies but also to the lives that depend on it, especially in times of emergencies.</p>
        <p>Increased phishing website hacking attempts on the WHO and its partners led to the WHO putting out a warning to the general public to be more careful [<xref ref-type="bibr" rid="ref5">5</xref>], as it has been reported that over 4000 coronavirus-related domains (ie, domains that contain words like “corona” or “covid”) have been registered since the beginning of 2020. These registered domains were used by adversaries for phishing-related activities. Thus, the WHO incident was orchestrated by hackers in order to steal passwords. It was reported that a group of hackers created a malicious website posing as an email login portal for WHO employees in an attempt to steal their passwords. Although the WHO claims the attack was not successful, it still shows that phishing attacks can be leveraged to target health organizations.</p>
        <p>Coronavirus vaccine manufacturer Gilead Sciences, Inc, was also targeted by hackers [<xref ref-type="bibr" rid="ref6">6</xref>]. Staff at this pharmaceutical company were targeted via a fake email login page that was designed to steal passwords. It was reported that the attack was an attempt to compromise the email accounts of staff at the company using messages that impersonated journalists.</p>
        <p>Hospitals in Romania experienced ransomware attacks by hackers as well [<xref ref-type="bibr" rid="ref7">7</xref>]. The hackers were planning to use COVID-19–themed emails to infect these hospitals with ransomware. Their motivation was the protest against the COVID-19 quarantine measures of the country. The hackers owned malwares (eg, remote access trojans, ransomware, website defacements, and SQL injection tools) that can be used to bring down servers and steal information. It was reported that they intended to send emails about COVID-19 to hospitals to infect computers, encrypt files, and disrupt hospital activities. However, the attack was not as successful as the hackers were tracked down and arrested by Romanian law enforcement.</p>
        <p>It has been reported that Interpol has cautioned agencies around the world about a significant rise in the global number of ransomware attacks explicitly targeting hospitals and health institutions [<xref ref-type="bibr" rid="ref8">8</xref>]. It discovered that there was an increase in the number of attempted ransomware attacks on organizations in the 194 member countries. Additionally, a cyber warning was issued for key health care organizations involved in the coronavirus response both in the United Kingdom and the United States. A joint statement by the United Kingdom’s National Cyber Security Centre (NCSC) and US Cybersecurity and Infrastructure Security Agency revealed that malicious cyber campaigns had been uncovered, with large-scale “password spraying” campaigns directed at health care bodies and medical research organizations in both nations [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <p>Health care supply chains have not been omitted from these attacks; the US Federal Bureau of Investigation (FBI) issued a warning about a malware targeting this sector. The malware is called Kwampirs, a remote access Trojan that exploits network vulnerabilities of targeted organizations across the United States, Europe, Asia, and the Middle East [<xref ref-type="bibr" rid="ref24">24</xref>]. The infected supply chain components included cyber-physical systems assets in health care organizations. The FBI alerted the health care sector against future cyberattacks, as Kwampirs have been historically targeting health care organizations.</p>
        <p>The analysis of the above-mentioned incidents indicate that the health sector has become a primary target of cybersecurity attacks. Attackers are taking advantage of the COVID-19 pandemic and launching attacks, which are mainly ransomware, DDoS, phishing, and other type of malwares. The health care supply chain can be more vulnerable to cyberattacks especially during pandemics. The cyberattacks have resulted in negative impacts on the availability of essential health care services and challenged health care organizations in the protection of the confidentiality and integrity of health care information.</p>
      </sec>
      <sec>
        <title>Health Care Cybersecurity Challenges</title>
        <p>Selected papers discussing the main challenges of cybersecurity in the health sector were reviewed, and the main findings are summarized in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Key health sector security challenges and associated vulnerabilities.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="670"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Key challenges and published vulnerabilities</td>
                <td>Reference</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Remote work security assurance</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There are known security vulnerabilities with remote desktop protocols and virtual private networks</td>
                <td>Argaw et al [<xref ref-type="bibr" rid="ref10">10</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There are known attacks on health care system such as distributed denial-of-service attacks, malware, etc</td>
                <td>Offner et al [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cyberattacks target innumerable wireless connected devices in health care</td>
                <td>Boddy et al [<xref ref-type="bibr" rid="ref9">9</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Endpoint device management</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>An endpoint device can provide an entry point to larger health care networks</td>
                <td>Coventry et al [<xref ref-type="bibr" rid="ref12">12</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The integration of new endpoint devices with outdated, legacy, or unsupported operating systems compromises interoperability and increases cybersecurity vulnerability</td>
                <td>Kruse et al [<xref ref-type="bibr" rid="ref13">13</xref>], Naidoo [<xref ref-type="bibr" rid="ref25">25</xref>]<break/>  <break/>  </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The health sector relies heavily on perimeter defense (antivirus, firewalls) for protection against cyber risk</td>
                <td>Reagin and Gentry [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The factor that most influences cybersecurity in a hospital is endpoint complexity</td>
                <td>Jalali and Kaiser [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Human factors in cybersecurity</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The majority of information security incidents are related to human error</td>
                <td>Evans et al [<xref ref-type="bibr" rid="ref28">28</xref>], Evans et al [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a statistically significant positive correlation between workload and the probability of health care staff opening a phishing email</td>
                <td>Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The health sector lacks root cause analysis and cybersecurity incident prevention, especially those through unintentional human error</td>
                <td>Evans et al [<xref ref-type="bibr" rid="ref28">28</xref>], Evans et al [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Although some effort has been made to analyze human error (eg, use of IS-CHEC<sup>a</sup>), such approaches have not been widely adopted</td>
                <td>Evans et al [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Lack of security awareness</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is low awareness in the health sector of cyber risks</td>
                <td>Gordon et al [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The most common action taken in response to breaches or attacks is additional staff training or communication</td>
                <td>Furnell and Shah [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Health staff has poor awareness of consequences of behavior, and there is a lack of policies and reinforcement of secure behavior</td>
                <td>Coventry et al [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of pandemic-specific cybersecurity training campaigns, documented procedures, and guidance on revised procedures and technologies</td>
                <td>Kaplan [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Inadequate board-level risk assessment communication</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a need for a matrix that can translate the strategic requirements of a health care system into prioritized cyber improvement needs</td>
                <td>Barad [<xref ref-type="bibr" rid="ref35">35</xref>]<break/>  <break/>  <break/>  <break/>  </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of understanding of security risks and its impact on organization-wide risk management</td>
                <td>Tully et al [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of appreciation among health care executive management of the business risk impact associated with cyber breaches</td>
                <td>Jones and Katzis [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Inadequate business continuity plans</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Risks will continue to grow if cybersecurity is not designed into the product from the beginning of the product or project life cycle</td>
                <td>Coventry and Branley [<xref ref-type="bibr" rid="ref12">12</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The key security risks challenging business continuity are vendor dependence, inappropriate encryption configurations, and the inability to handle health information sharing and exchange with third-party and cross-border partners</td>
                <td>Frontoni et al [<xref ref-type="bibr" rid="ref38">38</xref>], Bhatia and Ibrahim [<xref ref-type="bibr" rid="ref39">39</xref>], Natsiavas et al [<xref ref-type="bibr" rid="ref40">40</xref>], Nalin et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The health sector lacks sophisticated data security tools compared to other industries</td>
                <td>Walker-Roberts et al [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cybersecurity capability is a strategic asset that every health organization must adopt, along with the concepts of building organizational resilience and the capacity to learn from mistakes</td>
                <td>Jalali et al [<xref ref-type="bibr" rid="ref11">11</xref>], Reagin and Gentry [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Lack of coordinated incident response</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The health sector tends to have a time lag between an attack occurring and detection of the breach</td>
                <td>Coventry and Branley [<xref ref-type="bibr" rid="ref12">12</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Current health care cyber defense is often reactive and undertaken after malicious attacks</td>
                <td>Akinsanya et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of a coordinated incident response capacity to actively counteract constantly emerging and evolving malware threats</td>
                <td>Chen et al [<xref ref-type="bibr" rid="ref44">44</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cybersecurity should be a team effort, from board members to front-line employees, with all being held accountable for cybersecurity</td>
                <td>Pullin [<xref ref-type="bibr" rid="ref45">45</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Limited budget and the need to deliver health care services without disruption</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of experienced cybersecurity experts in the health care industry</td>
                <td>Argaw et al [<xref ref-type="bibr" rid="ref46">46</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>There is a lack of a value-based system to weigh and balance benefits and risks in aspects of security, privacy, and adoption of technology</td>
                <td>Boddy et al [<xref ref-type="bibr" rid="ref9">9</xref>]<break/>  <break/>  </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Vulnerable MCPS<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Limited MCPS capability makes the health sector vulnerable to compromises</td>
                <td>Almohri et al [<xref ref-type="bibr" rid="ref47">47</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The reliance on the health care network increases cybersecurity risks to health care systems</td>
                <td>Zheng et al [<xref ref-type="bibr" rid="ref48">48</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cyber threats can be introduced to the MCPS though vulnerable IoT<sup>c</sup> devices</td>
                <td>Jimenez et al [<xref ref-type="bibr" rid="ref49">49</xref>]</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>IS-CHEC: Information Security Core Human Error Causes.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>MCPS: medical cyber-physical systems.</p>
            </fn>
            <fn id="table3fn3">
              <p><sup>c</sup>IoT: internet of things.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The analysis shows that the main cybersecurity challenges of the health sector are remote work security assurance, endpoint device management, human errors, the lack of security awareness, inadequate senior-level security risk assessment, inadequate business continuity plans, the lack of coordinated incident response, constrains on budget and resources, and vulnerability of medical systems. These challenges cover not only the security-related matters as a result of the COVID-19 pandemic but also the inherent security challenges in the health sector that can be potentially exploited by attackers during the COVID-19 pandemic. It is imperative for the health care organizations to identify these challenges and take actions for prevention.</p>
        <sec>
          <title>Remote Working Security Assurance</title>
          <p>As remote working is now an integral element of health care service delivery, health staff are relying on enterprise remote desktop protocols and virtual private networks (VPN) to access internal networks. However, these come with certain risks that adversaries are looking to exploit. For example, the remote desktop protocol has a history of security issues and generally should not be publicly accessible without additional protections such as firewall, whitelist, and multifactor authentication [<xref ref-type="bibr" rid="ref10">10</xref>]. Likewise, VPNs also have some known and unknown vulnerabilities, both on the client and server side, which have been exploited for years by cybercriminals [<xref ref-type="bibr" rid="ref19">19</xref>]. The DDoS attacks on health care systems [<xref ref-type="bibr" rid="ref14">14</xref>] and the innumerable wireless connected devices [<xref ref-type="bibr" rid="ref9">9</xref>] have created further challenges to a remote work environment.</p>
        </sec>
        <sec>
          <title>Endpoint Device Management</title>
          <p>A number of endpoint devices, which comprises various patient-monitoring equipment that either connects to the internet or legacy-dispersed networks, are often unpatched [<xref ref-type="bibr" rid="ref12">12</xref>]. This risk further increased during the pandemic as a result of organizations competing to procure internet of things (IoT) devices during the COVID-19 pandemic for their staff, which resulted in more employees than before using personal devices to perform work from home. From an enterprise architecture perspective, having tighter integration across the information technology (IT) environment is positive in terms of the organization being more agile; however, it makes the network vulnerable to cyberattacks such as email phishing, ransomware, DDoS, and network data breaches [<xref ref-type="bibr" rid="ref13">13</xref>]. The integration of new endpoint devices with outdated legacy systems can increase vulnerabilities [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. However, organizations overly rely on perimeter defense (antivirus, firewalls) and other forms of basic protection against cyberattacks [<xref ref-type="bibr" rid="ref26">26</xref>]. By interviewing 19 C-Suite cybersecurity professionals, Jalali et al [<xref ref-type="bibr" rid="ref27">27</xref>] also confirmed the factor that most influences cybersecurity in a hospital setting is endpoint complexity.</p>
        </sec>
        <sec>
          <title>Human Factors in Cybersecurity</title>
          <p>Existing research has shown that the majority of information security incidents are related to human error [<xref ref-type="bibr" rid="ref28">28</xref>]. There is a tendency for human error when staff are busy focusing on saving lives and adjusting to new work environments and technologies. With sudden changes in working practices, being under stress for an extended period of time makes employees vulnerable to falling into malicious trickery and making mistakes [<xref ref-type="bibr" rid="ref28">28</xref>]. According to Jalali at al [<xref ref-type="bibr" rid="ref19">19</xref>], there is a statistically significant positive correlation between workload and the probability of a health care staff opening a phishing email. Naidoo et al [<xref ref-type="bibr" rid="ref25">25</xref>] developed a multilevel influence model to explore how cybercriminals exploited the COVID-19 pandemic using social engineering techniques. However, the health sector lacks root cause analysis [<xref ref-type="bibr" rid="ref28">28</xref>] to prevent human error related security incidents, especially those through unintentional human error [<xref ref-type="bibr" rid="ref29">29</xref>]. Although some efforts have been made in applying the human reliability analysis technique in the context of information security (eg, Information Security Core Human Error Causes [IS-CHEC] [<xref ref-type="bibr" rid="ref30">30</xref>]) to analyze human error, such approaches have not been widely adopted.</p>
        </sec>
        <sec>
          <title>Lack of Security Awareness</title>
          <p>Cybercriminals are exploiting people’s anxieties during the COVID-19 pandemic. Gordon et al [<xref ref-type="bibr" rid="ref31">31</xref>] identified that there is low awareness in the health sector of risks. Furnell et al [<xref ref-type="bibr" rid="ref32">32</xref>] identified that the most common action taken in response to the most disruptive breaches or attacks is additional staff training or communication. Coventry et al [<xref ref-type="bibr" rid="ref33">33</xref>] reported that health staff had poor awareness of the consequences of certain behaviors, and there is a lack of policies and reinforcement of secure behavior. However, increased cybersecurity awareness is required for the health sector to protect themselves and their patients from potential cyber threats such as phishing and ransomware. Due to the lack of prior planning and training to work under pandemic situations, health care staff require more training and support, such as pandemic-specific cybersecurity training campaigns, documented procedures, and guidance on revised procedures and technologies [<xref ref-type="bibr" rid="ref34">34</xref>]. For example, health sector staff should be made aware of and able to flag phishing emails containing buzzwords during a pandemic, such as “WHO” or “donation.” They should also be advised on how to validate trustworthy information sources in order to avoid ransomware attacks [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        </sec>
        <sec>
          <title>Inadequate Board-Level Risk Assessment Communication</title>
          <p>There is a lack of understanding of security risks and its impact on organization-wide risk management, such as impacts on patient care and clinical outcomes [<xref ref-type="bibr" rid="ref36">36</xref>]. The health sector lacks a matrix that can translate the strategic improvement needs of a health care system into prioritized information/cyber improvement needs [<xref ref-type="bibr" rid="ref35">35</xref>]. Schwartz et al [<xref ref-type="bibr" rid="ref37">37</xref>] identified that there is a lack of appreciation among health care executive management staff of the business risk impacts of cyber breaches.</p>
        </sec>
        <sec>
          <title>Inadequate Business Continuity Plans</title>
          <p>The health sector does not have enough data protection mechanisms; Walker-Roberts et al [<xref ref-type="bibr" rid="ref42">42</xref>] confirmed that the health sector lacks sophisticated data security tools compared to other industries. Security is not built into its supply-chain and third-party vendors. Existing research shows that the key security risks challenging business continuity are vendor dependence, inappropriate encryption configurations, and the inability to handle health information sharing and exchange with third-party and cross-border partners [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref41">41</xref>]. Risks will continue to grow if cybersecurity is not integrated into the project life cycle from the beginning [<xref ref-type="bibr" rid="ref12">12</xref>]. Cybersecurity capability is a strategic asset that every health organization must adopt, along with the concepts of building organizational resilience and the capacity to recover from incidents and learn from mistakes in order to maintain business continuity [<xref ref-type="bibr" rid="ref11">11</xref>].</p>
        </sec>
        <sec>
          <title>Lack of Coordinated Incident Response Involving Different Parties</title>
          <p>As highlighted by Coventry and Branley [<xref ref-type="bibr" rid="ref12">12</xref>], the health care sector has a exhibited a trend of having a time lag between the occurrence of an attack and its detection. In fact, this aids attackers by giving them more time to explore the network and conduct lateral movement, which increases the damage inflicted by security breaches. Current health care cyber defense response is often reactive and undertaken after malicious attacks [<xref ref-type="bibr" rid="ref43">43</xref>], lacking a coordinated incident response capacity to counteract constantly emerging and evolving malware threats [<xref ref-type="bibr" rid="ref44">44</xref>]. The failure of health care organizations in having a successful and secure backup mechanism in place makes it frail in terms of incident response and recovery [<xref ref-type="bibr" rid="ref12">12</xref>]. Pullin et al [<xref ref-type="bibr" rid="ref45">45</xref>] also confirmed that cybersecurity should be a team effort, with everyone from board members to front-line employees being held accountable for cybersecurity.</p>
        </sec>
        <sec>
          <title>Limited Budget and the Need to Deliver Health Care Services Without Disruption</title>
          <p>Although health care services are spending funds to become more integrated to deliver health care services without disruption [<xref ref-type="bibr" rid="ref9">9</xref>], the necessary emphasis is not given to the security aspect in terms of upkeep (eg, keeping software updated and systems secure). However, this is reported to be due to a shortage in experienced cybersecurity experts within health care organizations with the required skills and experience to enable health care organizations to change their business operations at significant pace without undertaking the “usual” levels of cybersecurity assurance [<xref ref-type="bibr" rid="ref46">46</xref>]. Boddy et al [<xref ref-type="bibr" rid="ref9">9</xref>] identified the needs of a value-based system to weigh and balance the benefits and risks in aspects of security, privacy, and adoption of technology.</p>
        </sec>
        <sec>
          <title>Vulnerable Medical Cyber-Physical Systems</title>
          <p>Cybersecurity measures such as vulnerability scans or patch management are often not available or only possible by manufacturers [<xref ref-type="bibr" rid="ref49">49</xref>]. Their basic limited capability makes them vulnerable to compromise [<xref ref-type="bibr" rid="ref47">47</xref>]. Cybersecurity measures such as vulnerability scans or patch management are often not available or only accessible for manufacturers. Moreover, their connection and reliance upon the health care network significantly increase the cybersecurity risk to the entire health care system [<xref ref-type="bibr" rid="ref48">48</xref>]. With the widespread use of IoT medical devices, cyber threats can be introduced to medical cyber-physical systems though vulnerable IoT devices [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Health Care Cybersecurity Controls</title>
        <p>Selected papers discussing cybersecurity solutions present within the health sector were reviewed, and the main findings are summarized in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Crucial health sector security solutions.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="720"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Solution</td>
                <td>Reference</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Apply endpoint device management tools</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply perimeter-based defense (antivirus, firewalls) for protection against cyberattacks</td>
                <td>Reagin and Gentry [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Restrict the technologies and devices used by health staff to remain compliant with security regulations such as HIPAA<sup>a</sup> during pandemics</td>
                <td>Hoffman [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Adapt the NIST<sup>b</sup> approach to manage security IoT<sup>c</sup> medical devices</td>
                <td>Kelly et al [<xref ref-type="bibr" rid="ref50">50</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Secure the remote work environment</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply multifactor authentication</td>
                <td>Argaw et al [<xref ref-type="bibr" rid="ref10">10</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply a chaotic map–based authenticated security framework for remote point of care</td>
                <td>Deebak et al [<xref ref-type="bibr" rid="ref51">51</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply remote access monitoring such as the NHS<sup>d</sup> attack surface reduction rules</td>
                <td>Zorz [<xref ref-type="bibr" rid="ref52">52</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply perimeter security solution such as NHS Secure Boundary to enable secure access</td>
                <td>NHS Digital [<xref ref-type="bibr" rid="ref53">53</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The health care sector needs to ensure data protection mechanisms for securing system access and transmitting data</td>
                <td>Rezaeibagha et al [<xref ref-type="bibr" rid="ref54">54</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Raise security awareness</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply a holistic, integrated approach to improve staff awareness, competence, and mitigation of threats</td>
                <td>Pullin [<xref ref-type="bibr" rid="ref45">45</xref>], Sedlack [<xref ref-type="bibr" rid="ref55">55</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Implement cybersecurity training programs and cybersecurity awareness campaigns</td>
                <td>Gordon et al [<xref ref-type="bibr" rid="ref56">56</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply the NCSC’s<sup>e</sup> Board Toolkit to raise board-level security awareness</td>
                <td>NHS Digital [<xref ref-type="bibr" rid="ref57">57</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Provide comprehensive employee training and education to enable the identification and assessment of risks</td>
                <td>Alzahrani [<xref ref-type="bibr" rid="ref58">58</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Implement a positive organizational climate to influence people’s behavior</td>
                <td>Kessler et al [<xref ref-type="bibr" rid="ref59">59</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Ensure business continuity</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply a self-assessment tool such as the NHS Data Security and Protection Toolkit</td>
                <td>NHS Digital [<xref ref-type="bibr" rid="ref60">60</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Embrace cybersecurity and a develop strong culture of cyber vigilance</td>
                <td>Dameff et al [<xref ref-type="bibr" rid="ref61">61</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ensure business continuity through data backups, intrusion detection, and prevention systems</td>
                <td>Rezaeibagha et al [<xref ref-type="bibr" rid="ref54">54</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply a systematic risk assessment of the impacts on health care business operations</td>
                <td>Kim et al [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Consider cybersecurity insurance in health care</td>
                <td>Kabir et al [<xref ref-type="bibr" rid="ref62">62</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Apply technical controls</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply network segmentation to isolate network traffic</td>
                <td>Hakak et al [<xref ref-type="bibr" rid="ref1">1</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply general technical controls including encryption, authentication, and authorization</td>
                <td>Yaseen et al [<xref ref-type="bibr" rid="ref63">63</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply homomorphic encryption that ensures strong security and privacy guarantees while enabling analysis of encrypted data and sensitive medical information</td>
                <td>Raisaro et al [<xref ref-type="bibr" rid="ref64">64</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply blockchain to facilitate health care interoperability</td>
                <td>Narikimilli et al [<xref ref-type="bibr" rid="ref65">65</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply cryptographic security to address data sharing and storage of patient information across network systems</td>
                <td>Pussewalage and Oleshchuk [<xref ref-type="bibr" rid="ref66">66</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Policies and legislations</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Laws and regulations can help to combat the issues of medical cyber-physical systems</td>
                <td>Raisaro et al [<xref ref-type="bibr" rid="ref64">64</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Security instructions and control designs should be tailored</td>
                <td>Wang and Jones [<xref ref-type="bibr" rid="ref67">67</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Regulatory changes or manufacturers should become more security-minded in the medical device design phase</td>
                <td>Department of Health and Social Care, UK Government [<xref ref-type="bibr" rid="ref68">68</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Policymakers may need to alter policies to allow new technological innovations to be applied to health care</td>
                <td>Bhuyan et al [<xref ref-type="bibr" rid="ref69">69</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The US Congress passed the 21st Century Cures Act to promote patient control over their own health information while protecting privacy and cybersecurity</td>
                <td>Hoffman [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Incident reporting and cyber threat intelligence support</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NHS Digital issued two high-severity CareCERT alerts (BlueKeep and DejaBlue) and developed a high-severity alert process handbook to facilitate incident reporting and sharing</td>
                <td>Department of Health and Social Care, UK Government [<xref ref-type="bibr" rid="ref68">68</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Apply an evidence-based approach, such as the generic security template, for incident reporting and exchange</td>
                <td>He and Johnson [<xref ref-type="bibr" rid="ref70">70</xref>], He and Johnson [<xref ref-type="bibr" rid="ref71">71</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Establish an international workforce to facilitate cyber threat reporting and exchange to combat pandemic-themed cyber threats</td>
                <td>Hakak et al [<xref ref-type="bibr" rid="ref1">1</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Cybersecurity guidance specific to COVID-19</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The NHS has added guidance on working from home securely in the context of COVID-19</td>
                <td>NHS Digital [<xref ref-type="bibr" rid="ref72">72</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>The United Kingdom’s Information Commissioner’s Office created an information hub to assist individuals and organizations to manage data protection during the COVID-19 pandemic</td>
                <td>Information Commissioner’s Office [<xref ref-type="bibr" rid="ref73">73</xref>]</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>NIST: National Institute of Standards and Technology.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>IoT: internet of things.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>NHS: National Health Service.</p>
            </fn>
            <fn id="table4fn5">
              <p><sup>e</sup>NCSC: National Cyber Security Centre.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <sec>
          <title>Apply Endpoint Device Protection</title>
          <p>During the COVID-19 pandemic, health staff working from home may adopt telehealth technologies or IoT devices. This increases cybersecurity risks, as it expands the footprint for cyberattack to the use of new devices outside of the service providers’ network [<xref ref-type="bibr" rid="ref50">50</xref>]. Health staff are advised to restrict the technologies and devices they used to remain compliant with security regulations such as Health Insurance Portability and Accountability Act during the pandemics [<xref ref-type="bibr" rid="ref20">20</xref>]. However, health care organizations mainly reply on perimeter defense (eg, antivirus, firewalls) for protection against the potential cyberattacks [<xref ref-type="bibr" rid="ref26">26</xref>]. The National Institute of Standards and Technology (NIST) has recently released a draft security guide and recommendations for managing the security IoT devices, but it is unclear whether it will be enforced across the health sector [<xref ref-type="bibr" rid="ref50">50</xref>].</p>
        </sec>
        <sec>
          <title>Secure Remote Work Environment</title>
          <p>Existing solutions include the use of multifactor authentication and the monitoring of the log activity of user accounts and revoking account access if no longer needed [<xref ref-type="bibr" rid="ref10">10</xref>]. Deebak et al [<xref ref-type="bibr" rid="ref51">51</xref>] proposed a chaotic map–based authenticated security framework for remote point of care. Health organizations such as those in the United Kingdom have started using services to monitor their remote access infrastructure constantly and to investigate anomalies. For example, the National Health Service (NHS) has employed attack surface reduction rules (eg, block macros, executable content, process creation) [<xref ref-type="bibr" rid="ref52">52</xref>]. Furthermore, a more recent NHS Digital service, Secure Boundary, was introduced as a perimeter security solution to enable secure access for NHS staff and to provide security monitoring [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
        </sec>
        <sec>
          <title>Raise Security Awareness</title>
          <p>Health care organizations already have cybersecurity programs in place to increase levels of security awareness [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. Existing solutions include the use of cybersecurity training programs and cybersecurity awareness campaigns [<xref ref-type="bibr" rid="ref56">56</xref>]. In a cybersecurity campaign, the IT department sends out fake phishing emails to their staff and provides further training to those who fail to identify these emails [<xref ref-type="bibr" rid="ref56">56</xref>]. In the United Kingdom, more than 100 NHS boards have completed cybersecurity training accredited by the Government Communications Headquarters since the WannaCry attack. Furthermore, the NCSC’s Board Toolkit for the NHS provides additional information on ransomware and backups. NHS Digital also runs a cyber awareness campaign called the Keep I.T. Confidential campaign. Over 340 organizations have downloaded the materials since its launch in September 2019 [<xref ref-type="bibr" rid="ref57">57</xref>]. However, there is not enough work on training programs tailored to the pandemic such as COVID-19–themed social engineering, although the world is realizing the importance of raising the awareness of COVID-19–related cyberattacks [<xref ref-type="bibr" rid="ref58">58</xref>]. Existing research shows that positive organizational climate can influence people’s behavior [<xref ref-type="bibr" rid="ref59">59</xref>].</p>
        </sec>
        <sec>
          <title>Ensure Business Continuity</title>
          <p>Health care leadership must embrace cybersecurity and develop strong cultures of cybervigilance [<xref ref-type="bibr" rid="ref61">61</xref>]. The health sector already has business continuity solutions in place such as data backups and intrusion detection and prevention systems [<xref ref-type="bibr" rid="ref54">54</xref>]. NHS trusts have been asked to follow and meet the Cyber Essentials and government standards. NHS Digital has launched a Data Security and Protection Toolkit [<xref ref-type="bibr" rid="ref60">60</xref>], a self-assessment tool for organizations that need to access NHS patient information and systems. The toolkit must be applied to ensure that organizations practice good cyber hygiene. Security risk assessment is essential to ensure business continuity. Kim et al [<xref ref-type="bibr" rid="ref22">22</xref>] systematically assessed the impacts of cybersecurity threats on remote health care. Cybersecurity insurance in health care [<xref ref-type="bibr" rid="ref62">62</xref>] should also be considered as a solution to ensure business continuity management, but it has not been widely adopted.</p>
        </sec>
        <sec>
          <title>Apply Technical Controls</title>
          <p>General technical controls applied by the health sector include encryption, authentication, and authorization to protect data from cyber threats [<xref ref-type="bibr" rid="ref63">63</xref>]. Cryptographic security is used to address data sharing and storage of patient information across network systems [<xref ref-type="bibr" rid="ref66">66</xref>]. Homomorphic encryption is applied to ensure robust security and privacy guarantees while enabling analysis of encrypted data and sensitive medical information [<xref ref-type="bibr" rid="ref64">64</xref>]. Blockchain is also applied to facilitate health care interoperability due to its immutability, transparency, and decentralization [<xref ref-type="bibr" rid="ref65">65</xref>]. Network segmentation and isolation also need to be considered by the health sector [<xref ref-type="bibr" rid="ref1">1</xref>]. With network segmentation, network traffic can be isolated and/or filtered to limit and/or prevent access between network zones. For example, in case of systems compromise, one should freeze any activity in the system, disconnect the infected machines from any external drive or medical device, and go offline from the network.</p>
        </sec>
        <sec>
          <title>Policy and Legislation</title>
          <p>The health sector already has security policies and legislation in place for cybersecurity management. Laws and regulations are available to protect medical cyber-physical systems [<xref ref-type="bibr" rid="ref64">64</xref>]. Security controls need to be tailored according to regulation [<xref ref-type="bibr" rid="ref67">67</xref>]. Manufacturers are also required to consider these regulations to design medical devices [<xref ref-type="bibr" rid="ref68">68</xref>]. However, policymakers may need to alter policies to allow new technological innovations to be applied to health care [<xref ref-type="bibr" rid="ref69">69</xref>]. The US Congress passed the 21st Century Cures Act to promote the interoperability of electronic health records and promote more patient control over one’s own health information while protecting privacy and cybersecurity [<xref ref-type="bibr" rid="ref20">20</xref>]. However, more efforts are needed on security policies or legislations in handling cybersecurity-related matters during pandemics like COVID-19.</p>
        </sec>
        <sec>
          <title>Incident Reporting and Cyber Threat Intelligence Support</title>
          <p>The health sector is required to report cybersecurity incidents to a supervisory authority, such as the national Computer Security Incident Response Team in the European Union. In the United Kingdom, there is government-approved support from the NCSC. NHS Digital has issued two high-severity CareCERT alerts in 2019 (BlueKeep and DejaBlue). After developing a high-severity alert process handbook, remediation went from 18 weeks for BlueKeep down to 3 weeks for DejaBlue [<xref ref-type="bibr" rid="ref68">68</xref>]. He and Johnson [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>] proposed a generic security template, which is an evidence-based argumentation approach to facilitate incident reporting and exchange. This approach was applied to a health care organization but has not been widely adopted. Hakak et al [<xref ref-type="bibr" rid="ref1">1</xref>] identified the needs of establishing an international workforce to facilitate threat reporting and cyber threat intelligence (eg, attack vectors and countermeasures) exchange to combat pandemic-themed cyber threats. The health sector will benefit from such practices during pandemics in order to avoid similar incidents.</p>
        </sec>
        <sec>
          <title>Cybersecurity Guidance Specific to COVID-19</title>
          <p>Some health care organizations have started providing security guidance specific to COVID-19 for their staff. For example, NHS Digital has added guidance on working from home security, ramping up its on-site support for trusts on risk mitigations, data backup, and threat response. They also offer the NHS the NCSC’s Protective Domain Name Service free of charge [<xref ref-type="bibr" rid="ref72">72</xref>]. Furthermore, governments also provide cybersecurity guidance to both individuals and organizations. For example, the United Kingdom’s Information Commissioner’s Office created an information hub in order to assist individuals and organizations to protect data during the COVID-19 pandemic [<xref ref-type="bibr" rid="ref73">73</xref>].</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Summary of Evidence</title>
        <p>Through a scoping review, this research identified key cybersecurity challenges, solutions adapted by the health sector, and areas to be improved in order to counteract the cyberattacks introduced through changes to working practices in the face of the COVID-19 pandemic. This review identified 9 main challenges in cybersecurity and 11 key solutions that health care organizations adapted to address these challenges. Based on our findings and analysis, we can conclude that the main challenges that the health sector faces due to the COVID-19 pandemic include increased reliance on remote working by staff, high demand for PPE by staff on the first line of defense, and decreased mobility due to the lockdown. Indeed, these changes have made the health sector vulnerable to potential cyberattacks. For example, remote work was taken up by users with little previous experience, and there was also no planning and cybersecurity-associated assurance prior to the shift. Furthermore, evidence can be seen from the security incidents that took place during the lockdown period such as those of Brno University Hospital, hospitals in Romania, etc. The health sector continues to face security challenges [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. Challenges such as remote working security assurance, endpoint device management, inadequate business continuity plans, lack of security awareness, etc, are apparent in the health sector. There are some existing solutions employed by health care organizations, especially in the United Kingdom, such as remote access monitoring. <xref rid="figure2" ref-type="fig">Figure 2</xref> summarizes the main findings from the literature review and highlights the gaps and vulnerabilities that were exploited during the cyberattacks that took place during the COVID-19 pandemic. However, there are still challenges and gaps to be addressed, as discussed below.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Security attacks, key security challenges, solutions, and areas to improve. FBI: Federal Bureau of Investigation; VPN: virtual private network.</p>
          </caption>
          <graphic xlink:href="jmir_v23i4e21747_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Implications for Future Research</title>
        <p>Although the health sector has made some efforts to address these challenges, more research is required in some domains.</p>
        <sec>
          <title>Technical Controls</title>
          <p>The health sector has applied some technical solutions to tackle cybersecurity challenges in order to secure the remote work environment and monitor endpoint applications. These include but are not limited to network security (eg, network segmentation), multifactor authentication, password protection, patching systems, and the use of intrusion detection and prevention systems. There are also innovative security solutions such as the zero-trust principle (ie, to treat all devices as untrustworthy before access or authorization can be considered). The use of VPNs is a popular technique in the remote work environment but is not always required. Health care organizations should avoid the abuse of VPNs and ensure it is applied to specific tasks, such as for system admin use and medical diagnosis purposes through access to legacy systems (eg, patient records management systems) stored on private data servers. Future research should explore innovative solutions such as blockchain as it can facilitate health care interoperability due to its immutability, transparency, and decentralization. In general, the health sector significantly lags behind other sectors in terms of cybersecurity. Future research should borrow experience from general cybersecurity practices (eg, NIST guidelines) and adapt them according to the needs of the health sector, especially in the context of pandemics.</p>
        </sec>
        <sec>
          <title>Cyber Resilience</title>
          <p>In order to improve system resilience, health organizations have some business continuity planning in place for data protection and recovery but lack a systematic way to maintain cyber resilience [<xref ref-type="bibr" rid="ref18">18</xref>]. The vulnerabilities in the cyber supply chain makes it difficult to recover from an incident caused by third parties [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref41">41</xref>]. In the case of impact on medical devices or clinical information systems, incident response should be coordinated with device manufacturers and vendors. Health care organizations have realized the importance of having a comprehensive view of cybersecurity management in order to prevent cyberattacks [<xref ref-type="bibr" rid="ref18">18</xref>] but have not built this coordinated capacity. There is a lack of a cyber resilience program to evaluate vendors’ capabilities around threat protection, particularly across email servers (phishing and ransomware), breadth of portfolio coverage in addressing cloud architecture, and endpoint security. Future research should focus on building a coordinated cybersecurity capacity in order to systematically assess vulnerabilities and respond to cyber threats.</p>
        </sec>
        <sec>
          <title>Human Factors in Cybersecurity</title>
          <p>People are likely to make mistakes, especially in the context of changes in their traditional way of working. Health care organizations are required to adopt a nonblaming culture in reporting incidents. The health sector should focus on root cause analysis [<xref ref-type="bibr" rid="ref28">28</xref>] and prevent incidents from happening especially through unintentional human error. Published research has shown that the majority of information security incidents relate to human error [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>], which is a vulnerability that attackers will look to exploit. A human error analytical approach such as IS-CHEC could be deployed both reactively, through integration within incident management practices [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>], and proactively, through simple interaction with operational personnel [<xref ref-type="bibr" rid="ref29">29</xref>], to detect current human error areas of weaknesses and apply associated remedial and preventative measures. Moreover, health care staff in the organization need to be educated and build awareness of the ongoing security situation during the COVID-19 pandemic. For example, in the case of infection, staff are required to disconnect from the network to contain the spread. Organizations should continuously raise awareness internally by launching campaigns even during a time of crisis (ie, to inform health staff not to open suspicious emails). Future research should focus on creating pandemic-themed security awareness campaigns. Moreover, a positive and empowering culture is also required (eg, by sharing the rate of people who did not click on phishing-negative emails during a training campaign). Experience can be borrowed from the organizational climate literature to positively influence people’s behavior [<xref ref-type="bibr" rid="ref59">59</xref>].</p>
        </sec>
        <sec>
          <title>Strategic Cybersecurity Management</title>
          <p>Although health care organizations have invested in cybersecurity to counteraction security attacks, further efforts are needed to reprioritize cybersecurity risk assessment during the COVID-19 pandemic, reallocate security investment, and optimize resource utilization to obtain adequate assurances. According to Argwa et al [<xref ref-type="bibr" rid="ref46">46</xref>], health care organizations are advised to allocate more resources and funding to cybersecurity. Strategic cybersecurity investment is still an immature research area in health care largely due to boards’ inability to fully understand and anticipate the direct and indirect impact on their health services. Further, there are language barriers between the technical team and the board [<xref ref-type="bibr" rid="ref27">27</xref>]. Another reason is that the board finds it difficult to estimate the costs of investing and balancing these against potential benefits procured or impacts mitigated [<xref ref-type="bibr" rid="ref8">8</xref>] as cybersecurity investments prevent potential losses but may not generate business benefits directly. Moreover, organizations should not only create security guidelines specific to the COVID-19 pandemic but also plan for the long term for remote working and spend efforts on strengthening their security mechanisms and cybersecurity crisis management capabilities. More research efforts are needed to support the top management teams of the health sector to understand the threat landscape and make better-informed decisions to allocate resources not just to provide services to staff and patients but also for protection and resilience, in order to continuously serve even in times of emergency such as the current pandemic and beyond.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Contrary to systematic reviews, scoping reviews are used to identify knowledge gaps, scope a body of literature, and clarify concepts. However, some limitations should be considered. Scoping reviews usually provide descriptive information in order to address the objectives of the review, which often leads to less defined searches. This review mitigated this limitation by clearly defining the search terms and search formula. Scoping reviews are also at risk of bias from different sources. All 4 authors were involved in the article identification, selection, and analysis processes in order to reduce the risks of bias. Because of variability when conducting a scoping review, there is a need for methodological standardization to ensure the strength of evidence. This review followed the PRISMA-ScR to standardize the process and improve the strength of evidence. Another limitation is that this review included exact terms used to search the titles or abstracts of existing publications. Any articles that used different terms, (eg, “computer security”) would not have been included. In addition, publications that were not written in English were excluded. Moreover, although this scoping review focused on health care, the solutions identified could be applied to other industries.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The COVID-19 pandemic has challenged the resilience of the health care information system. This research was motivated by the urgency of counteracting the cyberattacks that have recently happened to hospitals, pharmaceutical companies, the US Department of Health and Human Services, and the WHO and its partners, etc. We performed a review on security challenges of the health sector and the solutions employed during COVID-19. We identified the root causes of the security incidents that have impacted the health sector during the COVID-19 pandemic, cybersecurity challenges, solutions, and areas in need of improvement. The results show that the main root causes of the security incidents that happened during the COVID-19 pandemic are mainly from phishing, ransomware, DDoS attacks, and malware. The main challenges faced by health care organizations are inadequate endpoint device management, lack of security awareness, insecure remote work environment, inadequate business continuity plans, lack of coordinated incident response, and difficulty in trading off security investment and service delivery quality. Needless to say, another major challenge is human error, both from the perspective of the health care worker at the frontline and those working from home. As the COVID-19 pandemic has shifted our priorities, there is a greater tendency for human error to occur when staff are preoccupied with saving lives, working in a strange or different environment, and using new or various technologies. With little or no experience and a lack of prior planning and training to work in such situations, health care workers require more than training and support, such as adequate time, documented procedures, and guidance on revised procedures and technology.</p>
        <p>Although the health sector has made some efforts to address these challenges by applying technical measures, raising security awareness, enforcing policies, and developing COVID-19–specific guidelines, more research efforts are still required in some domains. Future research should focus on exploring enhanced technical controls through the adaption of general cybersecurity practices (eg, NIST guidelines); improving cyber resilience by building a coordinated cybersecurity capacity to systematically assess vulnerabilities of the complex health care supply chain and respond to cyber threats; reducing human-related security incidents by exploring human error reduction approaches and pandemic-themed awareness campaigns; and enhancing strategic cybersecurity management by exploring crisis management planning, security risks reprioritization, and the optimization of cybersecurity budget and resource reallocation.</p>
        <p>Many health care organizations are applying a temporary solution to counteract cyber threats during the COVID-19 pandemic. These organizations should plan for the long term, provide adequate levels of cybersecurity resources to deal with fast-changing situations, and offer the required assurance within these changes. This paper provides useful insights for the health sector on their cybersecurity issues during the COVID-19 pandemic or other epidemic or pandemic situations in the future. Moreover, cybersecurity experience in other sectors can be borrowed and applied in the health sector.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA-ScR checklist.</p>
        <media xlink:href="jmir_v23i4e21747_app1.docx" xlink:title="DOCX File , 25 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">DDoS</term>
          <def>
            <p>distributed denial of service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">FBI</term>
          <def>
            <p>Federal Bureau of Investigation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IoT</term>
          <def>
            <p>internet of things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">NCSC</term>
          <def>
            <p>National Cyber Security Centre</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">NHS</term>
          <def>
            <p>National Health Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">NIST</term>
          <def>
            <p>National Institute of Standards and Technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">PPE</term>
          <def>
            <p>personal protective equipment</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">PRISMA-ScR</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">VPN</term>
          <def>
            <p>virtual private network</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">WHO</term>
          <def>
            <p>World Health Organization</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by the National Natural Science Foundation of China (grant 61803318).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hakak</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>WZ</given-names>
            </name>
            <name name-style="western">
              <surname>Imran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>KR</given-names>
            </name>
            <name name-style="western">
              <surname>Shoaib</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>124134</fpage>
          <lpage>124144</lpage>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3006172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Chaturvedi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chakravarthy</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity Risks in a Pandemic</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>09</month>
          <day>17</day>
          <volume>22</volume>
          <issue>9</issue>
          <fpage>e23692</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/9/e23692/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/23692</pub-id>
          <pub-id pub-id-type="medline">32897869</pub-id>
          <pub-id pub-id-type="pii">v22i9e23692</pub-id>
          <pub-id pub-id-type="pmcid">PMC7528623</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Porter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cyberattack on Czech hospital forces tech shutdown during coronavirus outbreak</article-title>
          <source>HealthCareITNews</source>
          <year>2020</year>
          <month>3</month>
          <day>19</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthcareitnews.com/news/europe/cyberattack-czech-hospital-forces-tech-shutdown-during-coronavirus-outbreak">https://www.healthcareitnews.com/news/europe/cyberattack-czech-hospital-forces-tech-shutdown-during-coronavirus-outbreak</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stein</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobs</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Cyber-attack hits U.S. health agency amid Covid-19 Outbreak</article-title>
          <source>Bloomberg</source>
          <year>2020</year>
          <month>3</month>
          <day>16</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-during-covid-19-response">https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-during-covid-19-response</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <article-title>Beware of criminals pretending to be WHO</article-title>
          <source>World Health Organization</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/about/communications/cyber-security">https://www.who.int/about/communications/cyber-security</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stubbs</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bing</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Exclusive: Iran-linked hackers recently targeted coronavirus drugmaker Gilead - sources</article-title>
          <source>Reuters</source>
          <year>2020</year>
          <month>5</month>
          <day>8</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex-idUSKBN22K2EV">https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex-idUSKBN22K2EV</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cimpanu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Hackers preparing to launch ransomware attacks against hospitals arrested in Romania</article-title>
          <source>ZDNet</source>
          <year>2020</year>
          <month>5</month>
          <day>15</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.zdnet.com/article/hackers-preparing-to-launch-ransomware-attacks-against-hospitals-arrested-in-romania/">https://www.zdnet.com/article/hackers-preparing-to-launch-ransomware-attacks-against-hospitals-arrested-in-romania/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Cybercriminals targeting critical healthcare institutions with ransomware</article-title>
          <source>Interpol</source>
          <year>2020</year>
          <month>4</month>
          <day>4</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.interpol.int/en/News-and-Events/News/2020/Cybercriminals-targeting-critical-healthcare-institutions-with-ransomware/">https://www.interpol.int/en/News-and-Events/News/2020/Cybercriminals-targeting-critical-healthcare-institutions-with-ransomware/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boddy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hurst</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Mackay</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>El Rhalibi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A study into data analysis and visualisation to increase the cyber-resilience of health care infrastructures</article-title>
          <year>2017</year>
          <conf-name>IML '17: Proceedings of the 1st International Conference on Internet of Things and Machine Learning</conf-name>
          <conf-date>October</conf-date>
          <conf-loc>Liverpool, United Kingdom</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>1</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1145/3109761.3109793</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Argaw</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Troncoso-Pastoriza</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Lacey</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Florin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Calcavecchia</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Burleson</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Vogel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>O'Leary</surname>
              <given-names>Chana</given-names>
            </name>
            <name name-style="western">
              <surname>Eshaya-Chauvin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Flahault</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2020</year>
          <month>07</month>
          <day>03</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>146</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-020-01161-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-020-01161-7</pub-id>
          <pub-id pub-id-type="medline">32620167</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-020-01161-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC7333281</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>Bethany</given-names>
            </name>
            <name name-style="western">
              <surname>Razak</surname>
              <given-names>Sabina</given-names>
            </name>
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>William J</given-names>
            </name>
          </person-group>
          <article-title>EARS to cyber incidents in health care</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>01</month>
          <day>01</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>81</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30517701"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocy148</pub-id>
          <pub-id pub-id-type="medline">30517701</pub-id>
          <pub-id pub-id-type="pii">5229203</pub-id>
          <pub-id pub-id-type="pmcid">PMC7647158</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: A narrative review of trends, threats and ways forward</article-title>
          <source>Maturitas</source>
          <year>2018</year>
          <month>07</month>
          <volume>113</volume>
          <fpage>48</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="doi">10.1016/j.maturitas.2018.04.008</pub-id>
          <pub-id pub-id-type="medline">29903648</pub-id>
          <pub-id pub-id-type="pii">S0378-5122(18)30165-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kruse</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Frederick</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Monticone</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: A systematic review of modern threats and trends</article-title>
          <source>THC</source>
          <year>2017</year>
          <month>02</month>
          <day>21</day>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.3233/thc-161263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Offner</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Sitnikova</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Joiner</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>MacIntyre</surname>
              <given-names>CR</given-names>
            </name>
          </person-group>
          <article-title>Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation</article-title>
          <source>Intelligence and National Security</source>
          <year>2020</year>
          <month>04</month>
          <day>22</day>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>556</fpage>
          <lpage>585</lpage>
          <pub-id pub-id-type="doi">10.1080/02684527.2020.1752459</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sardi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rizzi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sorano</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Guerrieri</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cyber Risk in Health Facilities: A Systematic Literature Review</article-title>
          <source>Sustainability</source>
          <year>2020</year>
          <month>08</month>
          <day>27</day>
          <volume>12</volume>
          <issue>17</issue>
          <fpage>7002</fpage>
          <pub-id pub-id-type="doi">10.3390/su12177002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Liberati</surname>
              <given-names>Alessandro</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>Jennifer</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>Douglas G</given-names>
            </name>
            <collab>PRISMA Group</collab>
          </person-group>
          <article-title>Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement</article-title>
          <source>Ann Intern Med</source>
          <year>2009</year>
          <month>08</month>
          <day>18</day>
          <volume>151</volume>
          <issue>4</issue>
          <fpage>264</fpage>
          <lpage>9, W64</lpage>
          <pub-id pub-id-type="doi">10.7326/0003-4819-151-4-200908180-00135</pub-id>
          <pub-id pub-id-type="medline">19622511</pub-id>
          <pub-id pub-id-type="pii">0000605-200908180-00135</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schneck</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity During COVID-19</article-title>
          <source>IEEE Secur Privacy</source>
          <year>2020</year>
          <month>11</month>
          <volume>18</volume>
          <issue>6</issue>
          <fpage>4</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/msec.2020.3019678</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weil</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Murugesan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>IT Risk and Resilience—Cybersecurity Response to COVID-19</article-title>
          <source>IT Prof</source>
          <year>2020</year>
          <month>5</month>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>4</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1109/MITP.2020.2988330</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Bruckes</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Westmattelmann</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Schewe</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Why Employees (Still) Click on Phishing Links: Investigation in Hospitals</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>01</month>
          <day>23</day>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>e16775</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/1/e16775/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/16775</pub-id>
          <pub-id pub-id-type="medline">32012071</pub-id>
          <pub-id pub-id-type="pii">v22i1e16775</pub-id>
          <pub-id pub-id-type="pmcid">PMC7005690</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoffman</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Increasing access to care: telehealth during COVID-19</article-title>
          <source>J Law Biosci</source>
          <year>2020</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>lsaa043</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32843985"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jlb/lsaa043</pub-id>
          <pub-id pub-id-type="medline">32843985</pub-id>
          <pub-id pub-id-type="pii">lsaa043</pub-id>
          <pub-id pub-id-type="pmcid">PMC7337821</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ronquillo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Erik Winterholler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cwikla</surname>
              <given-names>Kamil</given-names>
            </name>
            <name name-style="western">
              <surname>Szymanski</surname>
              <given-names>Raphael</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>Christopher</given-names>
            </name>
          </person-group>
          <article-title>Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information</article-title>
          <source>JAMIA Open</source>
          <year>2018</year>
          <month>07</month>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>15</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31984315"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamiaopen/ooy019</pub-id>
          <pub-id pub-id-type="medline">31984315</pub-id>
          <pub-id pub-id-type="pii">ooy019</pub-id>
          <pub-id pub-id-type="pmcid">PMC6951874</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Risk management-based security evaluation model for telemedicine systems</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2020</year>
          <month>06</month>
          <day>10</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>106</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-020-01145-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-020-01145-7</pub-id>
          <pub-id pub-id-type="medline">32522216</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-020-01145-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC7286211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <article-title>Cyber warning issued for key healthcare organisations in UK and USA</article-title>
          <source>National Cyber Security Centre</source>
          <year>2020</year>
          <month>5</month>
          <day>5</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ncsc.gov.uk/news/warning-issued-uk-usa-healthcare-organisations">https://www.ncsc.gov.uk/news/warning-issued-uk-usa-healthcare-organisations</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cimpanu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>FBI re-sends alert about supply chain attacks for the third time in three months</article-title>
          <source>ZDNet</source>
          <year>2020</year>
          <month>3</month>
          <day>31</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.zdnet.com/article/fbi-re-sends-alert-about-supply-chain-attacks-for-the-third-time-in-three-months/">https://www.zdnet.com/article/fbi-re-sends-alert-about-supply-chain-attacks-for-the-third-time-in-three-months/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naidoo</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A multi-level influence model of COVID-19 themed cybercrime</article-title>
          <source>European Journal of Information Systems</source>
          <year>2020</year>
          <month>05</month>
          <day>31</day>
          <volume>29</volume>
          <issue>3</issue>
          <fpage>306</fpage>
          <lpage>321</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2020.1771222</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reagin</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Gentry</surname>
              <given-names>MV</given-names>
            </name>
          </person-group>
          <article-title>Enterprise Cybersecurity</article-title>
          <source>Frontiers of Health Services Management</source>
          <year>2018</year>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>13</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1097/hap.0000000000000037</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Kaiser</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in Hospitals: A Systematic, Organizational Perspective</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>05</month>
          <day>28</day>
          <volume>20</volume>
          <issue>5</issue>
          <fpage>e10059</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/5/e10059/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10059</pub-id>
          <pub-id pub-id-type="medline">29807882</pub-id>
          <pub-id pub-id-type="pii">v20i5e10059</pub-id>
          <pub-id pub-id-type="pmcid">PMC5996174</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Maglaras</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Janicke</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>HEART-IS: A novel technique for evaluating human error-related information security incidents</article-title>
          <source>Computers &amp; Security</source>
          <year>2019</year>
          <month>01</month>
          <volume>80</volume>
          <fpage>74</fpage>
          <lpage>89</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2018.09.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Maglaras</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yevseyeva</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Janicke</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector</article-title>
          <source>Int J Med Inform</source>
          <year>2019</year>
          <month>07</month>
          <volume>127</volume>
          <fpage>109</fpage>
          <lpage>119</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2019.04.019</pub-id>
          <pub-id pub-id-type="medline">31128822</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(18)31095-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yevseyeva</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Janicke</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zamani</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Maglaras</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>142147</fpage>
          <lpage>142175</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2019.2944615</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Fairhall</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Threats to Information Security — Public Health Implications</article-title>
          <source>N Engl J Med</source>
          <year>2017</year>
          <month>08</month>
          <day>24</day>
          <volume>377</volume>
          <issue>8</issue>
          <fpage>707</fpage>
          <lpage>709</lpage>
          <pub-id pub-id-type="doi">10.1056/nejmp1707212</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Furnell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>JN</given-names>
            </name>
          </person-group>
          <article-title>Home working and cyber security – an outbreak of unpreparedness?</article-title>
          <source>Computer Fraud &amp; Security</source>
          <year>2020</year>
          <month>08</month>
          <volume>2020</volume>
          <issue>8</issue>
          <fpage>6</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1016/s1361-3723(20)30084-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley-Bell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Magalini</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mari</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Magkanaraki</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kalliopi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cyber-risk in health carexploring facilitators and barriers to secure behaviour, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</article-title>
          <year>2020</year>
          <conf-name>22nd International Conference on Human Computer Interaction</conf-name>
          <conf-date>July 19–24</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <publisher-loc>Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>105</fpage>
          <lpage>122</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://researchportal.northumbria.ac.uk/files/31585347/1689_final.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-030-50309-3_8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaplan</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>evisiting health information technology ethical, legal, and social issues and evaluation: telehealth/telemedicine and COVID-19</article-title>
          <source>Int J Med Inform</source>
          <year>2020</year>
          <month>11</month>
          <volume>143</volume>
          <fpage>104239</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33152653"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2020.104239</pub-id>
          <pub-id pub-id-type="medline">33152653</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(20)30938-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC7831568</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barad</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs</article-title>
          <source>Procedia Manufacturing</source>
          <year>2019</year>
          <volume>39</volume>
          <fpage>279</fpage>
          <lpage>286</lpage>
          <pub-id pub-id-type="doi">10.1016/j.promfg.2020.01.335</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tully</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Selzer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>O'Connor</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dameff</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Healthcare Challenges in the Era of Cybersecurity</article-title>
          <source>Health Secur</source>
          <year>2020</year>
          <month>06</month>
          <day>01</day>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>228</fpage>
          <lpage>231</lpage>
          <pub-id pub-id-type="doi">10.1089/hs.2019.0123</pub-id>
          <pub-id pub-id-type="medline">32559153</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Katzis</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity and the Medical Device Product Development Lifecycle</article-title>
          <source>Studies in Health Technology and Informatics</source>
          <year>2017</year>
          <volume>238</volume>
          <fpage>76</fpage>
          <lpage>79</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/318284017_Cybersecurity_and_the_Medical_Device_Product_Development_Lifecycle"/>
          </comment>
          <pub-id pub-id-type="doi">10.3233/978-1-61499-781-8-76</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frontoni</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Mancini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Baldi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Paolanti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Moccia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zingaretti</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Landro</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Misericordia</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Sharing health data among general practitioners: The Nu.Sa. project</article-title>
          <source>Int J Med Inform</source>
          <year>2019</year>
          <month>09</month>
          <volume>129</volume>
          <fpage>267</fpage>
          <lpage>274</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2019.05.016</pub-id>
          <pub-id pub-id-type="medline">31445266</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(19)30553-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bhatia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ibrahim</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Understanding Security Risks When Exchanging Medical Records Using IHE</article-title>
          <source>17th International Conference on Information Technology–New Generations (ITNG 2020) / Advances in Intelligent Systems and Computing</source>
          <year>2020</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>477</fpage>
          <lpage>81</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Natsiavas</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Rasmussen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Voss-Knude</surname>
              <given-names>M</given-names>
            </name>
            <collab>Votis</collab>
            <name name-style="western">
              <surname>Coppolino</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Campegiani</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Cano</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Marí</surname>
              <given-names>David</given-names>
            </name>
            <name name-style="western">
              <surname>Faiella</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Clemente</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nalin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Grivas</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Stan</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Gelenbe</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Dumortier</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Petersen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tzovaras</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Romano</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Komnios</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Koutkias</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Comprehensive user requirements engineering methodology for secure and interoperable health data exchange</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2018</year>
          <month>10</month>
          <day>16</day>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>85</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-018-0664-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-018-0664-0</pub-id>
          <pub-id pub-id-type="medline">30326890</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-018-0664-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC6192123</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nalin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baroni</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Faiella</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Romano</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Matrisciano</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Gelenbe</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Martinez</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Dumortier</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Natsiavas</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Votis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Koutkias</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Tzovaras</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Clemente</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The European cross-border health data exchange roadmap: Case study in the Italian setting</article-title>
          <source>J Biomed Inform</source>
          <year>2019</year>
          <month>06</month>
          <volume>94</volume>
          <fpage>103183</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(19)30101-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2019.103183</pub-id>
          <pub-id pub-id-type="medline">31009760</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(19)30101-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walker-Roberts</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hammoudeh</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dehghantanha</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>25167</fpage>
          <lpage>25177</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2018.2817560</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Akinsanya</surname>
              <given-names>OO</given-names>
            </name>
            <name name-style="western">
              <surname>Papadaki</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Current cybersecurity maturity models: How effective in health care cloud?</article-title>
          <year>2019</year>
          <conf-name>CERC 2019</conf-name>
          <conf-date>Sept 15-17</conf-date>
          <conf-loc>Niagara Falls, ON</conf-loc>
          <fpage>211</fpage>
          <lpage>22</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://ceur-ws.org/Vol-2348/paper16.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-Based Medical Records Secure Storage and Medical Service Framework</article-title>
          <source>J Med Syst</source>
          <year>2018</year>
          <month>11</month>
          <day>22</day>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>5</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-018-1121-4</pub-id>
          <pub-id pub-id-type="medline">30467604</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-018-1121-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pullin</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity</article-title>
          <source>Frontiers of Health Services Management</source>
          <year>2018</year>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>3</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1097/hap.0000000000000038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Argaw</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Bempong</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Eshaya-Chauvin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Flahault</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2019</year>
          <month>01</month>
          <day>11</day>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>10</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-018-0724-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-018-0724-5</pub-id>
          <pub-id pub-id-type="medline">30634962</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-018-0724-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC6330387</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Almohri</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yao</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Alemzadeh</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>On threat modeling and mitigation of medical cyber-physical systems</article-title>
          <year>2017</year>
          <conf-name>2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)</conf-name>
          <conf-date>July 17-19</conf-date>
          <conf-loc>Philadelphia, PA</conf-loc>
          <fpage>114</fpage>
          <lpage>119</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/8010624"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/CHASE.2017.69</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Valli</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Shankaran</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Orgun</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices</article-title>
          <year>2017</year>
          <conf-name>2017 17th International Symposium on Communications and Information Technologies (ISCIT)</conf-name>
          <conf-date>September 25-27</conf-date>
          <conf-loc>Cairns, QLD, Australia</conf-loc>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/iscit.2017.8261228</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jimenez</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jahankhani</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kendzierskyj</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Farsi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Daneshkhah</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hosseinian-Far</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jahankhani</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Health Care in the Cyberspace: Medical Cyber-Physical System and Digital Twin Challenges</article-title>
          <source>Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing)</source>
          <year>2020</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>79</fpage>
          <lpage>92</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Scuffham</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The Internet of Things: Impact and Implications for Health Care Delivery</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>11</month>
          <day>10</day>
          <volume>22</volume>
          <issue>11</issue>
          <fpage>e20135</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/11/e20135/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20135</pub-id>
          <pub-id pub-id-type="medline">33170132</pub-id>
          <pub-id pub-id-type="pii">v22i11e20135</pub-id>
          <pub-id pub-id-type="pmcid">PMC7685921</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Deebak</surname>
              <given-names>BD</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Turjman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nayyar</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care</article-title>
          <source>Multimed Tools Appl</source>
          <year>2020</year>
          <month>11</month>
          <day>12</day>
          <fpage>1</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33204211"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11042-020-10134-x</pub-id>
          <pub-id pub-id-type="medline">33204211</pub-id>
          <pub-id pub-id-type="pii">10134</pub-id>
          <pub-id pub-id-type="pmcid">PMC7659916</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zorz</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Vulnerable VPN appliances at health care organisations open doors for ransomware gangs</article-title>
          <source>HelpNetSecurity</source>
          <year>2020</year>
          <month>4</month>
          <day>2</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.helpnetsecurity.com/2020/04/02/vpn-healthcare-ransomware/">https://www.helpnetsecurity.com/2020/04/02/vpn-healthcare-ransomware/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="web">
          <article-title>NHS Secure Boundary: About our secure boundary service</article-title>
          <source>NHS Digital</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.nhs.uk/cyber-and-data-security/managing-security/nhs-secure-boundary">https://digital.nhs.uk/cyber-and-data-security/managing-security/nhs-secure-boundary</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rezaeibagha</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Win</surname>
              <given-names>KT</given-names>
            </name>
            <name name-style="western">
              <surname>Susilo</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>A systematic literature review on security and privacy of electronic health record systems: technical perspectives</article-title>
          <source>Health Inf Manag</source>
          <year>2015</year>
          <month>10</month>
          <volume>44</volume>
          <issue>3</issue>
          <fpage>23</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1177/183335831504400304</pub-id>
          <pub-id pub-id-type="medline">26464299</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sedlack</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting</article-title>
          <source>AIS eLibrary</source>
          <year>2016</year>
          <month>8</month>
          <day>11</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/amcis2016/ISSec/Presentations/42/">https://aisel.aisnet.org/amcis2016/ISSec/Presentations/42/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>Adam</given-names>
            </name>
            <name name-style="western">
              <surname>Glynn</surname>
              <given-names>Robert J</given-names>
            </name>
            <name name-style="western">
              <surname>Kadakia</surname>
              <given-names>Jigar</given-names>
            </name>
            <name name-style="western">
              <surname>Mazzone</surname>
              <given-names>Christina</given-names>
            </name>
            <name name-style="western">
              <surname>Leinbach</surname>
              <given-names>Elizabeth</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>Adam</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>06</month>
          <day>01</day>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>547</fpage>
          <lpage>552</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30861069"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz005</pub-id>
          <pub-id pub-id-type="medline">30861069</pub-id>
          <pub-id pub-id-type="pii">5376646</pub-id>
          <pub-id pub-id-type="pmcid">PMC6515532</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <article-title>Cyber Associates Network: About the Cyber Associates Network</article-title>
          <source>NHS Digital</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.nhs.uk/cyber-and-data-security/about-us/cyber-associates-network">https://digital.nhs.uk/cyber-and-data-security/about-us/cyber-associates-network</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alzahrani</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Coronavirus Social Engineering Attacks:  Issues and Recommendations</article-title>
          <source>IJACSA</source>
          <year>2020</year>
          <volume>11</volume>
          <issue>5</issue>
          <fpage>9</fpage>
          <pub-id pub-id-type="doi">10.14569/ijacsa.2020.0110523</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kessler</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Pindek</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kleinman</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Andel</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Spector</surname>
              <given-names>PE</given-names>
            </name>
          </person-group>
          <article-title>Information security climate and the assessment of information security risk among healthcare employees</article-title>
          <source>Health Informatics J</source>
          <year>2020</year>
          <month>03</month>
          <day>14</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>461</fpage>
          <lpage>473</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1460458219832048?url_ver=Z39.88-2003&amp;rfr_id=ori:rid:crossref.org&amp;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458219832048</pub-id>
          <pub-id pub-id-type="medline">30866704</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="web">
          <article-title>Data Security and Protection Toolkit</article-title>
          <source>NHS Digital</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.nhs.uk/data-and-information/looking-after-information/data-security-and-information-governance/data-security-and-protection-toolkit">https://digital.nhs.uk/data-and-information/looking-after-information/data-security-and-information-governance/data-security-and-protection-toolkit</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dameff</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Selzer</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Killeen</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Tully</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Clinical Cybersecurity Training Through Novel High-Fidelity Simulations</article-title>
          <source>J Emerg Med</source>
          <year>2019</year>
          <month>02</month>
          <volume>56</volume>
          <issue>2</issue>
          <fpage>233</fpage>
          <lpage>238</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jemermed.2018.10.029</pub-id>
          <pub-id pub-id-type="medline">30553562</pub-id>
          <pub-id pub-id-type="pii">S0736-4679(18)31055-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kabir</surname>
              <given-names>UY</given-names>
            </name>
            <name name-style="western">
              <surname>Ezekekwu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bhuyan</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Mahmood</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dobalian</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Trends and best practices in health care cybersecurity insurance policy</article-title>
          <source>J Healthc Risk Manag</source>
          <year>2020</year>
          <month>10</month>
          <day>22</day>
          <volume>40</volume>
          <issue>2</issue>
          <fpage>10</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1002/jhrm.21414</pub-id>
          <pub-id pub-id-type="medline">32441812</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yaseen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Saleem</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Orgun</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Derhab</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Abbas</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Muhtadi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Iqbal</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Rashid</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art</article-title>
          <source>Telematics and Informatics</source>
          <year>2018</year>
          <month>07</month>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>702</fpage>
          <lpage>726</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2017.08.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Raisaro</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>McLaren</surname>
              <given-names>PJ</given-names>
            </name>
            <name name-style="western">
              <surname>Fellay</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cavassini</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Klersy</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hubaux</surname>
              <given-names>J</given-names>
            </name>
            <collab>Swiss HIV Cohort Study</collab>
          </person-group>
          <article-title>Are privacy-enhancing technologies for genomic data ready for the clinic? A survey of medical experts of the Swiss HIV Cohort Study</article-title>
          <source>J Biomed Inform</source>
          <year>2018</year>
          <month>03</month>
          <volume>79</volume>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30283-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.12.013</pub-id>
          <pub-id pub-id-type="medline">29331453</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(17)30283-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Narikimilli</surname>
              <given-names>NRS</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Antu</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Cui</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Palanisamy</surname>
              <given-names>BB</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>LJ</given-names>
            </name>
          </person-group>
          <article-title>Blockchain Applications in Healthcare – A Review and Future Perspective</article-title>
          <source>Blockchain – ICBC 2020. ICBC 2020. Lecture Notes in Computer Science, vol 12404</source>
          <year>2020</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>198</fpage>
          <lpage>218</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gardiyawasam Pussewalage</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Oleshchuk</surname>
              <given-names>VA</given-names>
            </name>
          </person-group>
          <article-title>Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions</article-title>
          <source>International Journal of Information Management</source>
          <year>2016</year>
          <month>12</month>
          <volume>36</volume>
          <issue>6</issue>
          <fpage>1161</fpage>
          <lpage>1173</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2016.07.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Big Data, Cybersecurity, and Challenges in Healthcare</article-title>
          <year>2019</year>
          <conf-name>2019 SoutheastCon</conf-name>
          <conf-date>April 10-14</conf-date>
          <conf-loc>Huntsville, AL</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/SoutheastCon42311.2019.9020632</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="web">
          <article-title>Securing cyber resilience in health and care: progress update 2019</article-title>
          <source>UK Government</source>
          <year>2019</year>
          <month>11</month>
          <day>4</day>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.gov.uk/government/publications/securing-cyber-resilience-in-health-and-care-progress-update-2019">https://www.gov.uk/government/publications/securing-cyber-resilience-in-health-and-care-progress-update-2019</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bhuyan</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Kabir</surname>
              <given-names>UY</given-names>
            </name>
            <name name-style="western">
              <surname>Escareno</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Ector</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Palakodeti</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wyant</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kedia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dasgupta</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dobalian</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations</article-title>
          <source>J Med Syst</source>
          <year>2020</year>
          <month>04</month>
          <day>02</day>
          <volume>44</volume>
          <issue>5</issue>
          <fpage>98</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-019-1507-y</pub-id>
          <pub-id pub-id-type="medline">32239357</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-019-1507-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template</article-title>
          <source>Int J Med Inform</source>
          <year>2015</year>
          <month>11</month>
          <volume>84</volume>
          <issue>11</issue>
          <fpage>941</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2015.08.010</pub-id>
          <pub-id pub-id-type="medline">26363788</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(15)30034-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization</article-title>
          <source>Inform Health Soc Care</source>
          <year>2017</year>
          <month>12</month>
          <day>09</day>
          <volume>42</volume>
          <issue>4</issue>
          <fpage>393</fpage>
          <lpage>408</lpage>
          <pub-id pub-id-type="doi">10.1080/17538157.2016.1255629</pub-id>
          <pub-id pub-id-type="medline">28068150</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="web">
          <article-title>COVID-19 cyber security support</article-title>
          <source>NHS Digital</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.nhs.uk/cyber-and-data-security/covid-19-cyber-security-support">https://digital.nhs.uk/cyber-and-data-security/covid-19-cyber-security-support</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="web">
          <article-title>Data protection and coronavirus information hub</article-title>
          <source>Information Commissioner's Office</source>
          <access-date>2021-04-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/">https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
