30
• Cepero, Robert. “How Hospitals Can Protect Their EMR Data,” Bleuwire. December 16, 2020.
https://bleuwire.com/how-hospitals-can-protect-their-emr-data/.
• Vaidya, Anuja.“5 ways U.S. hospitals can protect against ‘imminent’ ransomware threat,” MedCityNews.
October 29, 2020.
https://medcitynews.com/2020/10/5-ways-u-s-hospitals-can-protect-against-imminent-
ransomware-threat/.
• “Understanding EMR vs. EHR,” NextGen Healthcare. July 19, 2019.
https://nextgen.com/insights/emr-vs-
ehr/emr-vs-ehr.
• “Why is PHI Valuable to Criminals?,” Compliancy Group. November 16, 2020.
https://compliancy-group.com/why-is-phi-valuable-to-criminals/.
• Taylor, Tori. “Hackers, Breaches, and the Value of Healthcare Data.” December 8, 2021.
https://www.securelink.com/blog/healthcare-data-new-prize-hackers/.
• Adams, Katie. “10 Biggest Patient Data Breaches in 2021,”Becker Hospital Review. December 7,2021.
https://www.beckershospitalreview.com/cybersecurity/10-biggest-patient-data-breaches-in-2021.html.
• “Costs of a Data Breach Report 2021,” IBM Security. July 28, 2021.
https://www.ibm.com/downloads/cas/OJDVQGRY#:~:text=Healthcare%20organizations%20experienced%20th
e%20highest,industries%2C%20and%20year%20over%20year.
• Deford, Drex. “Under Siege: How Healthcare Organizations Can Fight Back,” CPO Magazine. November
25,2021.
https://www.cpomagazine.com/cyber-security/under-siege-how-healthcare-organizations-can-fight-
back/
.
• Kumar, S.Rakesh, Gayathri,N. Muthuramalingam,S., Balamurugan, B, Ramesh,C., Nallakaruppan, M.K.
“Medical Big Data Mining and Processing in e-Healthcare,” Internet of Things in BioMedical Engineering.
November 1,2019.
https://www.sciencedirect.com/topics/engineering/electronic-health-record .
References