CNET Magazine. Hackers make off with at least $300 million in bank heists. Available at www.cnet.com/news/hackers-make-off-with-at-least-300-million-in-bank-heists/ (last accessed February18, 2015).
2.
WaltersR.Cyber attacks on U.S. companies in 2014. Issue Brief #4289 on National Security and Defense. October27, 2014. The Heritage Foundation. Available at http://report.heritage.org/ib4289 (last accessed February13, 2014).
3.
The New York Times. Available at www.nytimes.com/aponline/2015/02/13/us/ap-us-obama-cybersecurity.html?_r=0 (last accessed February18, 2015).
4.
HarriesD, YellowleesPM. Cyberterrorism: Is the US healthcare system safe?. Telemed J E Health, 2013; 19:61–66.
5.
FuK, BlumJ. Controlling for cybersecurity risks of medical device software. Commun ACM, 2013; 56:35–37.
6.
PerakslisED. Cybersecurity in health care. N Engl J Med, 2014; 371:395–397.
7.
KoppelR, SmithS, BlytheJ, KothariV. Workarounds to computer access in healthcare organizations: You want my password or a dead patient?. Stud Health Technol Inform, 2015; 208:215–220.
8.
CoronadoAJ, WongTL. Healthcare cybersecurity risk management: Keys to an effective plan. Biomed Instrum Technol, 2014; Spring(Suppl):26–30.
9.
LoughlinS, FuK, GeeT, GierasI, HoymeK, RajagopalanSR, RansfordB, VassermanE, WirthA. A Roundtable discussion: Safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol, 2014; Spring(Suppl):8–17.