Consider this scenario: A cyber-attack occurred in a healthcare organization,