“…Also proposes and evaluates methods for the dissemination of information.6 | - Descriptive study [53, 54] - Editorial [14, 51, 52, 55] | Information security methodology | Discusses network security, multifactor authentication, encryption, password protection, updates and others. | 15 | - Technical paper [56–58, 60–62, 71–73, 106–108] - Summative report [59, 109, 110] |
Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks) | Offers definitions, background information, and recommendations specific to these attack types in the context of hospitals. | 6 | - Descriptive study [111, 112] - Editorial [15, 63, 64] - Summative report [69] |
…”