A regional medical center detects a worm infiltrating its email server. A university hospital finds that several entries are missing from patient electronic health records. An accountable care organization discovers that a set of files they received from one of their partners is infected with a Trojan Horse. Unfortunately, cyber-events such as these are just the tip of the iceberg in healthcare. Many are much more sophisticated, and costly.