Defending healthcare data: How to keep PHI safe from cyberattacks