PURPOSE
Cyberattacks are increasing in health care and cause immediate disruption to patient care, have a lasting impact, and compromise scientific integrity of affected clinical trials. On the May 14, 2021, the Irish health service was the victim of a nationwide ransomware attack. Patient care was disrupted across 4,000 locations, including 18 cancer clinical trials units associated with Cancer Trials Ireland (CTI). This report analyses the impact of the cyberattack on the organization and proposes steps to mitigate the impact of future cyberattacks.
METHODS
A questionnaire was distributed to the units within the CTI group; this examined key performance indicators for a period of 4 weeks before, during, and after the attack, and was supplemented by minutes of weekly conference call with CTI units to facilitate information sharing, accelerate mitigation, and support affected units. A total of 10 responses were returned, from three private and seven public hospitals.
RESULTS
The effect of the attack on referrals and enrollment to trials was marked, resulting in a drop of 85% in referrals and 55% in recruitment before recovery. Radiology, radiotherapy, and laboratory systems are heavily reliant on information technology systems. Access to all was affected. Lack of preparedness was highlighted as a significant issue. Of the sites surveyed, two had a preparedness plan in place before the attack, both of these being private institutions. Of the eight institutions where no plan was in place, three now have or are putting a plan in place, whereas no plan is in place at the five remaining sites.
CONCLUSION
The cyberattack had a dramatic and sustained impact on trial conduct and accrual. Increased cybermaturity needs to be embedded in clinical trial logistics and the units conducting them.
INTRODUCTION
According to Cybercrime Magazine, global cybercrime damage in 2021 amounts to $16.4 billion per day, $684.9 million per hour, $11 million per minute, and $190,000 per second.1 In 2021, more than 40 million medical records were stolen in the United States2; however, the probability of detecting and prosecuting perpetrators of these cyberattacks is only .05%.1 In recent years, such attacks on health care have increased globally. In New Zealand, they have been labeled as causing more disruption of cancer care than the COVID-19 pandemic,3 because of the former's reliance on information technology for diagnostics and treatment.4
CONTEXT
Key Objective
Cyberattacks are a growing threat to health care, including clinical trials. Cancer Trials Ireland orchestrates trial conduct in 18 units associated with the Health Service Executive—Ireland National Health Service. The service employs more than 130,000 staff, 15 of whom had dedicated cybersecurity roles. In March 2021, a national cyberattack was initiated, infiltrating the information technology ecosystem of more than 70,000 devices, and in May 2021, a ransomware device was then launched, severely disrupting patient care in 4,000 locations including all trials units.
Knowledge Generated
A survey of 10 units demonstrated an 85% fall in referrals and 55% fall in recruitment, with radiation oncology trials most affected. Two of 10 units surveyed had a preparedness plan before the attack, whereas five units still lack such plans. Service disruption persisted for over 5 months after the attack, compromising trial integrity and patient safety.
Relevance
Cybermaturity needs to be embedded in clinical trial design and conduct.
In the Republic of Ireland, the Health Service Executive (HSE) is the organization that provides public health services. It is the largest employer in the Irish state, employing more than 130,000 staff, at over 4,000 sites including 54 acute hospitals across the country. Cybersecurity was recorded as a high risk in the corporate risk register in 2019. Fifteen staff were employed in three cybersecurity teams to supervise over 70,000 connected devices.5 On the morning of May 14, 2021, at 0250, the HSE received reports from hospitals of an attack on encrypted systems via Conti ransomware.5,6 In retrospect, the source of the cyberattack originated from the user of a workstation opening an Excel file that was attached to a phishing e-mail sent to the user on March 18, 2021. The workstation's antivirus software program was set to monitor mode and consequently did not block resultant malicious commands. The attack triggered the critical incident process within the HSE resulting in the shutting down of all HSE connected devices, which involved over 1,000 applications, ranging from the cashier tills in the staff canteens to diagnostic equipment in laboratories and radiology departments. Disruption to patient care and normal operations within the HSE was immediate and profound.7 Clinical activity, including that associated with clinical trials, was disrupted. This would appear to be the first occurrence of an entire National Health Service being affected by such an attack. The estimated cost of the cyberattack is at least 100 million euros, possibly reaching 500 million euros.8
Cancer Trials Ireland (CTI) is the national cooperative group established to enable, support, and oversee the running of clinical trials in the Republic of Ireland. This cancer trials network consists of 18 trials units; these units are integrated into cancer treatment centers across the country in both public, HSE-funded (14 units), and private, HSE-independent (four units), health care facilities. Radiotherapy and chemotherapy trials were enrolling nationally on the eve of the cyberattack. CTI central office was not a victim of the cyberattack. The purpose of this study was to quantify the impact of the attack on the cancer clinical trials network in Ireland and mitigate and prevent their future impacts.
METHODS
A questionnaire was circulated to the 18 clinical trials units within the CTI network. This questionnaire was divided into six sections, as highlighted below.
Impact on referrals
Impact on enrollment
Impact on accessing treatment
Impact on detecting/reporting adverse outcomes
Impact on surveillance and compliance
Redundancies and preparedness within the system
Questions were asked for the 4-week period directly before the cyberattack, the 4 weeks commencing from the day of the cyberattack, and the subsequent 4 weeks. The effect of the cyberattack on the HSE and patients will likely take many years to appreciate fully; examining 4-week periods allowed us to gain a snapshot of the immediate effect and recovery from the attack.
The complete questionnaire is detailed in Table 1.
TABLE 1.
Questionnaire Circulated to Cancer Trials Ireland Sites
RESULTS
Communication
Clear, reliable, and safe communication is central to the functioning of any organization. The communication networks within the public hospitals were powered off once the cyberattack was recognized and the critical incidence process initiated. E-mail, laboratory, and radiology results were inaccessible. Internet access was cut off. Team members and patient contact details were not accessible. Clinical scheduling was lost, and patient records were not retrievable. Increased use of telemedicine, which had been a tool used to great effect during the concurrent COVID-19 pandemic, was no longer functional. Loss of communication functionality varied between clinical trial sites. Sites based in private institutions did not lose access to e-mail; their limitations in communications stemmed from an inability to routinely contact and collaborate with public institutions. Patients were no longer able to get blood tests and diagnostic tests carried out in the community as communication with general practitioners relies on the HSE-managed healthmail network.
Within the public system, time to regaining access to e-mail varied. HSE-funded voluntary hospitals were best able to respond, with one such institution returning regular access to e-mail on the May 19, 2022, 5 days after the attack. Delays within the HSE-managed hospitals were more significant, and return to normal operations was staggered with the latest reported resumption of e-mail access occurring on the July 09, 2021, 8 weeks after the cyberattack. Many private institutions froze access to HSE e-mails for months after the cyberattack for fear of contagion.
A national weekly conference call was initiated by CTI to facilitate information sharing, help affected sites, and assist in communicating with sponsors and regulatory bodies about protocol conduct. Alternative secure communications systems were implemented such as Sillo and ProtonMail. Figure 1 highlights some of the potential key difficulties experienced in the midst of a cyberattack by both staff and patients; our questionnaire was designed to highlight these vulnerabilities.
FIG 1.

Potential impact on patient care in a cyberattack.
Impact on the Functioning of Trials—Referrals for Screening and Enrollment
In the 4 weeks before the cyberattack, 273 patients in total were referred for screening to the 10 trials units surveyed. This fell to 41 patients in the 4-week period during the cyberattack and quickly recovered to 323 patients in the 4 weeks after the attack. Similarly, there was an impact on trial enrollment, 49 patients were enrolled in clinical trials in the 4 weeks before the attack, 22 during the cyberattack, and recovering to 38 patients in the 4 weeks after the attack. There was a drop of 85% in referrals and 55% in recruitment to trials during the cyberattack, and the results are highlighted in Table 2.
TABLE 2.
Direct Impact on Clinical Trials Units
Maintaining Investigational Integrity and Compliance
Protocol adherence was significantly adversely affected. Access to laboratory tests and diagnostic imaging in public hospitals was severely restricted. Initially, only urgent blood tests were processed. Requesting tests and reports pivoted to paper-based systems, resulting in a significantly increased workload and time cost for clinical staff who had to present in person to request and collect reports. Tasks that would normally take seconds to complete electronically took minutes to hours.
Diagnostic imaging capacity was severely affected. In the initial days after the attack, while local secure networks were built, images obtained from scanners could only be viewed on computers directly connected to the imager. They could not be viewed or reported remotely. As a result, each time a scan was carried out, the scanner was out of action until the previous scan had been reported.
Lack of access to historical records, both clinical and radiologic, disabled historical comparisons, and consequently reporting radiologists could not tell if captured images demonstrated response or progression of disease. These uncertainties contributed to the significant drop in ability to screen trial candidates.
Providing sponsors with copies of results and reports was also affected, leading to protocol deviations. One such example is of scans that were copied to compact disc to be couriered to the sponsor; some scans that had been documented as redacted were in fact not when viewed by the sponsor, resulting in a major protocol deviation and General Data Protection Regulation breach. Chemotherapy treatments were unaffected as they involved written prescriptions; however, significant disruption occurred in radiotherapy treatments, and an overview of the responses is highlighted in Table 3.
TABLE 3.
Impact on Surveillance, Compliance, and Redundancies
Redundancy
The survey demonstrated a lack of system redundancy and preparedness.
Of the sites surveyed, two had a preparedness plan in place before the cyberattack. Both of these were private institutions. Of the remaining institutions surveyed, no preparedness plan was in place, and only three now have or are putting one in place. No preparedness plan is in place or in preparation in the five remaining sites. The results are highlighted in Table 3.
Return to Normality
Lack of preparedness had a serious impact on the return to normal functioning. There was a wide variation noted, particularly marked between the public and private institutions.
Trials units attached to private institutions experienced minimal impact; their biggest issue was that patients were unable to access diagnostic tests in the community, instead having to be carried out onsite.
There was a wide discrepancy in the public system, particularly noted between trials units located in hospitals directly managed by the HSE and HSE-funded voluntary hospitals. Some had minimal disruptions lasting < 24 hours, whereas others had ongoing disruptions for months. At Cork University Hospital, delayed imaging reporting persisted until January 2022.
DISCUSSION
The national cyberattack led to significant disruption to clinical trials, resulting in dramatic falls in accrual and challenges to maintaining patient safety and scientific integrity. The impact was variable, with private hospitals being least affected. Resolution for those affected lasted months. A significant effort was required to ensure patient safety, with accurate paper-based records and logs being created to replace electronic records. An additional concern was the need to ensure that patient data were not corrupted in a manner that would compromise patient care and trial integrity.9 These significant efforts ensured that there was no change in adverse outcomes observed during this period.
On the May 20, 2021 (6 days after the HSE ransomware attack), the Federal Bureau of Investigation identified at least 16 Conti ransomware attacks targeting US health care facilities.10 On the basis of a Medical Information Technology Advisors Threat Information Platform analysis of incidents, the number of business e-mail compromise and ransomware incidents from phishing or dark web compromise credentials is growing and is quickly becoming the number one risk for health care organizations.4,11 In at least 72% of ransomware incidents, victim data are leaked.12 In the HSE cyberattack, the attacker operated for 8 weeks throughout the HSE's information technology (IT) environment, compromising servers, exfiltrating data, and moving laterally between hospitals and then detonated the ransomware. To date, compromised data have been stolen in the attack on 94,800 patients and 18,200 staff.13 It is unclear if patients enrolled in CTI associated trials are among these patients. Cyber-preparedness is becoming an increasing patient safety prerogative in health care as service disruption compromises timely treatment, reducing cancer survival.14-16 Cybersecurity can save lives, but the increasing global spend on cybersecurity estimated at $150 billion17 represents a significant opportunity cost to society.
Cyberattacks occur in seconds but have impacts lasting for months and longer.18-20 Delivery of cancer care is particularly susceptible to IT disruptions, with both immediate and long-term consequences for patients who are dependent on IT systems for timely diagnostics and regular administration of systemic anticancer treatments. The impact of the present attack on radiotherapy services has been analyzed by Flavin et al.7 Because of the inability to retrieve on treatment records, 513 patients nationally had their radiation treatment interrupted. Their report highlighted the lack of warning, precluding advance planning, resulting in severe service disruption and mitigation lasting 2 weeks with staff exhaustion. Return of consistent access to picture archiving took 4 months, and remote access restoration took 5 months. In Ireland, chemotherapy prescribing was less affected as it is predominately paper-based. However, impaired access to patient records and appointment schedules and diagnostic tests created risks for patients as outlined in our study. Delays in scheduled surgical treatment resulted from lack of access to diagnostics and records, compounding delays already experienced due to the COVID-19 pandemic.
The COVID-19 pandemic has been a major threat to scientific trial integrity, with staffing shortfalls and patient infection–related disruption impacting on treatment scheduling and compliance with follow-up assessments.21 In this study, similar challenges were noted to trial integrity with disruption of treatment schedules, delays in diagnostics and a dramatic fall in accruals. In response to the COVID-19 pandemic, multiple professional bodies22,23 and trial organizations24-27 have advocated for more pragmatic trial design, greater flexibility in follow-up schedules, and increased reliance on virtual follow and digital technologies to bring trials near the patient and reduce the time and financial toxicity associated with onerous, rigid scheduling. Many of these suggested changes are information technology–dependent. Given the global rise in health care–related cybercrime,28 a routine aspect of clinical trial conduct needs to be a cybercrime risk assessment of clinical trials units. This process could be integrated into trial feasibility assessments by sponsors and would accelerate cybersecurity in health care.
As emphasized in the chronology in this report, the greatest vulnerability to ever more complex network systems is human beings who use computers. An independently commissioned report on the cyberattack highlighted the lack of cybermaturity in the HSE.6 Under-resourcing was multifactorial, including dedicated staffing and outdated Windows 7 operating systems in over 30,000 devices. Our study, in addition, highlights the discrepancies between the public and private systems in Irish health care. Those least affected and best able to respond were clinical trials units based in private institutions. Of those based in public institutions, those least affected and best equipped to maintain clinical services were voluntary hospitals that are directly funded but not under the direct governance of the HSE. They are not fully reliant on the national health network for their day-to-day functioning, with independent servers and applications for e-mail, patient management systems, and diagnostics. In the second instance, health care facilities that relied on paper-based records, booking databases, and diagnostic requests were well equipped to maintain services in the face of the cyberattack. Worryingly, as highlighted in this report, many of the sites that did not have a plan before the cyberattack still do not have one in preparation or in place.
The impact of this cyberattack on cancer care was profound for patients and health care workers. Its timing at the end of the third wave of the COVID-19 pandemic severely challenged the resilience of the already exhausted staff.29,30 This impact has prompted CTI to reflect on learning points from the ransomware attack to mitigate against further events. These strategies range from increased awareness of cyber-vulnerability in our communities to firewalled systems and harmonized diagnostic platforms (Tables 4 and 5). Embedding cyber-awareness into the clinical trial arena is a necessary reality. Similar to other reports, our experience demonstrates the significant disruption that an attack can cause.18-20 Our new reality demonstrates the need for constant vigilance and the integration of cyber-preparedness into health care including clinical trial conduct in a similar manner to as we are for fire and major accidents.28
TABLE 4.
Summary of Lessons to Be Learned for Clinical Trials Units
TABLE 5.
Recommendations for Cancer Trials Organizations
Verena Murphy
Travel, Accommodations, Expenses: Roche (Inst)
Erica Bennette
Employment: Bons Secours Health System
Research Funding: Boston Scientific (Inst)
Ray McDermott
Honoraria: Bayer, Sanofi, Janssen, Astellas Pharma, Bristol Myers Squibb, Merck Sharp and Dohme, Pfizer, Novartis, Clovis Oncology, Ipsen
Speakers' Bureau: MSD Oncology
Research Funding: Sanofi (Inst), Janssen (Inst), Bayer (Inst), Astellas Pharma (Inst)
Travel, Accommodations, Expenses: Pfizer, Janssen-Cilag, Roche, Ipsen
Seamus O'Reilly
Honoraria: Roche, Novartis Ireland Ltd, Pfizer, AstraZeneca
Consulting or Advisory Role: Pfizer, AstraZeneca
Travel, Accommodations, Expenses: Roche, AstraZeneca, Nordic Bioscience
No other potential conflicts of interest were reported.
PRIOR PRESENTATION
Presented in part at the American Society of Clinical Oncology Annual Meeting (abstr e13614), Chicago, IL, June 3-7, 2022.
SUPPORT
Supported by Health Research Board grants number CTIB 2021, CTIC-2021-004, CTIC 2021-08, CTIC-2021-007, 7763 and 7850. Cancer Trials Ireland is also supported by the Irish Cancer Society.
AUTHOR CONTRIBUTIONS
Conception and design: Harry Harvey, Verena Murphy, Ailish Daly, Eibhlin Mulroe, Seamus O’Reilly
Provision of study materials or patients: Gavin Lawler, Michelle Connolly
Collection and assembly of data: Harry Harvey, Verena Murphy, Jo Ballot, Gavin Lawler, Michelle Connolly, Emma Noone, Mary Grace Kelly, Ashley Bazin
Data analysis and interpretation: Harry Harvey, Hailey Carroll, Erica Bennett, Eibhlin Mulroe, Ray McDermott, Seamus O’Reilly
Manuscript writing: All authors
Final approval of manuscript: All authors
Accountable for all aspects of the work: All authors
AUTHORS' DISCLOSURES OF POTENTIAL CONFLICTS OF INTEREST
The following represents disclosure information provided by authors of this manuscript. All relationships are considered compensated unless otherwise noted. Relationships are self-held unless noted. I = Immediate Family Member, Inst = My Institution. Relationships may not relate to the subject matter of this manuscript. For more information about ASCO's conflict of interest policy, please refer to www.asco.org/rwc or ascopubs.org/cci/author-center.
Open Payments is a public database containing information reported by companies about payments made to US-licensed physicians (Open Payments).
Verena Murphy
Travel, Accommodations, Expenses: Roche (Inst)
Erica Bennette
Employment: Bons Secours Health System
Research Funding: Boston Scientific (Inst)
Ray McDermott
Honoraria: Bayer, Sanofi, Janssen, Astellas Pharma, Bristol Myers Squibb, Merck Sharp and Dohme, Pfizer, Novartis, Clovis Oncology, Ipsen
Speakers' Bureau: MSD Oncology
Research Funding: Sanofi (Inst), Janssen (Inst), Bayer (Inst), Astellas Pharma (Inst)
Travel, Accommodations, Expenses: Pfizer, Janssen-Cilag, Roche, Ipsen
Seamus O'Reilly
Honoraria: Roche, Novartis Ireland Ltd, Pfizer, AstraZeneca
Consulting or Advisory Role: Pfizer, AstraZeneca
Travel, Accommodations, Expenses: Roche, AstraZeneca, Nordic Bioscience
No other potential conflicts of interest were reported.
REFERENCES
- 1.Chang J: 119 impressive cybersecurity statistics: 2020/2021 data & market analysis. Finances Online [Internet]. 2022. https://financesonline.com/cybersecurity-statistics/
- 2.Jercich K: The biggest healthcare data breaches of 2021. https://www.healthcareitnews.com/news/biggest-healthcare-data-breaches-2021
- 3.Herald N: Waikato DHB cyber attack: Radiation therapy resumes for cancer patients. New Zealand Herald. 2021. https://www.nzherald.co.nz/nz/waikato-dhb-cyber-attack-radiation-therapy-resumes-for-cancer-patients/OZY274V5UL3F2KWBATCR2R
- 4.Joyce C, Roman FL, Miller B, et al. : Emerging cybersecurity threats in radiation oncology. Adv Radiat Oncol 6:100796, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5.Conti Cyber Attack on the HSE : Independent post incident review. Commissioned by the HSE Board in conjunction with the CEO and executive management team. https://www.hse.ie/eng/services/publications/conti-attack-on-the-hse-full-report.pdf
- 6.Carroll R: Ransomware attack disrupts Irish health services. https://www.theguardian.com/world/2021/may/14/ransom-ware-attack-dirsupts-irish-health-services
- 7.Flavin A, O'Toole E, Murphy L, et al. : A national cyberattack affecting radiation therapy: The Irish experience. Adv Radiat Oncol 7:100914, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 8.Dail Eireann, Joint Committee on Health, June 23, 2021 transcript, September 19, 2022. www.data.oireachtas.ie
- 9.RSNA : Researchers aim to prevent medical imaging cybercrimes 2018. https://press.rsna.org/timssnet/media/pressreleases/14_pr_target.cfm?ID=2040
- 10.Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, Department of Health and Human Services : Ransomware activity targeting the healthcare and public sector [Internet]. CISA.gov.2020. https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf
- 11.Nick Richard DA: The UNC2529 Triple Double: A Trifecta Phishing Campaign, Mandiantcom, 2021. https://www.mandiant.com/resources/blog/unc2529-triple-double-trifecta-phishing-campaign
- 12.Oliver M, Pearce A, Stillwaugh L, et al. : The impact of a cyberattack at a radiation oncology department: Immediate response and future preparedness. Adv Radiat Oncol 7:100896, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Power J: Data stolen in HSE cyberattack included staff financial details. Irish Times. November 29, 2022. https://www.irishtimes.com/technology/2022/11/29/data-stolen-in-hse-cyberattack-included-staff-financial-details
- 14.Fowler JF, Lindstrom MJ: Loss of local control with prolongation in radiotherapy. Int J Radiat Oncol Biol Phys 23:457-467, 1992 [DOI] [PubMed] [Google Scholar]
- 15.Paulino AC, Wen BC, Mayr NA, et al. : Protracted radiotherapy treatment duration in medulloblastoma. Am J Clin Oncol 26:55-59, 2003 [DOI] [PubMed] [Google Scholar]
- 16.Petereit DG, Sarkaria JN, Chappell R, et al. : The adverse effect of treatment prolongation in cervical carcinoma. Int J Radiat Oncol Biol Phys 32:1301-1307, 1995 [DOI] [PubMed] [Google Scholar]
- 17.Hypponen M: If it's smart, it's vulnerable. Hoboken, NJ, Wiley, 2022 [Google Scholar]
- 18.Ades S, Herrera DA, Lahey T, et al. : Cancer care in the wake of a cyberattack: How to prepare and what to expect. JCO Oncol Pract 18:23-34, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 19.Pinkham DW, Sala IM, Soisson ET, et al. : Are you ready for a cyberattack? J Appl Clin Med Phys 22:4-7, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Chen PH, Bodak R, Gandhi NS: Ransomware recovery and imaging operations: Lessons learned and planning considerations. J Digit Imag 34:731-740, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 21.O'Reilly S, Murphy V, Mulroe E, et al. : The SARS-CoV-2 pandemic and Cancer Trials Ireland: Impact, resolution and legacy. Cancers 14:2247, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 22.Lim KHJ, Murali K, Thorne E, et al. : The impact of COVID-19 on oncology professionals—One year on: Lessons learned from the ESMO resilience task force survey series. ESMO Open 7:100374, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 23.Waterhouse DM, Harvey RD, Hurley P, et al. : Early impact of COVID-19 on the conduct of oncology clinical trials and long-term opportunities for transformation: Findings from an American Society of Clinical Oncology survey. JCO Oncol Pract 16:417-421, 2020 [DOI] [PubMed] [Google Scholar]
- 24.Marcum M, Kurtzweil N, Vollmer C, et al. : COVID-19 pandemic and impact on cancer clinical trials: An academic medical center perspective. Cancer Med 9:6141-6146, 2020 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 25.Lara Gongora AB, Werutsky G, Jardim DL, et al. : Impact of the COVID-19 pandemic on oncology clinical research in Latin America (LACOG 0420). JCO Glob Oncol 7:649-658, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 26.Ndumele A, Park KU: The impact of COVID-19 on National Clinical Trials Network breast cancer trials. Curr Breast Cancer Rep 13:103-109, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Tolaney SM, Lydon CA, Li T, et al. : The impact of COVID-19 on clinical trial execution at the Dana-Farber Cancer Institute. J Natl Cancer Inst 113:1453-1459, 2021 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 28.Perakslis E: Responding to the escalating cybersecurity threat to health care. N Engl J Med 387:767-770, 2022 [DOI] [PubMed] [Google Scholar]
- 29.Carroll HK, Moore S, Farooq AR, et al. : The impact of the COVID-19 pandemic on non-national doctors in Ireland. Ir J Med Sci 23:1-8, 2022 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 30.Ali S, Maguire S, Marks E, et al. : Psychological impact of the COVID-19 pendemic on healthcare workers at acute hospital settings in the south-east of Ireland: An observational cohort multicentre study. BMJ Open 10:e042920, 2020 [DOI] [PMC free article] [PubMed] [Google Scholar]





