Technology ❯Information Technology ❯Cloud Computing ❯Software as a Service
Hackers accessed patient data from legacy Cerner systems, with stolen information reportedly used to extort U.S. medical providers.