Cyber Vulnerability in Health Care Part II: Prevention and Response