“Many articles about cybersecurity risks in healthcare begin with descriptions of live simulations (so when in