Hello I need help with responding to my weekly discussion post. I need one peer

Hello I need help with responding to my weekly discussion post. I need one peer response and one faculty response to the postings inserted below. Both responses require one scholarly reference each. Both references should be within the last 5 years please. Thank you
1. Peer
Insider Threat
Insider threat is the breach we will be reviewing. Insider threat occurs when a individual within the organization uses their access inappropriately. This is a common problem within healthcare organizations and where protected health information (PHI) is involved (Lee, 2022).
Type of Breach
This breach occurred in a large health care organization with many hospitals and clinics spread out over several states.
Parties Involved
There are three major parties in this scenario: A celebrity who is a patient at one of the hospitals within the organization, a nurse in the unit in which the patient is hospitalized, and the team who is trying to keep the patient’s information secure.
How the Breach Occurred
The nurse identifies that the healthcare information of the celebrity may propose a lucrative financial opportunity. The nurse reaches out to news sources and tabloids to try to use the information within the electronic health record (EHR) for a financial gain. Although EHRs often have security features that show who access charts, these do not necessarily stop individuals from accessing charts, but they may lead to punitive action such as loss of a job.
Consequences of the Breach
This threat could lead to severe consequences for the organization, as it could face significant legal and financial repercussions. Insider threat and data breach incidents often cost healthcare organizations $9.23 million per incident (Lee, 2022). The threat could also cause significant harm to the celebrity patient, as his or her personal information will be made public.
References
Lee, I. (2022). Analysis of insider threats in the healthcare industry: A text mining approach. Information, 13(9), 404. doi: 0.3390/info13090404
2. Professor
Should IT be notified when there is an employee issue so they can highten security?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount