vulnerability attacks or potential holes in the system

vulnerability attacks or potential holes in the system is priority in the IT department where I work. Any SSH access that allows remote access are set up that the department would receive a red flag or notification that an unauthorized request have been made and notify the administration that there could be potential information of patients and insurance taken. Like you stated you have security alarm to inform your section about the issues, the same is ran in a trauma hospital where chaos becomes the norm and nooned is paying attention to their system.