This research-based session will examine the infamous exploit of patient monitors to analyze how attackers leverage human reliance on technology in order to influence human behavior. Gleaning insights from security research such as Hacking Hospitals and IoT Village, this session will enumerate how attackers leverage such influence in pursuit of various motives, and what defenders should do about it.