{"id":7824,"date":"2026-04-15T09:01:00","date_gmt":"2026-04-15T09:01:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7824"},"modified":"2026-04-15T09:01:00","modified_gmt":"2026-04-15T09:01:00","slug":"7-biggest-healthcare-security-threats","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7824","title":{"rendered":"7 biggest healthcare security threats"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p><a href=\"https:\/\/www.cio.com\/article\/650379\/health-check-on-tech-ck-birla-hospitals-cio-mitali-biswas-on-moving-the-needle-towards-innovation.html\">Cyberattacks targeting the healthcare sector<\/a> have surged since the COVID-19 pandemic and the resulting rush to enable <a href=\"https:\/\/www.csoonline.com\/article\/572219\/critical-flaws-in-remote-management-agent-impacts-thousands-of-medical-devices.html\">remote delivery<\/a> of healthcare services. Security vendors and researchers tracking the industry have reported a major increase in <a href=\"https:\/\/www.csoonline.com\/article\/514515\/what-is-phishing-examples-types-and-techniques.html\">phishing<\/a> attacks, <a href=\"https:\/\/www.csoonline.com\/article\/563507\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware<\/a>, web application attacks, and other threats targeting healthcare providers.<\/p>\n<p>Recent rising of ransomware attacks on healthcare, in particular the <a href=\"https:\/\/www.csoonline.com\/article\/2140608\/8-critical-lessons-from-the-change-healthcare-ransomware-catastrophe.html\">Change Healthcare breach<\/a>, has been a <a href=\"https:\/\/www.csoonline.com\/article\/3484304\/the-cyber-assault-on-healthcare-what-the-change-healthcare-breach-reveals.html\">headline-grabbing wake-up call for healthcare execs<\/a>.<\/p>\n<p>The trend has put enormous strain on healthcare security organizations. \u201cThe healthcare industry is under siege from a range of complex security risks,\u201d says Terry Ray, vice president of product strategy at Varonis. \u201cCybercriminals are hunting for the sensitive and valuable data that healthcare has access to, both patient data and corporate data.\u201d<\/p>\n<p>Many organizations are <a href=\"https:\/\/www.cio.com\/article\/189277\/why-big-tech-cant-crack-healthcare.html\">struggling to meet the challenge<\/a> because they are under-resourced and rely on <a href=\"https:\/\/www.computerworld.com\/article\/1618392\/cvs-app-glitch-makes-then-cancels-vaccine-appointments-and-it-gets-worse.html\">vulnerable systems<\/a>, third-party applications, and APIs to deliver services.<\/p>\n<p>Moreover, IT systems are increasingly used to optimize clinical encounters and patient care. Implantable devices, such as loop recorders, are increasingly being used to aid diagnoses, for example, of cardiac arrhythmias. These devices support telemetry, as do wearable devices, by transmitting patient data. Important healthcare decisions are made based on this data, with patient data being far more available due to advances in IT.<\/p>\n<p>The increasing usage of IoT and IT in healthcare have improved clinical efficiency and decision-making certainty, but it does require greater attention to risk assessment, with the days of patient data stored in locked filing cabinets long gone, says WithSecure principal consultant Stuart Morgan.<\/p>\n<p>\u201cThe impact of patient data being manipulated or leaked is intuitive and well understood, but the risk of denial of service \u2014 whether malicious or unintended \u2014 can be huge,\u201d Morgan tells CSO. \u201cAlthough resilience is built in to these systems to a degree, resorting to backup systems are by their nature far less efficient.\u201d<\/p>\n<p>Here, security experts identify the major cybersecurity threats healthcare organizations face today.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>The rising ransomware threat<\/h2>\n<p>Ransomware has emerged as one of the biggest cyber threats for healthcare today. Attackers have discovered that healthcare organizations delivering life-saving treatments can be more easily extorted than victims in almost every other sector. Many healthcare organizations are also more susceptible to attacks because of new digital applications and services they have launched to address demand for <a href=\"https:\/\/www.cio.com\/article\/302851\/healthcare-leaders-dont-let-telehealth-be-a-pitfall.html\">telehealth services<\/a>, among other digitalization efforts.<\/p>\n<p>From 2022 to 2023, healthcare ransomware victims jumped 81%, according to a <a href=\"https:\/\/www.dni.gov\/files\/CTIIC\/documents\/products\/Ransomware_Attacks_Surge_in_2023.pdf\">study by US Office of the Director of National Intelligence<\/a>. This past year, healthcare ransomware attacks increased another 30%, as vendors and service partners joined clinics and hospitals as key targets for attacks, according to a <a href=\"https:\/\/industrialcyber.co\/reports\/healthcare-ransomware-attacks-surge-30-in-2025-as-cybercriminals-shift-focus-to-vendors-and-service-partners\/\">study by Comparitech<\/a>.<\/p>\n<p>Pharmaceutical manufacturers, medical billing providers, and healthcare tech companies have also come under increasing fire from ransomware actors, Comparitech found.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3484304\/the-cyber-assault-on-healthcare-what-the-change-healthcare-breach-reveals.html\">Change Healthcare\u2019s devastating ransomware attack in February 2024<\/a> is among the most notable. The attack, which disrupted insurance claim processing, prescription dispensing, and financial settlements, had a huge impact on hospitals, clinics, and pharmacies across the US. In August 2024, <a href=\"https:\/\/www.healthcaredive.com\/news\/mclaren-health-care-ransomware-attack-cyberattack\/724615\/\">Michigan-based McLaren Health Care suffered the second of two ransomware attacks<\/a> over the course of just 12 months.<\/p>\n<p>A <a href=\"https:\/\/www.england.nhs.uk\/synnovis-cyber-incident\/\">June 2024 ransomware attack on NHS-affiliated UK pathology services Synnovis<\/a><strong> <\/strong>caused massive disruption in parts of London, forcing hospitals to cancel planned procedures and resulting in a temporary shortage of blood supplies. The Qilin ransomware group exfiltrated data before deploying ransomware that hobbled Synnovis\u2019 IT systems, affecting blood tests, diagnostics, and lab services.<\/p>\n<p><strong>Medical equipment firm <\/strong><a href=\"https:\/\/www.stryker.com\/us\/en\/about\/news\/2026\/a-message-to-our-customers-03-2026.html\">Stryker experienced global network disruptions to its IT systems<\/a><strong> <\/strong>following a cyberattack in March 2026. Initially ransomware was suspected but Iran-linked group Handala quickly became the prime suspect in an attack that wiped an estimated 200,000 devices as part of a broader campaign against US and Israeli targets.<\/p>\n<p>Electronic health records (EHRs) and systems present the biggest risk in healthcare today, says Caleb Barlow, president and CEO of CynergisTek. \u201cPast attacks have shown when a hospital undergoes a ransomware-induced lockdown period, access to EHRs is shut down, and patients may have to be diverted for care,\u201d he says. \u201cSuch attacks can prevent access to critical prescription information and dosing for patients with complex, chronic conditions like diabetes or cancer. Worse, hackers can potentially take it a step further and manipulate health record data to undermine patient care.\u201d<\/p>\n<p>Historically, healthcare institutions transferred this risk to cyber insurance, but that is becoming more difficult because insurers are making it harder for organizations to purchase ransomware protection without specific controls such as <a href=\"https:\/\/www.csoonline.com\/article\/563753\/two-factor-authentication-2fa-explained.html\">multi-factor authentication<\/a> and <a href=\"https:\/\/www.csoonline.com\/article\/653052\/how-to-pick-the-best-endpoint-detection-and-response-solution.html\">endpoint detection and response technologies<\/a>, Barlow says.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Cloud vulnerabilities and misconfigurations<\/h2>\n<p>Many <a href=\"https:\/\/www.csoonline.com\/article\/571171\/how-jefferson-health-enhanced-cybersecurity-via-its-cloud-transformation.html\">healthcare organizations have adopted cloud services<\/a> as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.<\/p>\n<p>The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially as healthcare organizations often use multiple cloud vendors and services with differing security standards and practices, making it hard to apply a consistent data protection policies.<\/p>\n<p>Sixty-one percent of healthcare companies said they experienced a cloud cyberattack in the past 12 months in a February 2024 <a href=\"https:\/\/kms-healthcare.com\/blog\/cloud-security-in-healthcare\/\">report by healthcare software developer KMS Healthcare<\/a>.<\/p>\n<p>In March 2026, <a href=\"https:\/\/www.healthleadersmedia.com\/technology\/carecloud-reports-ehr-breach\">US healthcare software vendor CareCloud\u2019s EHR environment suffered a breach<\/a>, disrupting access for 45,000 providers.<\/p>\n<p>Attacks aren\u2019t the only cyber risks healthcare organizations face with rising cloud use. Misconfigurations play a role as well.<\/p>\n<p>In April 2025, US health insurer <a href=\"https:\/\/www.hipaajournal.com\/blue-shield-of-california-google-ads-data-breach\/\">Blue Shield of California found that it had exposed member data<\/a> \u2014 including protected health information \u2014 to Google\u2019s advertising platform for three years up until January 2024 because of a flawed Google Analytics setup on some of its web pages.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Web application attacks<\/h2>\n<p>Web application attacks targeting healthcare entities have also spiked sharply in recent years, with <a href=\"https:\/\/www.csoonline.com\/article\/565192\/what-is-xss-cross-site-scripting-attacks-explained.html\">cross-site scripting attacks<\/a> among the most common, along with <a href=\"https:\/\/www.csoonline.com\/article\/564663\/what-is-sql-injection-how-these-attacks-work-and-how-to-prevent-them.html\">SQL injection<\/a>, protocol manipulation attacks, and remote code execution\/remote file inclusion attacks.<\/p>\n<p>\u201cTechnically speaking, web application attacks can be incredibly challenging for under-resourced healthcare organizations to manage,\u201d Varonis\u2019 Ray says. To address the issue, healthcare organizations must implement controls that enable better visibility into third-party applications and API connections. Only then will the security team be able to understand who is trying to access critical data and whether that activity should be permitted.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Bad-bot traffic<\/h2>\n<p>Traffic from bad bots \u2014 such as those attempting to scrape data, send spam, or download unwanted software \u2014 present another major challenge for healthcare organizations. The problem became especially pressing during the pandemic when governments around the world set up new websites and other digital infrastructure to support COVID vaccine registrations and appointments.<\/p>\n<p>\u201cIncreased levels of traffic result in downtime and disruption for legitimate human users who are trying to access critical services on their\u00a0healthcare\u00a0providers\u2019 site,\u201d Ray says. \u201cIt might also result in increased infrastructure costs for the organization as it tries to sustain uptime from the persistent, burdensome level of elevated traffic.\u201d<\/p>\n<p>The latest <a href=\"https:\/\/www.imperva.com\/blog\/2025-imperva-bad-bot-report-how-ai-is-supercharging-the-bot-threat\/\">2025 edition of Imperva\u2019s Bad Bot report<\/a> estimates malign bots account for nearly a third (37%) of internet traffic, up from 32% in the year prior. Imperva warned that AI is \u201csupercharging the bot threat\u201d alongside a shift in advanced bot traffic targeted APIs rather than applications, reflecting how API endpoints often handle sensitive or high-value data.<\/p>\n<p>\u201cFinancial services, business, telecom, and healthcare are among the most targeted industries for bot attacks on APIs, accounting for over 75% of all API attacks,\u201d Imperva reports.<\/p>\n<p>Bad bots can lead to healthcare data breaches, for example through <a href=\"https:\/\/www.csoonline.com\/article\/567905\/credential-stuffing-explained-how-to-prevent-detect-and-defend-against-it.html\">credential stuffing<\/a> attacks against patient accounts, and scraping of sensitive health information.<\/p>\n<p>Cybercriminals target confidential health information, such as patient records, medical history, and insurance details because this stolen data can be sold on the dark web for profit or used for fraudulent activities, Imperva warns.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Increased phishing volumes<\/h2>\n<p>Phishing attacks pose a major threat to the healthcare industry as they do in almost every sector. Again, the pandemic provided a unique backdrop for a rise in phishing volumes versus healthcare organizations. In a <a href=\"https:\/\/www.himss.org\/sites\/hde\/files\/media\/file\/2020\/11\/16\/2020_himss_cybersecurity_survey_final.pdf\">survey<\/a> of 168 healthcare cybersecurity professionals conducted by Healthcare Information and Management Systems Society (HIMSS) at the time found that phishing was the typical initial point of compromise for most security incidents.<\/p>\n<p>\u201cPhishing attacks are the top type of significant security incident reported by respondents,\u201d HIMSS noted in its report. \u201cPhishers were the top type of threat actor responsible for significant security incidents at healthcare organizations.\u201d<\/p>\n<p>But phishing has long been an issue for healthcare. Stats compiled by the US Department of Health and Human Services (HHS) record that 18% of 4,419 reported breaches of PHI between 2009 and 2021 involved either phishing attacks or the hacking of email accounts, according to the <a href=\"https:\/\/www.hipaajournal.com\/healthcare-data-breaches-due-to-phishing\/\">HIPAA Journal<\/a>.<\/p>\n<p>Phishing was the initial vector in high-profile attacks against healthcare organizations <a href=\"https:\/\/www.hhs.gov\/guidance\/document\/anthem-pays-ocr-16-million-record-hipaa-settlement-following-largest-us-health-data-breach\">Anthem (2015)<\/a> and <a href=\"https:\/\/www.hipaajournal.com\/magellan-health-suffers-ransomware-attack\/\">Magellan Health (2020)<\/a>, among others.<\/p>\n<p>A <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7062337\/\">study by UK medical journal BMJ<\/a> found that around 3% of emails sent to hospital staff over a one-month period were suspected threats.<\/p>\n<p>While many staff appear to be aware of phishing and respond appropriately, ongoing education is required \u2014 particularly about the risk of leaking information of potential use to attackers through social media, the BMJ advised.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Smart devices<\/h2>\n<p>Wearable and implantable smart medical devices are a proven cybersecurity risk. These technologies certainly offer better analysis, assisting diagnosis of medical conditions while aiding independent living, but mistakes made in securing such medtech have exposed vulnerable users to potential attack.<\/p>\n<p>A seminal moment was the late <a href=\"https:\/\/www.theregister.com\/2011\/10\/27\/fatal_insulin_pump_attack\/\">Barnaby Jack\u2019s hacking of an insulin pump<\/a> in 2011. This attack over Bluetooth had a maximum range of approximately 300 meters.<\/p>\n<p>Since then, security researchers at Pen Test Partners have found \u201cclosed loop\u201d insulin trial data on the public internet.<\/p>\n<p>\u201cIn one case, we could have modified the readings taken by the body-worn continuous glucose monitor and automatically, remotely administered a fatal dose of insulin to around 3,000 users in the trial,\u201d Ken Munro, managing director of Pen Test Partners, tells CSO. \u201cFortunately, the vendor involved responded very quickly to our report and had the system secured the same day.\u201d<\/p>\n<p>Munro adds: \u201cOther connected medtech devices Pen Test Partners have found security issues with include cranial stimulators, dosing pumps, and medical robots, among many others. Fortunately, the smart devices threat has been recognized and regulators are starting to take action.\u201d<\/p>\n<p>For example, the <a href=\"https:\/\/www.fda.gov\/medical-devices\/digital-health-center-excellence\/cybersecurity-medical-devices-frequently-asked-questions-faqs\">US Food &amp; Drug Administration (FDA) introduced FD&amp;C 524b<\/a> in 2023 to drive cybersecurity in connected medical devices.<\/p>\n<h2 class=\"wp-block-heading\">Generative AI<\/h2>\n<p>As healthcare staff adopt generative AI, the risk of leaking sensitive information through prompts and documents has grown.<\/p>\n<p>Regulated data, such as patient records and medical information, is especially at risk, accounting for 89% of all data policy violations occurring in the context of gen AI usage, significantly higher than the cross-industry average of 31%, according to a <a href=\"https:\/\/www.netskope.com\/resources\/threat-labs-reports\/threat-labs-report-healthcare-2026\">2026 study by Netskope<\/a>.<\/p>\n<p>Moreover, the Netskope report shows that healthcare organizations\u2019 deployment and usage of internal AI tools, which require bespoke security guardrails, is accelerating. The proportion of healthcare workers using gen AI applications managed by their organization jumped from 18% to 67% in 2025, significantly ahead of cross-industry averages (26% to 62%), according to the study.<\/p>\n<p>The need for bespoke security controls for AI systems is illustrated by <a href=\"https:\/\/mindgard.ai\/blog\/doctronic-is-now-accepting-new-patients-and-unsafe-instructions?utm_source=chatgpt.com\">research from Mindgard showing that the clinical AI tool Doctronic could be compromised<\/a> to spread conspiracy theories or even manipulate prescription guidance.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks targeting the healthcare sector have surged since the COVID-19 pandemic and the resulting rush to enable remote delivery of healthcare services. Security vendors and researchers tracking the industry have reported a major increase in phishing attacks, ransomware, web application attacks, and other threats targeting healthcare providers. Recent rising of ransomware attacks on healthcare, in [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7825,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7824"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7824"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7824\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7825"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}