Health Data Breaches Are A “New Kind of Medical Harm"

As cyberattacks on healthcare systems grow in scale and severity, they can’t be seen as a simple IT matter. With breaches involving sensitive patient data carrying consequences that are deeply personal and often irreversible, Ty Greenhalgh, Healthcare Industry Principal at Claroty, argues it’s time they were recognised as clinical harm.

We discuss the impact of these attacks, and how healthcare organisations can defend against them. 

Q1: Why should cyberattacks on patient data be considered a form of clinical harm?

In healthcare, we’ve always understood clinical harm to mean a physical or psychological injury caused by medical intervention, or lack of it. That’s traditionally meant something like a surgical error or a medication mistake. 

But with cybercriminals continuously threatening healthcare providers and their patients, we have to expand that definition. When sensitive patient data is stolen and leaked, it can cause long-lasting emotional trauma, loss of trust, and in some cases, even suicide. 

Take the breach of the Vastaamo mental health clinic in Finland, where a callous hacker threatened to release patients’ therapy notes unless ransoms were paid. Some victims were so traumatised, they ended their lives. 
That’s not just an IT problem or theoretical harm; it’s a clinical outcome with real and irreversible damage. 

We need to recognise that these aren’t just data breaches, but clinical events. If a patient dies because of a delayed surgery caused by ransomware, or suffers psychological harm from a privacy violation, then cybersecurity has failed in the same way as any other part of the clinical process.

Q2: What makes health data so uniquely vulnerable – and dangerous when exposed?

We unfortunately live in a world where data breaches are a constant possibility - just recently, I was called by an especially brazen scammer impersonating my bank. But while all breaches are harmful, healthcare is on another level.

Health data isn’t like financial or retail data, it’s deeply personal, permanent, and often emotionally charged. You can cancel a credit card and hopefully untangle and be reimbursed for fraudulent payments, but you can’t undo sensitive or embarrassing information that’s now public. 

These records capture people at their most vulnerable: mental health diagnoses, addiction histories, sexual health, reproductive choices, and more. Once exposed, that information can’t be undone. There’s no way to “reset” your trauma or redact your truth.

Continued digitalisation also means cyber attackers have more opportunities than ever to get their hands on this data. Projects like the private healthcare tracking system recently proposed in the US are making data more available - and vulnerable. 

What makes this even more dangerous is that the most cold-hearted cyber attackers are specifically setting out to inflict trauma with this data. 

They’re not just encrypting it and demanding payment -  they’re purposefully exposing it. Leaking therapy notes or HIV statuses isn’t just about money anymore; it’s about humiliation, coercion, and control. We’ve seen this recently with the allegations around healthcare breaches relating to Hilary Clinton. When it comes to disinformation, whether or not the claims are true, the damage is done, especially when a person’s reputation or safety is on the line.

This kind of harm is unique to healthcare, and that’s why health data protection has to be treated with the same urgency as infection control or surgical hygiene. It’s a matter of human safety.

Q3: What are the top attack vectors facing healthcare systems today, and why are they so hard to defend against?

The kinds of attacks we see hitting healthcare aren’t too different from most other sectors – the difference is the uniquely complex and vulnerable nature of healthcare itself. 

Phishing is still the most common entry point, with attackers typically tricking staff or vendors into giving up credentials or clicking malicious links. It only takes one mistake for threat actors to gain a foothold. 

Next are internet-facing devices with known vulnerabilities – those systems that may be unpatched or poorly configured. These present an easy attack path into the network.

Finally, third-party access is a major blind spot, and one that healthcare is especially vulnerable to. Hospitals rely on an ecosystem of vendors, suppliers, and outsourced support teams, all with varying levels of security. If you don’t monitor those connections closely, attackers can use them to waltz right in. 

What makes defending against these threats especially difficult is the nature of healthcare itself. You can’t just install antivirus software on the average ventilator or MRI machine because these devices run on proprietary protocols and can’t be taken offline for regular patching. 

As we’ve seen over and over again, ransomware is especially dangerous because frontline healthcare is so dependent on uptime for patient care. If ransomware hits, hospitals may have no choice but to shut down some systems to stop the spread, but that also shuts down care. 

Unlike most other sectors, cybersecurity in this context isn’t about SLAs or financial bottom lines, it’s about making sure patients can be treated safely and without interruption.

Q4: How can healthcare shift cyber into being a patient safety issue?

I think the awareness is certainly there, we just need to work on making it more systematic to improve patient security. There are three main priorities I’d recommend. 

First, governance. Cybersecurity must be tied to leadership, with governance at the executive level. There needs to be clear accountability and feedback loops that connect cyber risk to real-world harm, providing visibility into how it directly impacts patient outcomes.

Second, visibility. You can’t protect what you don’t know about, and many hospitals still lack a complete inventory of their assets. Healthcare environments typically have a mix of older legacy systems running on operational technology and new connected medical devices, and both of these can be hard to manage and secure with standard IT tools. 

And third, manage third-party risk. Most healthcare providers are heavily reliant on a web of third-party providers, and these can often be a weak link specifically targeted by threat actors.  Vendors and partners need to be held to the same security standards as internal teams, because they’re often the weakest link.

The right support from governmental bodies and regulators can make all the difference here too. We don’t need blanket penalties or a one-size-fits-all approach.

What we need is thoughtful guidance in the form of a maturity model, like NIST CSF, that allows each organisation to progress at its own pace. We don’t need a stick, we need a journey, with carrots. Ultimately, cybersecurity isn’t just about protecting data. It’s about protecting people.

Ty Greenhalgh is the Industry Principal at Claroty

Image: Unsplash

You Might Also Read: 

Healthcare Under (Cyber) Attack: What You Need to Know:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Connections Between Climate Change & Cybersecurity [extract]
The Rise & Fall of RansomHub »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.