Healthcare Under (Cyber) Attack: What You Need to Know

Brought to you by CYRIN


Healthcare Under (Cyber) Attack: What You Need to Know


Advances in the digital environment have been a big help to the healthcare industry allowing them to offer options like telehealth, remote care and online access to patients for their records. However, this article will spotlight the problems and the impacts of those advances.

Recent breaches at two large providers underline the growing data leak threats experienced in this market, and what the industry and cybersecurity experts are doing about it.

Recent Breaches

Recent data breaches at New Haven Health and Blue Shield of California illuminate the unique cyber vulnerabilities in the healthcare sector. Yale New Haven Health System (YNHHS), a nonprofit health system that includes five acute-care hospitals, a medical foundation, and multiple outpatient facilities and multispecialty centers in Connecticut, New York, and Rhode Island — and the largest healthcare system in Connecticut — reported the largest reported data breach incident in 2025 this far, impacting an estimated 5.6 million individuals.

On March 8 of this year, YNHHS detected anomalous activity in its IT systems. Marshalling external cybersecurity experts from Mandiant, the subsequent investigation revealed unauthorized access to the network. Although electronic medical records were not impacted by the breach, third party hackers were still able to access copies of highly sensitive data, including names, birthdates, phone numbers, race/ethnicity, email addresses, medical record and Social Security numbers. Although YNHSS assured patients that the quality and availability of medical care was not compromised, the YNHSS breach is the first of two major recent breaches.

In terms of severity and the number of impacted individuals, the YNHHS breach beats the first big breach of the year: Blue Shield of California, which impacted 4.7 million people when a configuration of Google Analytics enabled sensitive information to be shared with Google Ads.

While swift and immediate action contained the incidents, both breaches represent an uptick in data hacks of healthcare organizations. More than 700 healthcare data breaches were reported last year (2024) in the United States, with an estimated 180 million records compromised.

Three days after the breach, YNHHS reported on their website that there had been no disruption to patient care and that no financial information was compromised. However, these breaches highlight the increased cyber vulnerability within healthcare systems and how healthcare is particularly vulnerable.

Healthcare Cybersecurity Market: Trends & Expectations

The healthcare cybersecurity market is growing exponentially, reflecting a surge in both frequency and severity of cyberthreats, as well as the ongoing need for immediate investment in systems and strategies to help protect patient data and systems. According to a recent Astute Analytica report, the global healthcare cybersecurity market was valued at $21.25 billion in 2024; it is projected to reach $82.90 billion by 2033, reflecting a 18.55% compound annual growth rate (CAGR). This uptick is driven by a host of factors, including a rise in ransomware attacks as the healthcare industry moves to digital care and electronic record keeping. According to the Astute report, "Healthcare cybersecurity demand will be driven by ransomware resilience needs, FDA mandates for medical devices, and AI-powered threat detection."

According to most analysts, 2024 was a bad year for the healthcare industry. A rapid escalation of cyberthreats across the health care sector has resulted in “record growth” for cybersecurity spending, according to SecureWorld, “underscoring how critical cybersecurity has become for healthcare organizations.” A surge in “security spending created a $3.2 billion sub-market for healthcare-specific cybersecurity solutions.” Within an 18-month period, cyber incidents jumped 137%, raising alarm and pressure to create more robust cyber defenses.

The rapid and almost universal digitization of the healthcare industry has expanded the potential attack surface and increased the ease and likelihood of cyber threats. Cloud-based systems like electronic health records, telehealth options, and Internet of Things (IoT) medical devices may improve patient outcomes while introducing new cyber vulnerabilities.

As an example, a full 68% of healthcare IoT devices run on unsupported operating systems, making them an easy mark for hackers.

Cloud storage is at constant risk from reconfiguration and each connected device or cloud app is a possible entry point for malicious actors. As the attack perimeter grows, so must the defenses mitigate potential risks. According to SecureWorld, “This reality is driving demand for IoT security solutions, cloud security posture management, and zero-trust network architectures to secure an ever-widening perimeter.” As threats escalate, so do compliance regulations. Healthcare providers risk severe financial penalties and “reputational damage” for non-compliance and are now required to submit to regular security audits and risk assessments. A shift in the regulatory environment means constant investment in cybersecurity.

Telehealth and remote care, or RPM (remote patient monitoring) swelled during the COVID-19 pandemic. The rise in telehealth care created convenient healthcare delivery as well as new cyber risks. Healthcare apps and other remote care devices often lack robust security. As telehealth becomes a more acceptable standard of care, and not just a pandemic trend, more cybersecurity investment will be necessary.

According to Newsweek, in 2023, over 133 million records were exposed in the healthcare sector, according to U.S. Department of Health and Human Services (HHS) data compiled by hipaajournal.com. These attacks can have “devastating” consequences for both patients and providers, according to Louisiana State University Professor Elias Bou-Harb, who says: "This increase is driven by multiple factors. First, health care data is incredibly valuable—medical records contain personal, financial, and medical information, making them worth 10 to 50 times more than credit card details on the dark web. Additionally, the rapid adoption of Internet of Things (IoT) medical devices has expanded the attack surface, often without proper security controls. This, coupled with the ongoing shortage of cybersecurity professionals in health care, has left hospitals and medical facilities particularly vulnerable.”

Healthcare Delivery Organizations (HDOs) remain among the most targeted sectors due to the high value of the data they store, and the challenges inherent in securing their complex networks. According to Forescout, ransomware was the leading cause of breaches, followed by third-party system compromise, e-mail compromise, and phishing.

The average HIPAA enforcement penalty in 2024 was over $554,000 and as of April 30, 2025, a total of 238 data breaches had been reported on the HHS breach portal, which mandates disclosure for any incident affecting more than 500 individuals. Of these, nine breach investigations have been concluded, while 229 remained ongoing. These breaches impacted over 20 million individuals.

Cybersecurity Solutions For Healthcare

Cybersecurity in healthcare does not stop at the hospital or medical center door. It remains a strategic imperative – not an option -- for every organization linked with the healthcare sector, including insurance companies, providers, pharmaceutical companies, biotechnology, and medical equipment manufacturers. Protecting the “security and integrity of patient data” while meeting industry compliance regulations will be crucial for the healthcare industry in the years and decades ahead. As noted in Fortune Business Insights, the increase and severity of cyberattacks linked to “inadequate security protocols” will remain of primary concern and “drive the adoption of enhanced security solutions.” As technology advances, the protection of medical and health data will remain front and center. The safety of the networks and the sensitive data will require trained cybersecurity experts who can respond efficaciously to “zero-day vulnerabilities,” as well as a focus on cyber resilience strategies that are efficient and aligned with compliance standards.

Breaches not only have the potential of leading to hefty fines, but more importantly, they can disrupt and compromise the delivery of care and put lives at risk. Healthcare executives increasingly view cybersecurity protocols are more than just an “IT issue,” but a “core business risk.”


How Can CYRIN Help?

Yes, we continue to beat the drum for training, because we realize how important it is to all sectors of society, and healthcare of course is a major sector and concern when it comes to cybersecurity. Whether it’s Boot Camps, Capture the Flag (CTF), self-directed learning or courses offered by our education partners, CYRIN works to create critical skill sets for industry, government and the cybersecurity workforce for the future.

We continue to work with our industry partners to address major challenges including incident response, ransomware, and phishing and set up realistic scenarios that allow them to train their teams and prepare new hires for the threats they will face. Government agencies have been using CYRIN for years, training their front-line specialists on the real threats faced on their ever-expanding risk surface. For educators, we consistently work with colleges and universities both large and small to create realistic training to meet the environment students will encounter when they graduate and enter the workforce.

In an increasingly digitized world, training and experiential training is critical. Unless you get the “hands-on” feel for the tools and attacks and train on incident response in real world scenarios, you just won’t be prepared for when the inevitable happens. A full-blown cyberattack is not something you can prepare for after it hits.

The best time to plan and prepare is before the attack. Our training platform teaches fundamental solutions that integrate actual cyber tools from CYRIN’s labs that allow you to practice 24/7, in the cloud, no special software required. Our new programs, including Digital Twins, can create real-world conditions for you to practice before you must act. Cyber is a team effort; to see what our team can do for you take a look at our course catalog, or better yet, contact us for further information and your personalized demonstration of CYRIN. Take a test drive and see for yourself!

cyrin%20cyber%20range%20long%20resized.png

Image: Ideogram

You Might Also Read: 

Entering the Cybersecurity Workforce: Where to Begin?:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Ransomware Trends In May 2025
NATO Allies Pledge 1.5% Of GDP To Boost Cybersecurity & Protect Critical Infrastructure »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.