Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

75% Increase in Reports of Ransomware Attacks on Healthcare Entities

Healthcare Data Compliance: Maintaining Integrity, Privacy and Security
June 10, 2020

A new report from Corvus found a 75-percent increase in reports of ransomware attacks on healthcare entities from H1 2019 to H2 2019. 

The report covers the IT security traits of healthcare entities, including hospitals, health systems, doctor’s offices, consultants and more. The entities have been the target of hundreds of ransomware attacks in recent years, the report says -- and those are only what’s been reported to the public.

Ransomware Activity

The rise of ransomware has been the most significant general trend in cybersecurity in the past year. Corvus’s Data Science team studied reported attacks over time to get a view of this trend. Because of varying reporting standards across states, these numbers represent only a sample of the true number of attacks, but the trend over time is illustrative.

Findings include:

  • Overall, ransomware attacks have been on the rise substantially since around the beginning of 2019. Before 2016 ransomware was a marginal aspect of cyber crime, with large-scale data breaches — aiming to steal troves of protected health information or credit card data — ruling the day. Since the NotPetya and Wannacry attacks of 2017 ransomware has been more well-known, with new strains of malware and new vulnerabilities helping to kick off the recent boom.
  • Attacks on health care entities have always been a big part of the overall ransomware picture. A recent rise in attacks on health care entities follows the general trend in ransomware. But while overall attacks rose in Q1, within health care they remained flat. Could the claims by several ransomware groups that they would avoid attacks on health care during the Covid-19 pandemic be reflected here? Future reports will tell.

Industry Analysis: IT Security of Health Care Entities

The two primary attack vectors for ransomware attacks are open ports (places where an organization’s IT infrastructure
connects to the wider web) and phishing emails. Using data from the Corvus Scan, this section explores how healthcare
entities are faring in securing against open ports and email systems.

Findings include:

Open Ports (Attack Surface)

  • Health care entities primarily have a smaller attack surface, but hospitals appear to be as much a target as the average organization. Corvus says, "Open ports are opportunities for attackers to identify and exploit. Properly managed, they are a necessary part of being connected to the web. But a larger attack surface is harder to keep track of and defend. Failing to properly secure an open port is too often a critical error. According to a Corvus study, presence of an open port with RDP was associated with 37% greater likelihood of a ransomware attack.

Email Security

  • Health care entities use email scanning and filtering tools at similar rates to the web average, which is low. Even among hospitals, which utilize those services at higher than average rates, over 75% do not use email scanning and filtering tools."
  • This metric has barely budged since COVID-19 outbreak began. This is despite the fact that phishing exploits have increased and present a risk to health care organizations. Corvus says, "Hospitals use email scanning and filtering tools more than average, but the average is low. According to Corvus research, these services are associated with a 33% reduction in the likelihood of a ransomware attack."

 

Overall, health care organizations are average, or better than average, when it comes to defending against two key attack vectors, claims Corvus. "This isn’t surprising given the regulatory environment and the sensitivity of their data. However, attackers are not deterred by a challenge. More important is the return on investment, and with a rich set of patients data (both PII and PHI), hospitals and other care facilities are a valuable target for data breaches. Plus, because of the critical nature of their operations -- they cannot afford to be down, with patients’ lives on the line -- they have become a natural target for ransomware. This requires an adversarial approach to defense. Hospitals in particular have larger attack surfaces, just about average in size for the web overall, making them more at risk for an attack through an open port. And all it takes is just one entry point to make an attack viable." 

KEYWORDS: cyber security healthcare security information security ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker-attack-breach-freepik.jpg

    Banking industry sees 1318% increase in ransomware attacks in 2021

    See More
  • cybersecurity mask

    Report shows a nearly 40% increase in global ransomware attacks

    See More
  • Ransomware, Data Breaches Leading to Increase in Fatal Heart Attacks at Hospitals?

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing