Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsHospitals & Medical Centers

Why hackers are attacking healthcare more frequently?

By Jonathan Jesneck
doctor in hospital

Image via Pixabay

February 7, 2023

In the field of healthcare, taking care of sensitive data is as important as the care physicians take with the patients themselves. It’s particularly important when attacks on healthcare have been on the rise worldwide.

Healthcare organizations in the U.S., U.K. and Australia all experienced serious data hacks in 2022. In the U.S., the data of 2 million patients was lost to hackers over a three-week period, while in Australia, the results of the hack left 10 million patients with vulnerable data being broadcast in the public sphere. Elsewhere, in the U.K., the National Health Service (NHS) was declared a “cybersecurity disaster” after being hacked multiple times in a row.

These attacks present significant challenges for the medical community, but they can affect anyone, anywhere, making them a serious issue. The problem won’t be solved by hospitals alone. Governments and institutions must work together to create a safe and secure environment for patient data.

So the problem is clearly widespread, but why are hackers attacking healthcare more frequently?

What’s their motive?

Hackers are increasingly acting in organized crime groups that often perform state-sponsored activities but also seek money on the side. Forget your classic image of a hacker working out of his Mom’s spare bedroom — these groups run professional operations and recruit computer scientists straight out of school or run sophisticated internal schools themselves. Hospitals need to catch up with how hackers have grown.

It’s usually the goal of a hacker to disrupt public infrastructure, which makes hospitals ideal targets, as they now present a far more valuable opportunity for a ransom attack.

While digital transformation is rife across industries, hospitals have been slowly digitizing their processes and patient care for many years. More asynchronous working patterns have also increased the need for captured patient data to be easily accessible and shareable. With more patient data in the systems, hospitals become an easy and attractive target.

As a result of more data, the opportunities for hackers to enter and exploit the system have also proliferated. Data systems have become a hospital’s most vital tool for working and many would rather pay a ransom to restore its operations than lose the functionality of their digital networks. This leaves hospitals vulnerable to attack.

Even if they were to pay the ransom, they are left in the dubious position of having to trust that the attacker has deleted any stolen data rather than selling it on the black market. Hospitals legally must disclose data breaches to the government based on the number of patients impacted, but this current situation places the burden of responsibility in dealing with an attack on hospitals alone.

Actions and consequences

Without help from governments to deal with data attacks, it’s not just hospitals that are left vulnerable, the patients also suffer — and that could mean anyone.

Attacks might also not be immediately obvious. A phishing scam, for example, could be as easy as tricking an employee into sharing a sensitive report with someone posing as their boss. An employee might also be blackmailed by an attacker. An attacker could also offer a financial incentive to an unhappy worker willing to share private data. Ransomware can just as easily encrypt a whole system, making it unusable unless the hospital pays to unlock it.

The consequences of these actions range in their significance from inconvenient to life endangering. Keeping patients out of harm has never been more critical in today’s political climate. For instance, as legalities continue to play out over abortion rights in the U.S., if procedure data was leaked, in some states, it could be considered a felony with severe implications for the patient.

As hospital systems continue to modernize, it’s essential that we don’t see a monopoly in the market when it comes to security software. Consolidating too far in this area would reduce the impetus for innovation and have too many hospitals operating under a single system, making it potentially easier for hackers to reach more hospitals at once. Governments need to step in to prevent a lack of choice from creating additional security risks.

Right now, the most common response from a government would strongly recommend guidelines that put the responsibility on having backups and protocols in place on the hospitals. Governments don’t want hospitals to pay, but they also aren’t fully present to help hospitals through the challenges and complexities of the situation.

Just like a bank robbery or hostage situation, governments need to take the burden off hospitals when it comes to data breaches. With anyone in their population, including themselves, at risk of attack, it is in everyone’s best interest for local and governmental organizations to help restore and secure hospital systems and to take over negotiations with hackers so hospitals feel less inclined to pay the problem away.

KEYWORDS: data breach government relations healthcare cybersecurity hospital security patient privacy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan Jesneck is the Co-Founder and CTO at Firefly Lab.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why Healthcare Records Are a Hacker’s Holy Grail

    See More
  • cyber remote work

    Business email compromise during a pandemic: Why cyber insurance is more urgent than ever

    See More
  • What are America's Most Frequently Stolen Products?

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing