{"id":1692,"date":"2025-07-16T12:36:00","date_gmt":"2025-07-16T12:36:00","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1692"},"modified":"2025-07-16T12:36:00","modified_gmt":"2025-07-16T12:36:00","slug":"cybersecurity-in-healthcare-needs-a-profound-rethink","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/","title":{"rendered":"Cybersecurity in Healthcare Needs a Profound Rethink"},"content":{"rendered":"<h2>From addressing tech obsolescence to improving digital resilience<\/h2>\n<p>Imagine a hospital paralyzed by ransomware, critical medical devices rendered inoperative, and sensitive patient data stolen. Unfortunately, it\u2019s a reality that many healthcare organizations across Europe, and the world, have faced.<\/p>\n<p>As healthcare systems undergo digital transformation, policymakers and healthcare leaders must confront an uncomfortable truth: cybersecurity is no longer just an IT issue. It is a core component of patient care and organizational resilience.<\/p>\n<p>This blog explores why healthcare is so attractive for cybercriminals and outlines\u00a0<strong>five actions\u00a0<\/strong>to reset how we approach security in the sector with a long-term vision. This comprehensive, forward-looking approach addresses the unique vulnerabilities of healthcare while enabling organizations to build long-term resilience.<\/p>\n<h2>The Healthcare Sector: A Prime Target for Cybercriminals<\/h2>\n<p>In 2024, the healthcare sector became the most targeted industry for ransomware attacks, with cybercriminals exploiting vulnerabilities in outdated systems, fragmented IT environments, and overburdened staff. The stakes are high as the average cost of a data breach in healthcare is $9.77 million, higher than in any other sector. Worse yet, these attacks don\u2019t just harm balance sheets, they jeopardize patient safety, delay care, and erode public trust.<\/p>\n<p>The healthcare sector gathers a perfect storm of vulnerabilities, making it a particularly attractive target for cyberattacks.<\/p>\n<p>First, healthcare organizations hold a treasure trove of sensitive data. Medical records are worth up to\u00a0<a href=\"https:\/\/www.ama-assn.org\/about\/leadership\/cybersecurity-must-be-essential-element-every-physician-practice#:~:text=Credit%20cards%20can%20be%20canceled,cybercriminal%20carrying%20out%20an%20attack.\">50 times more<\/a>\u00a0than credit card numbers on the dark web because they cannot be cancelled. They can be used to file fraudulent insurance claims, obtain prescription medications, or build complete profiles for identity theft.<\/p>\n<p>Second, healthcare systems rely on a mix of modern and legacy technology. While the latest devices and software enable faster and more accurate diagnoses, many hospitals still run outdated IT systems. In 2019,\u00a0<a href=\"https:\/\/www.forescout.com\/resources\/forescout-healthcare-report\/\">71%<\/a>\u00a0of medical devices were running on obsolete or near-obsolete software. Even in 2022, 60% of French hospitals were still operating on outdated infrastructure, including systems which no longer receive security updates. This significantly expands the attack surface and often allows attackers to persist undetected, worsening the impact of breaches.<\/p>\n<p><a href=\"https:\/\/blogs.cisco.com\/gov\/cybersecurity-in-healthcare-rethink-from-patchwork-fixes-to-digital-resilience\">Read the Full Story Now<\/a><\/p>\n<p>Source: Cisco Blog<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From addressing tech obsolescence to improving digital resilience Imagine a hospital paralyzed by ransomware, critical medical devices rendered inoperative, and sensitive patient data stolen. Unfortunately, it\u2019s a reality that many healthcare organizations across Europe, and the world, have faced. As healthcare systems undergo digital transformation, policymakers and healthcare leaders must confront an uncomfortable truth: cybersecurity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1134,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity in Healthcare Needs a Profound Rethink - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Healthcare Needs a Profound Rethink - Community\" \/>\n<meta property=\"og:description\" content=\"From addressing tech obsolescence to improving digital resilience Imagine a hospital paralyzed by ransomware, critical medical devices rendered inoperative, and sensitive patient data stolen. Unfortunately, it\u2019s a reality that many healthcare organizations across Europe, and the world, have faced. As healthcare systems undergo digital transformation, policymakers and healthcare leaders must confront an uncomfortable truth: cybersecurity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T12:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/\",\"name\":\"Cybersecurity in Healthcare Needs a Profound Rethink - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg\",\"datePublished\":\"2025-07-16T12:36:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg\",\"width\":1280,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in Healthcare Needs a Profound Rethink\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Healthcare Needs a Profound Rethink - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Healthcare Needs a Profound Rethink - Community","og_description":"From addressing tech obsolescence to improving digital resilience Imagine a hospital paralyzed by ransomware, critical medical devices rendered inoperative, and sensitive patient data stolen. Unfortunately, it\u2019s a reality that many healthcare organizations across Europe, and the world, have faced. As healthcare systems undergo digital transformation, policymakers and healthcare leaders must confront an uncomfortable truth: cybersecurity [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-07-16T12:36:00+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/","name":"Cybersecurity in Healthcare Needs a Profound Rethink - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg","datePublished":"2025-07-16T12:36:00+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/healthcarehack.jpg","width":1280,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-in-healthcare-needs-a-profound-rethink\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in Healthcare Needs a Profound Rethink"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1692"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1692\/revisions"}],"predecessor-version":[{"id":1693,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1692\/revisions\/1693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1134"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}