Health-ISAC 2026 Report: Healthcare Sector Faces Existential Cybersecurity Crisis as Ransomware, Supply Chain Attacks, and AI-Powered Threats Surge

Health-ISAC 2026 Report: Healthcare Sector Faces Existential Cybersecurity Crisis as Ransomware, Supply Chain Attacks, and AI-Powered Threats Surge

Health-ISAC's newly released 2026 Global Health Sector Threat Landscape Report paints a dire picture of an industry under siege. With 455 ransomware incidents tracked globally throughout 2025 and sophisticated supply chain compromises enabling access at unprecedented scale, healthcare organizations face a perfect storm of escalating threats, inadequate defenses, and potentially life-threatening operational disruptions. The report identifies ransomware groups Qilin, INC Ransom, and SAFEPAY as the most active in targeting health entities, while warning that AI-enabled tactics are poised to dramatically escalate the threat landscape in 2026.

HHS Proposes Major HIPAA Security Rule Amendment: Stricter Encryption, Risk Analysis, and Breach Accountability Expected May 2026
The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has proposed significant amendments to the HIPAA Security Rule that would fundamentally strengthen cybersecurity requirements for healthcare organizations and their business associates. With the final rule expected in May 2026, covered entities and business associates

Executive Summary

The Health-ISAC report arrives at a critical juncture for global healthcare cybersecurity. Unlike breaches in retail or hospitality sectors where the primary harm is financial and reputational, healthcare cyberattacks directly threaten patient safety, clinical operations, and in extreme cases, human life. The report's findings make clear that healthcare has become the sector of choice for profit-driven ransomware operators precisely because the consequences of disruption are so severe—creating maximum pressure to pay ransoms.

Healthcare Breaches: Understanding the Risks and Protecting Patient Data
Introduction: Healthcare breaches continue to be a significant concern in today’s digital landscape, with cybercriminals targeting the sensitive patient data held by healthcare organizations. These breaches compromise individuals’ personal information and pose risks to their privacy, financial security, and overall trust in the healthcare system. This article aims to provide

Key findings include:

  • 455 ransomware incidents targeting health organizations globally in 2025
  • Escalating supply chain compromise, with attackers increasingly targeting vendors to gain access at scale
  • Sophisticated social engineering evolution, including QR code phishing (quishing), ClickFix, and FileFix techniques that bypass traditional security awareness training
  • AI-enabled attack tactics emerging as a major concern for 2026
  • Survey of 250 health executives revealing ransomware, phishing, third-party compromise, and newly discovered software flaws as top concerns

Health-ISAC Chief Security Officer Errol Weiss captured the existential nature of the threat:

"The Health sector has become one of the most targeted sectors in the world, not because it's the easiest, but because the consequences of disruption are so severe. This report is a clear warning: cyber threats are no longer isolated events. They represent life-saving business continuity crises that can impact patient care, staff safety, and public trust."

The Ransomware Epidemic: 455 Incidents and Counting

By the Numbers

455 ransomware incidents globally in 2025 represents not just the volume of attacks but the relentless, sustained pressure facing healthcare organizations of all sizes and types:

  • Hospitals and health systems
  • Outpatient clinics and medical practices
  • Pharmaceutical companies
  • Medical device manufacturers
  • Health insurance companies and TPAs
  • Clinical laboratories and diagnostic centers
  • Telehealth platforms
  • Medical research institutions

This figure likely represents significant underreporting, as:

  • Many organizations don't detect breaches promptly
  • Some incidents are resolved without public disclosure
  • Private practices and smaller clinics often lack reporting obligations
  • International incidents may not reach Health-ISAC's tracking systems

The Most Active Threat Actors

The report identifies three ransomware groups as particularly prolific in healthcare targeting:

Qilin Ransomware

Profile:
Russian-speaking ransomware-as-a-service (RaaS) operation active since mid-2022, known for:

  • Sophisticated double extortion tactics
  • Targeting of large healthcare systems with capacity to pay substantial ransoms
  • Rapid encryption using modern cryptographic techniques
  • Professional negotiation tactics and leak site management

Notable Healthcare Attacks:

  • Synnovis (UK pathology services provider, June 2024): Disrupted blood testing across multiple London hospitals, forcing postponement of thousands of procedures
  • Octapharma Plasma (2024): Compromised blood plasma provider, affecting supply chain

Why Healthcare?
Qilin specifically targets organizations where operational disruption creates maximum pressure. Healthcare's inability to tolerate downtime makes it an ideal target.

INC Ransom

Profile:
Relatively newer operation (emerged 2024) that has rapidly built a substantial healthcare portfolio through:

  • Aggressive targeting of mid-sized healthcare organizations
  • Exploitation of known vulnerabilities in medical devices and healthcare IT systems
  • Focus on regional hospital systems and specialty practices

Tactics:

  • Initial access through phishing and compromised credentials
  • Rapid lateral movement to identify and prioritize clinical systems
  • Exfiltration of both patient data (for extortion) and operational data (to demonstrate impact)

SAFEPAY Ransomware

Profile:
Lesser-known group with specific focus on financial disruption:

  • Targets healthcare billing and revenue cycle systems
  • Demands ransoms tied to organizational revenue
  • Threatens exposure of billing records and patient financial data
Covenant Health Cyberattack: A Comprehensive Analysis of the 2025 Data Breach
Executive Summary In May 2025, Covenant Health, a Catholic healthcare organization serving New England and parts of Pennsylvania, became the victim of a sophisticated ransomware attack orchestrated by the Qilin cybercriminal group. The attack, which began on May 18 and was first detected on May 26, 2025, compromised sensitive personal

Impact:
Beyond operational disruption, SAFEPAY attacks can cripple healthcare organization finances by:

  • Preventing claim submission to insurers
  • Exposing patient payment information
  • Disrupting accounts receivable collections

Why Healthcare Is Target #1

The report emphasizes that healthcare targeting is no accident:

1. Maximum Pressure to Pay
When ICU monitors stop working, operating rooms go offline, or EHRs become inaccessible, patient lives are at immediate risk. This creates enormous pressure to pay ransoms quickly rather than endure lengthy recovery processes.

2. High-Value Data
Healthcare records are worth 10-50x more than credit card numbers on dark web markets because they enable:

  • Medical identity theft (obtaining prescriptions, procedures, insurance benefits)
  • Insurance fraud
  • Blackmail (sensitive diagnoses, treatments, conditions)
  • Targeted phishing based on medical conditions

3. Limited Security Maturity
Healthcare organizations face unique security challenges:

  • Legacy medical devices that cannot be patched
  • Complex interconnected systems (EHR, billing, imaging, pharmacy, etc.)
  • 24/7 operations preventing maintenance windows
  • Limited IT security budgets compared to financial services or technology sectors
  • Shortage of healthcare-specific security expertise

4. Regulatory Pressure
HIPAA and international equivalents create compliance obligations that make data breaches particularly painful, forcing organizations to:

  • Notify affected patients
  • Offer credit monitoring
  • Face potential regulatory fines
  • Manage reputational damage

5. Supply Chain Complexity
Modern healthcare depends on:

  • Electronic health record vendors (Epic, Cerner/Oracle, Meditech)
  • Medical device manufacturers (GE Healthcare, Philips, Siemens)
  • Revenue cycle management companies
  • Clinical laboratories
  • Imaging centers
  • Pharmacy benefit managers
  • Telehealth platforms

Each vendor represents a potential entry point to multiple downstream healthcare organizations.

Star Health Insurance’s Chief Information Security Officer (CISO) allegedly selling customer data to a hacker
The case involving Star Health Insurance’s Chief Information Security Officer (CISO) allegedly selling customer data to a hacker highlights one of the most dangerous types of insider threats—privileged access abuse. According to reports, the hacker claimed that the CISO was involved in selling over 7.24 terabytes of

Supply Chain Compromise: The Multiplier Effect

The Health-ISAC report emphasizes growing exploitation of third-party suppliers as a force multiplier for attackers:

"The findings reinforce a critical reality: even organizations with strong internal security may remain vulnerable through a partner, platform, managed service provider, or widely used software solution."

Why Supply Chain Attacks Work

Access at Scale
Instead of attacking 100 hospitals individually, attackers compromise one EHR vendor or MSP with access to all 100, gaining:

  • Simultaneous access to multiple targets
  • Trusted relationships that bypass security controls
  • Deep knowledge of target systems from vendor access
  • Ability to deploy malware disguised as legitimate updates

Reduced Detection Risk
Vendor access appears legitimate:

  • Security tools expect vendor connections
  • Vendor actions don't trigger anomaly alerts
  • Lateral movement looks like normal vendor activity
  • Data exfiltration can be disguised as vendor data synchronization

Shared Vulnerabilities
Vendors often deploy similar configurations across customers:

  • Same software versions with same vulnerabilities
  • Standard access methods (VPN, remote desktop, API keys)
  • Common security control gaps
  • Predictable network architectures

Recent Healthcare Supply Chain Incidents

Change Healthcare / UnitedHealth Group (2024)
Perhaps the most devastating healthcare cyberattack in history:

  • BlackCat/ALPHV ransomware group compromised Change Healthcare, a subsidiary of UnitedHealth Group
  • Change Healthcare processes ~15 billion healthcare transactions annually
  • Attack disrupted prescription processing, claims submissions, and payment processing across thousands of healthcare organizations
  • Estimated impact: $872 million in costs for UnitedHealth, far greater for affected provider organizations
  • Demonstrated catastrophic risk of concentration in healthcare infrastructure

Synnovis (June 2024)

  • Qilin ransomware compromised UK pathology services provider
  • Disrupted blood testing services across multiple London hospitals
  • Forced postponement of thousands of surgical procedures and cancer treatments
  • Took months to fully restore services

Octapharma Plasma

  • Qilin compromise affected blood plasma provider
  • Supply chain implications for hospitals dependent on plasma products

Philips Respironics (ongoing)
While not a ransomware attack, the massive recall and security vulnerabilities in Philips sleep apnea devices demonstrate healthcare supply chain fragility

These incidents underscore a terrifying reality: a single vendor compromise can cascade across the entire healthcare ecosystem.

The Evolution of Social Engineering: Beyond Traditional Phishing

The Health-ISAC report highlights sophisticated deception tactics that render traditional security awareness training increasingly obsolete:

QR Code Phishing (Quishing)

How It Works:

  • Attackers send emails or physical mail containing malicious QR codes
  • Victims scan codes with personal smartphones
  • Codes redirect to credential harvesting sites, malware downloads, or payment scams
  • Bypasses email security controls that scan links but not images

Why Healthcare Is Vulnerable:

  • COVID-19 normalized QR code usage for patient check-in, vaccine verification, etc.
  • Healthcare workers frequently use personal devices for convenience
  • Medical environments often require quick scanning of patient wristbands, medication, etc.—creating "scan fatigue"

Example Attack:
Employee receives email claiming to be from HR regarding benefits enrollment. QR code appears to link to benefits portal. Employee scans code with personal phone. Site harvests hospital network credentials. Attacker uses credentials to access EHR from outside network.

Securing Health and Wellbeing: Navigating Breaches in the Pharmaceutical and Healthcare Industry
Introduction: The Pharmaceutical and Healthcare industry plays a vital role in advancing medical research and providing critical healthcare services to people worldwide. However, the industry’s digital transformation and reliance on interconnected systems have also exposed it to cybersecurity risks. Breaches in the Pharmaceutical and Healthcare sector can have far-reaching consequences,

ClickFix Attacks

How It Works:

  • Malicious websites or emails present fake error messages (e.g., "Your browser needs an update" or "Plugin required to view document")
  • User clicks "Fix" button or downloads "required" plugin
  • Click installs malware, ransomware, or info-stealer

Why It Bypasses Traditional Training:

  • Doesn't follow typical phishing patterns (spelling errors, urgency, suspicious links)
  • Appears to be legitimate technical requirement
  • Exploits users' desire to complete tasks quickly

Healthcare Example:
Physician receives email with lab results attachment. Clicking attachment displays message: "PDF viewer plugin required. Click to install." Doctor, focused on patient care, clicks install. Ransomware deploys across hospital network.

FileFix Attacks

How It Works:

  • Similar to ClickFix but focuses on document "corruption"
  • Users receive documents that appear to be corrupted or unreadable
  • Error message offers to "repair" or "recover" file
  • Repair process installs malware

Healthcare Context:
Medical imaging files (DICOM), lab results (HL7), or EHR exports often have compatibility issues. Healthcare workers are accustomed to file format problems and may readily click "fix" buttons to access patient data.

Why These Tactics Work Against Healthcare

1. Time Pressure
Healthcare environments operate under constant time pressure. Staff need to access patient information immediately, creating urgency that undermines security caution.

2. Complexity of Healthcare IT
With dozens of different systems, frequent compatibility issues, and regular updates, healthcare workers expect technical problems and "fix" prompts.

3. Patient Care Prioritization
When security creates friction for patient care, healthcare workers find workarounds—often including clicking through security warnings.

4. BYOD and Personal Device Use
Healthcare workers frequently use personal smartphones for convenience, bypassing enterprise security controls.

5. Traditional Training Ineffectiveness
Standard "don't click suspicious links" training doesn't address:

  • QR codes that bypass link scanning
  • Fake technical error messages
  • Attacks delivered via legitimate platforms (SharePoint, DocuSign, etc.)
Yale New Haven Health Settles for $18 Million Following Massive 5.6 Million Patient Data Breach
Connecticut’s largest healthcare system reaches preliminary settlement in class action lawsuit after sophisticated March 2025 cyberattack Executive Summary In one of the most significant healthcare data breach settlements of 2025, Yale New Haven Health System (YNHHS) has agreed to pay $18 million to resolve class action litigation stemming from a

The AI Threat: 2026's Emerging Crisis

Health-ISAC's survey of 250 health executives and cybersecurity professionals revealed growing concern around AI-enabled tactics, with 66% anticipating significant AI impact on cybersecurity in 2026—yet only 37% report having processes to assess AI tool security before deployment.

This gap between recognition and preparation could prove catastrophic.

AI-Powered Threat Capabilities

1. Automated Vulnerability Discovery
AI can:

  • Scan healthcare organizations' external attack surfaces at scale
  • Identify vulnerable medical devices, VPN concentrators, web applications
  • Prioritize targets based on likely value and exploitability
  • Generate custom exploits for identified vulnerabilities

2. Adaptive Malware
Machine learning enables malware that:

  • Modifies behavior based on environment (evading sandboxes, signature detection)
  • Learns from failed attempts and adjusts tactics
  • Identifies high-value systems and prioritizes them
  • Mimics legitimate traffic patterns to avoid detection

3. Deepfake Social Engineering
Generative AI enables:

  • Voice cloning of hospital executives for phone-based attacks (e.g., CFO calling to authorize wire transfers)
  • Video deepfakes for virtual meetings (e.g., "CEO" on Zoom call requesting privileged access)
  • Personalized phishing at scale using data scraped from social media, hospital websites, etc.

4. AI-Powered Reconnaissance
Large language models can:

  • Process massive amounts of open-source intelligence (OSINT)
  • Identify employees, their roles, relationships, and communication patterns
  • Generate organizational charts and decision-making structures
  • Craft perfectly tailored spear-phishing based on individual targets

5. Automated Attack Orchestration
AI can manage complex multi-stage attacks:

  • Coordinate simultaneous exploitation of multiple systems
  • Adapt in real-time to defender responses
  • Optimize timing and sequencing of attack phases
  • Manage dozens or hundreds of concurrent campaigns

Healthcare-Specific AI Threat Scenarios

Scenario 1: The AI-Powered Physician Impersonation

  • Attackers use publicly available physician information (credentials, specialties, publications)
  • AI generates deepfake video call appearing to be attending physician
  • "Physician" calls pharmacy requesting urgent medication change for critical patient
  • Pharmacy, trusting voice and visual identification, makes change
  • Patient receives incorrect medication
Cyberattacks on Major Healthcare Systems: Ascension Health, Corewell Health, and McLaren Health
In recent years, healthcare systems have become prime targets for cyberattacks, with significant incidents affecting major providers like Ascension Health, Corewell Health, and McLaren Health. These attacks have disrupted operations, compromised patient data, and highlighted vulnerabilities in the healthcare sector’s cybersecurity infrastructure. Ascension Health’s 2024 Ransomware Attack In May 2024,

Scenario 2: EHR Data Poisoning

  • Attackers compromise AI-powered clinical decision support system
  • Inject malicious training data causing system to:
    • Recommend dangerous drug combinations
    • Miss critical diagnoses in medical imaging
    • Suggest incorrect treatment protocols
  • Errors appear to be AI mistakes rather than malicious attacks

Scenario 3: Automated Mass Exploitation

  • AI scans entire health system's medical device inventory
  • Identifies vulnerable insulin pumps across multiple hospitals
  • Generates custom exploits for each device type
  • Deploys ransomware simultaneously to all vulnerable devices
  • Demands ransom with threat to manipulate insulin dosages

Scenario 4: The AI Social Engineer

  • LLM scrapes LinkedIn, hospital websites, medical journals to build detailed employee profiles
  • Generates personalized phishing campaigns for 1,000+ employees
  • AI engages in conversational email exchanges, adapting to responses
  • Human attackers only become involved after AI secures credentials or access
The Surge in Healthcare Data Breaches: August 2023 in Review
Introduction The healthcare sector has always been a prime target for cybercriminals due to the sensitive nature of the data it holds. August 2023 witnessed a concerning surge in healthcare data breaches, exposing the protected health information of millions. This article delves into the details of these breaches, their causes,

Why Healthcare Is Particularly Vulnerable to AI Threats

1. Medical Device Legacy
Many medical devices run outdated operating systems and cannot be easily patched:

  • Windows XP and Windows 7 still common
  • Proprietary systems with no available updates
  • Vendor support ended years ago
  • "If it works, don't touch it" mentality in clinical engineering

AI-powered vulnerability scanning can rapidly identify these devices and exploit known vulnerabilities at scale.

2. Complex Trust Relationships
Healthcare requires rapid trust decisions:

  • Emergency situations demand fast credentialing
  • Multiple healthcare organizations share patient data
  • Physicians work across multiple hospitals
  • Telehealth involves remote consultations with providers patient has never met

AI-powered impersonation exploits this necessary trust.

3. High-Consequence Errors
In financial services, fraud controls can catch and reverse unauthorized transactions. In healthcare, a medication error or missed diagnosis can kill a patient before the mistake is discovered.

4. Adoption Without Security
The survey finding that only 37% of health organizations have processes to assess AI tool security before deployment is alarming. Healthcare is rushing to adopt:

  • AI-powered diagnostics
  • Clinical decision support systems
  • Administrative automation
  • Chatbots for patient interaction

Without adequate security assessment, these tools become attack vectors.

What Healthcare Organizations Must Do

Immediate Priorities

1. Ransomware-Specific Preparedness

  • Offline, immutable backups that cannot be encrypted by attackers
  • Regular backup testing to verify restoration capability
  • Incident response playbooks specifically for ransomware
  • Tabletop exercises simulating ransomware scenarios

2. Supply Chain Risk Management

  • Inventory all third-party connections to your environment
  • Assess security posture of critical vendors
  • Contractual security requirements with teeth (e.g., liability for breaches)
  • Network segmentation to limit vendor access to only necessary systems
  • Continuous monitoring of vendor access and activity
The Five-Year Blind Spot: How Healthcare’s Insider Threats Go Undetected
Jackson Health System’s shocking revelation exposes a trusted employee who accessed 2,000+ patient records for personal gain over five years On June 6, 2025, Jackson Health System disclosed what may be one of the most troubling healthcare data breaches of the decade—not because of its scale, but because

3. Enhanced Detection

  • Deploy AI-powered SIEM to detect anomalous behavior
  • User and Entity Behavior Analytics (UEBA) to identify compromised accounts
  • Network traffic analysis to spot lateral movement
  • Endpoint detection and response (EDR) on all systems, including medical devices where feasible

4. Medical Device Security

  • Asset inventory of all connected medical devices
  • Vulnerability assessment identifying devices with known exploits
  • Network isolation for high-risk devices (e.g., separate VLAN for infusion pumps)
  • Vendor accountability demanding security patches and support

5. Advanced Security Awareness

  • Quishing education on QR code risks
  • ClickFix and FileFix awareness training on fake error messages
  • Deepfake awareness for executives and high-value targets
  • Simulated attacks using these new techniques to test effectiveness

Strategic Transformation

1. Zero Trust Architecture
Healthcare must move from perimeter-based security to zero trust:

  • Continuous verification of all access requests
  • Least privilege access controls
  • Micro-segmentation to limit lateral movement
  • Assume breach and design for containment

2. AI Security Governance
Before deploying AI tools:

  • Security assessment by qualified professionals
  • Vendor security documentation review
  • Data handling evaluation (where does AI send data?)
  • Adversarial testing (can the AI be manipulated?)
  • Ongoing monitoring for anomalous AI behavior

3. Insider Threat Program
Given Everest and other groups' insider recruitment:

  • Behavioral monitoring for unusual data access
  • Privileged access management with extensive logging
  • Anonymous reporting mechanisms for suspicious activity
  • Regular background re-checks for high-risk positions
Fortinet Under Fire: How Firewall Vulnerabilities Are Devastating Healthcare and Critical Infrastructure
A comprehensive analysis of Fortinet’s exploitation crisis and why hospitals keep getting hit Executive Summary While the cybersecurity world focused on SonicWall’s troubles, Fortinet products have quietly become one of the most frequently exploited attack vectors in modern ransomware campaigns—with healthcare bearing the brunt of the damage. With 20

4. Business Continuity Beyond IT
Healthcare's digital dependence requires:

  • Downtime procedures for all clinical systems
  • Paper-based backup protocols (yes, really)
  • Alternative care coordination methods
  • Communication systems that don't rely on compromised infrastructure

5. Cyber Insurance with Healthcare Expertise
Standard cyber insurance often doesn't address healthcare-specific risks:

  • Business interruption calculations that account for patient diversions
  • Malpractice exposure from cyber incidents affecting care
  • Regulatory defense for HIPAA and state law violations
  • Crisis management for patient communication and media relations

Regulatory and Policy Priorities

1. Mandatory Minimum Security Standards
Healthcare needs sector-specific security requirements:

  • Baseline controls all organizations must implement
  • Medical device security standards
  • Supply chain security requirements
  • Regular security assessments and audits

2. Information Sharing Incentives
Organizations need safe harbor to share threat intelligence:

  • HIPAA-compliant information sharing
  • Protection from liability for good-faith sharing
  • Government-facilitated ISACs and ISAOs
  • Real-time threat feeds

3. Vendor Accountability
Legislation should:

  • Require security by design for medical devices
  • Mandate long-term security support (10+ years)
  • Create liability for vendors who ship insecure products
  • Establish certification programs for healthcare IT vendors

4. Workforce Development
Healthcare cybersecurity shortage is critical:

  • Scholarships and training programs
  • Career pathways from clinical to security roles
  • Competitive compensation for healthcare security professionals
  • Public-private partnerships for training

Survey Findings: What Healthcare Leaders Worry About

Health-ISAC's survey of nearly 250 health executives and cybersecurity professionals revealed:

Israeli Nursing Homes Under Siege: Latest Cyberattack Reveals Escalating Threats to Healthcare Infrastructure
November 28, 2025 — Israeli nursing homes have become the latest victims in an escalating wave of cyberattacks targeting the nation’s healthcare sector, according to a Thursday announcement from the National Cyber Directorate. The attack, which compromised computer services used by multiple nursing facilities and private companies, has triggered a coordinated

Top Concerns for 2026

1. Ransomware (Ranked #1)
No surprise given 455 incidents in 2025. Healthcare leaders recognize this is an existential threat.

2. Phishing (Ranked #2)
Despite years of awareness training, phishing remains the primary initial access vector.

3. Third-Party Compromise (Ranked #3)
Supply chain risk awareness has dramatically increased post-Change Healthcare.

4. Exploitation of Newly Discovered Software Flaws (Ranked #4)
Zero-day and newly disclosed vulnerabilities create patch windows attackers exploit.

5. AI-Enabled Tactics (Growing Concern)
66% anticipate significant AI impact on cybersecurity, but only 37% have AI security assessment processes.

The Preparation Gap

The disconnect between concern and preparation is alarming:

66% expect AI will significantly impact cybersecurity
37% have processes to assess AI security before deployment
29% gap between awareness and action

This 29-point preparation deficit suggests many healthcare organizations will deploy AI tools without adequate security assessment, creating vulnerabilities that attackers will inevitably exploit.

Conclusion: An Existential Moment for Healthcare Cybersecurity

The Health-ISAC 2026 Report arrives at a pivotal moment. Healthcare organizations face a perfect storm:

  • Escalating threats: 455 ransomware attacks, sophisticated supply chain compromises, AI-powered tactics
  • Inadequate defenses: Legacy medical devices, limited security budgets, workforce shortages
  • Life-or-death consequences: Cyberattacks that kill patients, disrupt clinical care, and undermine public trust in healthcare systems

Errol Weiss's statement bears repeating:

"Cyber threats are no longer isolated events. They represent life-saving business continuity crises that can impact patient care, staff safety, and public trust."

This is the reality: cyberattacks on healthcare kill people. The Change Healthcare attack disrupted cancer treatments. The Synnovis attack forced postponement of surgeries. Future attacks will cause deaths directly attributable to cyber incidents.

Healthcare cybersecurity is no longer an IT problem or a compliance checkbox—it's a patient safety imperative that demands board-level attention, executive commitment, and substantial investment.

The question facing every healthcare CEO, CFO, and board member is stark: Will you make cybersecurity a strategic priority now, before patients die from a preventable cyberattack? Or will you be explaining to grieving families, regulators, and prosecutors why you didn't act when the warnings were clear?

The Health-ISAC report has provided the warning. What happens next is up to healthcare leadership.

UK Cyber Security Crisis 2025: The Year of Retail Ransomware and Healthcare Havoc
A comprehensive analysis of the cyber attacks, ransomware incidents, and data breaches that have defined the UK’s cyber security landscape in 2025 Executive Summary 2025 has proven to be a watershed year for cyber security in the United Kingdom, marked by an unprecedented surge in sophisticated attacks that have crippled

About This Analysis
This report is published by CISO Marketplace, providing healthcare security leaders with actionable intelligence and strategic guidance for protecting patient care in an era of escalating cyber threats.

Sources:

  • Health-ISAC 2026 Global Health Sector Threat Landscape Report
  • Health-ISAC (Health Information Sharing and Analysis Center)
  • Survey of 250 healthcare executives and cybersecurity professionals
  • Errol Weiss, Chief Security Officer, Health-ISAC

For More Information:
Health-ISAC: https://h-isac.org
Report Access: Contact Health-ISAC for full report details

Read more

Operation Leak: FBI and Global Partners Dismantle LeakBase, One of the World's Largest Cybercriminal Data Forums

Operation Leak: FBI and Global Partners Dismantle LeakBase, One of the World's Largest Cybercriminal Data Forums

March 4, 2025 — In one of the most sweeping international cybercrime enforcement actions of the year, the Federal Bureau of Investigation, Europol, and law enforcement agencies spanning 14 countries have dismantled LeakBase — a massive open-web forum where cybercriminals bought, sold, and traded stolen data from breaches targeting American corporations, individuals,

By Breached Company