Connect with us

Hi, what are you looking for?

Business

Cybersecurity Breaches in Hospitals Endanger Patient Lives

Cybersecurity vulnerabilities in operational technology (OT) devices pose significant risks to hospitals, threatening not only data security but also patient safety. Recent findings highlight critical flaws in devices from major manufacturers like Siemens and Advantech. These devices, essential for monitoring and treatment, are increasingly targeted by cybercriminals.

A recent analysis revealed vulnerabilities in Siemens imaging and control systems that could allow unauthorized access or disrupt operations. Similarly, Advantech’s industrial platforms contain vulnerabilities that could enable remote code execution. Such weaknesses are alarming since these devices are integral to patient care, forming a network crucial for monitoring and medical imaging.

Impact of Cyber Attacks on Healthcare Operations

The consequences of compromised OT devices can be dire. During the DCH Health ransomware attack, ambulances were rerouted from critical care patients, illustrating how cyber incidents can directly affect emergency services. The CommonSpirit incident delayed treatments across multiple states, undermining trust in healthcare systems.

Healthcare remains a prime target for cybercriminals. According to the Picus Blue Report, even healthcare organizations employing multiple layers of security still face detection and prevention gaps. Systems meant to monitor internal network traffic often fail to detect lateral movements, allowing attackers to move from compromised OT devices to sensitive electronic health record systems.

Several factors contribute to the heightened vulnerability of healthcare environments. Many OT devices operate on outdated software that cannot be easily updated without disrupting clinical services. This was notably evident during the WannaCry attack on the NHS, where legacy systems posed significant challenges.

The long lifespan of medical equipment, such as MRI machines, can often extend beyond typical IT refresh cycles, complicating security efforts. Additionally, interconnected clinical and administrative systems create pathways for attackers, making it easier to access sensitive data once a device is compromised. Operational constraints in healthcare further complicate these issues, as taking devices offline for updates may jeopardize patient care.

Rethinking Cybersecurity Strategies in Healthcare

Given these challenges, healthcare Chief Information Security Officers (CISOs) must adopt a new approach to managing cyber risks. Traditional methods of patching every vulnerability are insufficient. Instead, organizations should focus on continuous validation and risk-based prioritization in their cybersecurity strategies.

Continuous validation involves simulating real-world attacks to identify exploitable vulnerabilities within the network. The Picus Exposure Validation research indicates that less than 2% of vulnerabilities classified as high or critical are actually exploitable in specific environments. This insight allows security teams to concentrate resources on vulnerabilities that pose genuine risks.

Prioritization based on context is equally essential. Not every identified vulnerability requires immediate action. For example, a flaw in a device used in an isolated lab may not be as pressing as a vulnerability in critical patient monitoring software. By assessing the importance of assets and existing controls, hospitals can allocate resources more effectively.

In situations where patching is not feasible, alternative mitigations should be implemented. Updated intrusion prevention rules or enhanced endpoint detection signatures can provide temporary protection, allowing healthcare organizations to manage risks without compromising patient safety.

Continuous testing of resilience is vital. Regular simulations and red/blue team exercises can reveal vulnerabilities that standard security scans might miss. Mapping potential attack pathways across OT and IT networks helps hospitals identify and address weak points before they can be exploited.

Collaboration with clinical and operational leaders is crucial for fostering security awareness. CISOs should ensure that security measures align with patient care objectives. Transparent reporting, including exposure scores, can facilitate understanding and support for cybersecurity initiatives.

Healthcare security leaders operate under considerable pressure, facing budget constraints and complex regulatory requirements. By focusing on reducing actual risks and ensuring continuity of care, organizations can enhance their defenses against cyber threats. Implementing continuous validation, context-aware prioritization, and multi-layered security measures can significantly lower exposure, improve patient safety, and reinforce trust.

In the high-stakes environment of healthcare, prompt action is essential. Every moment that systems are down can have serious implications for patient lives. By modernizing vulnerability management and securing OT devices, hospitals can better protect not just their operations but also the well-being of their patients.

Sıla Özeren is an associate security research engineer at Picus Security. She holds an MSc in cryptography from the Institute of Applied Mathematics at METU, where she focused her thesis on the CRYSTALS-Kyber algorithm and its implementations.

You May Also Like

Technology

Tesla (TSLA) recently reported a year-over-year drop in second-quarter deliveries, yet the market responded with optimism, pushing the stock up by 5%. This unexpected...

Health

The All England Lawn Tennis Club in London experienced its hottest-ever opening day on Monday, as the prestigious Wimbledon tournament kicked off under unprecedented...

Technology

In a bold reimagining of the DC Universe, director James Gunn has introduced a significant narrative element in his latest film, which reveals that...

Entertainment

A new documentary series titled “Animals on Drugs” is set to premiere on the Discovery Channel on July 28, 2023. The three-part series follows...

Science

Look out, daters: a new toxic relationship trend is sweeping through the romantic world, leaving many baffled and heartbroken. Known as “Banksying,” this phenomenon...

Technology

Former Speaker of the House Nancy Pelosi has recently made headlines with her latest investment in the tech sector. According to official filings, she...

Entertainment

Netflix’s eagerly anticipated talent competition Building the Band is set to premiere on July 9, promising an emotional journey for viewers. This series, centered...

Sports

The Chicago Cubs will enter the National League Wild Card Series following a disappointing sweep by the Cincinnati Reds this week. This outcome not...

Entertainment

tvN’s new series, Bon Appétit, Your Majesty, has quickly captured the spotlight, dominating the buzzworthy rankings for dramas and actors this week. In its...

Politics

On August 29, 2023, U.S. Attorney General Pamela Bondi announced the immediate termination of a Department of Justice (DOJ) employee due to inappropriate conduct...

World

The first dose of the hepatitis B vaccine is recommended at birth, a practice that has come under scrutiny following recent comments by Health...

Technology

The answer to today’s NYT Wordle, dated August 8, 2025, is the verb IMBUE. This word, which means “to fill or saturate,” features three...

World

NATO has introduced a new language manual advising its personnel to adopt gender-inclusive terms, sparking considerable debate. The manual suggests replacing traditional terms like...

Entertainment

The upcoming premiere of the documentary Color Beyond the Lines will shed light on the critical fight for school desegregation in Western North Carolina....

Business

The city of New Orleans is exploring options for enhanced public safety through potential federal assistance, particularly in collaboration with the Louisiana National Guard....

Sports

ZAGREB, Croatia — A concert by Marko Perkovic, a right-wing Croatian singer known for his controversial views, attracted tens of thousands of fans to...

Copyright © All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site.