Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Risk management, legacy tech pose major threats to healthcare sector

By CIO Dive by By CIO Dive
July 16, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Dive Brief:

  • More than nine in 10 healthcare organizations experienced a cyberattack last year, and those attacks disrupted patient care at seven in 10 organizations, according to a report released Tuesday by managed security services provider Fortified Health Security.
  • Fortified’s report lists the aspects of the NIST Cybersecurity Framework where healthcare organizations have seen the most improvement, as well as areas that continue to pose serious risks.
  • The data helps illustrate why hospitals and other healthcare organizations remain top targets for ransomware criminals.

 

Dive Insight:

With healthcare facilities scrambling to identify and fix their top cyber risks, Fortified’s report provides some indications of where to begin.

According to the report, the five biggest security gaps among healthcare organizations are their lack of unified strategies for managing risks, lax attention to supply-chain vulnerabilities, a focus on installing new technology over maintaining legacy systems, incomplete asset inventories and poor employee training.

Major cyberattacks in recent years have illustrated how these risks are related. Weak supply-chain oversight is a particularly serious problem, given the interconnected nature of the healthcare ecosystem, including hospitals, pharmacies and speciality-care facilities. The 2024 Change Healthcare breach illustrated the industry’s dependence on a handful of obscure but ubiquitous vendors. Outdated asset inventories compound those vulnerabilities, making it more difficult to remediate the damage of a supply-chain attack. And those attacks often target the very legacy technologies that have been neglected in favor of new products.

While securing old systems remains a persistent challenge for healthcare organizations, Fortified also found that it represented the biggest area of improvement over the past year, followed by recovery process improvements, response planning, post-incident communications and threat analysis maturity.

Other areas of improvement included leadership engagement, maturity of risk assessments and identity management. The latter is particularly important given how many attacks begin with stolen or forged credentials.

Fortified’s report is based on its interactions with customers between 2023 and June 2025, including incident engagements and security scores based on the Cybersecurity Framework, according to a spokesperson. Fortified’s customers, all of which are in North America, range from rural community hospitals to large academic medical centers and integrated delivery networks, the spokesperson said.



Source link

By CIO Dive

By CIO Dive

Next Post
Four Trends Shaping the Professional Services Industry: New Insights Published by Info-Tech Research Group

Four Trends Shaping the Professional Services Industry: New Insights Published by Info-Tech Research Group

Recommended.

Глобальный финал конкурса Huawei ICT Competition 2024 – 2025 подвел итоги — ИИ расширяет возможности трансформации образования и развития талантов в сфере ИКТ

Глобальный финал конкурса Huawei ICT Competition 2024 – 2025 подвел итоги — ИИ расширяет возможности трансформации образования и развития талантов в сфере ИКТ

May 25, 2025
URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days

URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days

March 12, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio