Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Risk management, legacy tech pose major threats to healthcare sector

By CIO Dive by By CIO Dive
July 16, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Dive Brief:

  • More than nine in 10 healthcare organizations experienced a cyberattack last year, and those attacks disrupted patient care at seven in 10 organizations, according to a report released Tuesday by managed security services provider Fortified Health Security.
  • Fortified’s report lists the aspects of the NIST Cybersecurity Framework where healthcare organizations have seen the most improvement, as well as areas that continue to pose serious risks.
  • The data helps illustrate why hospitals and other healthcare organizations remain top targets for ransomware criminals.

 

Dive Insight:

With healthcare facilities scrambling to identify and fix their top cyber risks, Fortified’s report provides some indications of where to begin.

According to the report, the five biggest security gaps among healthcare organizations are their lack of unified strategies for managing risks, lax attention to supply-chain vulnerabilities, a focus on installing new technology over maintaining legacy systems, incomplete asset inventories and poor employee training.

Major cyberattacks in recent years have illustrated how these risks are related. Weak supply-chain oversight is a particularly serious problem, given the interconnected nature of the healthcare ecosystem, including hospitals, pharmacies and speciality-care facilities. The 2024 Change Healthcare breach illustrated the industry’s dependence on a handful of obscure but ubiquitous vendors. Outdated asset inventories compound those vulnerabilities, making it more difficult to remediate the damage of a supply-chain attack. And those attacks often target the very legacy technologies that have been neglected in favor of new products.

While securing old systems remains a persistent challenge for healthcare organizations, Fortified also found that it represented the biggest area of improvement over the past year, followed by recovery process improvements, response planning, post-incident communications and threat analysis maturity.

Other areas of improvement included leadership engagement, maturity of risk assessments and identity management. The latter is particularly important given how many attacks begin with stolen or forged credentials.

Fortified’s report is based on its interactions with customers between 2023 and June 2025, including incident engagements and security scores based on the Cybersecurity Framework, according to a spokesperson. Fortified’s customers, all of which are in North America, range from rural community hospitals to large academic medical centers and integrated delivery networks, the spokesperson said.



Source link

By CIO Dive

By CIO Dive

Next Post
Four Trends Shaping the Professional Services Industry: New Insights Published by Info-Tech Research Group

Four Trends Shaping the Professional Services Industry: New Insights Published by Info-Tech Research Group

Recommended.

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

October 22, 2025
Jensen Huang lauds China’s AI models as Nvidia gears up to resume chip exports

Jensen Huang lauds China’s AI models as Nvidia gears up to resume chip exports

July 16, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio