Quarter of Healthcare Organizations Halted Operations After Ransomware Attacks

Fifty-seven percent of global organizations admit being compromised by ransomware over past three years.

By HFT Staff


Eighty-six percent of global healthcare organizations (HCOs) that have been compromised by ransomware suffered operational outages, according to Trend Micro Inc. 

Fifty-seven percent of global HCOs admit being compromised by ransomware over the past three years, according to the study. Of these organizations, 25 percent say they were forced to halt operations, while 60 percent reveal that some business processes were impacted as a result. 

On average, it took most responding organizations days (56 percent) or weeks (24 percent) to fully restore these operations. 

Ransomware is not only causing the healthcare sector significant operational pain. Sixty percent of responding HCOs say sensitive data was also leaked by their attackers, potentially increasing compliance and reputational risk, as well as investigation, remediation and clean-up costs. 

Respondents to the study also highlight these supply chain weaknesses as a key challenge: 

  • Forty-three percent of respondents say their partners have made them a more attractive target for attack. 
  • Forty-three percent say a lack of visibility across the ransomware attack chain has made them more vulnerable. 
  • Thirty-six percent say a lack of visibility across attack surfaces has made them a bigger target. 

The good news is that most (95 percent) HCOs say they regularly update patches, while 91 percent restrict email attachments to mitigate malware risk. Many also use detection and response tools for their network endpoint and across multiple layers. 

However, the study also highlights potential weaknesses, including: 

  • Seventeen percent do not have any remote desktop protocol controls in place. 
  • Many HCOs do not share any threat intelligence with partners (30 percent), suppliers (46 percent) or their broader ecosystem (46 percent). 
  • Thirty-three percent do not share any information with law enforcement. 
  • Worryingly few respondents can detect lateral movement (32 percent), initial access (42 percent) or use of tools like Mimikatz and PsExec (46 percent). 


November 7, 2022


Topic Area: Information Technology , Security


Recent Posts

Seeking Standards for Microbial Loads in Healthcare Facilities

Why is there no binding standard for the acceptable microbial load on surfaces or in the air in hospitals?


UCR Health Unveils Plans for Major Expansion

The vision for the site will include an outpatient diagnostic center and possible future expansion.


High-Performance Windows Support Safety at UW Medicine's New Behavioral Health Center

Case study: Engineered for strength, quiet and daylight, the chosen windows help create a safe, calming and energy-efficient environment for patients and providers.


Central Maine Healthcare Dealing with IT System Outage

The organization identified unusual activity within their computer software, prompting them to secure and shut off all IT systems.


Kaiser Permanente Opens Newly Expanded Everett Medical Center

The facility offers primary care and pediatric care and has specialty care departments.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

 
 
 
 

Healthcare Facilities Today membership includes free email newsletters from our facility-industry brands.

Facebook   Twitter   LinkedIn   Posts

Copyright © 2023 TradePress. All rights reserved.