Supply chain attacks were experienced by 68% of healthcare workers

Published:

spot_img

Impact of Cybersecurity Incidents on Healthcare Organizations: Findings from Proofpoint Report

A recent Proofpoint report sheds light on the detrimental impact of cybersecurity incidents on healthcare organizations, revealing alarming statistics. According to the report, 92% of healthcare organizations surveyed have fallen victim to at least one cyber attack in the past year, causing disruptions to patient care in 69% of cases.

The most common types of attacks experienced by these organizations include cloud compromise, ransomware, supply chain attacks, and business email compromise (BEC). Shockingly, 56% reported poor patient outcomes due to delays in procedures and tests, 53% saw an increase in medical procedure complications, and 28% reported an increase in patient mortality rates.

Supply chain attacks emerged as the primary concern for healthcare organizations, with 68% of respondents experiencing such attacks and 82% reporting disruptions to patient care as a result. Among the various types of attacks, BEC was found to be the most likely to result in delayed procedures and tests, followed by ransomware which also led to longer hospital stays and patient transfers.

The report also highlights the growing concern over insecure mobile apps (eHealth) as the top cybersecurity threat in healthcare, with cloud compromise being the second biggest concern. Additionally, data loss and exfiltration incidents involving sensitive patient data have become increasingly common, with employees being identified as the primary root cause in many cases.

Despite efforts to address cybersecurity risks through training and the use of AI technology, healthcare organizations continue to struggle with inadequate expertise and clear leadership in this area. With the increasing sophistication of cyber threats, it is evident that more needs to be done to safeguard patient data and ensure uninterrupted delivery of healthcare services.

spot_img

Related articles

Recent articles

Tailored Tech Support Scams Launch Customized Havoc on Organizations

Growing Cyber Threats: Fake IT Support and the Havoc C2 Framework Emerging Threats in Cybersecurity Recent investigations by threat hunters have unveiled a concerning trend: cybercriminals...

ES-KO at 70: Celebrating Seven Decades of Excellence in Catering, Logistics, and Facility Management in Tough Environments

ES-KO: Celebrating 70 Years of Excellence in Catering and Facility Management ES-KO, a prominent player in the fields of catering, facility management, procurement, and...

Escalating Cyber Warfare: Iran, US, and Israel Clash on Military and Digital Battlegrounds

The Evolution of Warfare: Understanding the Hybrid Conflict in the Middle East Introduction to Hybrid Warfare In recent months, the Middle East has witnessed a significant...

70% of Online Fraud Linked to Fake Trading Apps; Maharashtra, UP, and Rajasthan Identify as Mule Account Hotspots

The Rise of Online Investment Scams in India A Shift in Cybercrime Tactics In recent times, the landscape of online fraud has dramatically changed, reflecting a...