As Ransomware Attacks Surge, Healthcare Must Look Beyond Compliance to Establish a Cyber Risk Mindset
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我先看看这篇文章讲的是什么。 文章主要讲的是美国医疗健康行业面临的网络安全危机。2024年2月Change Healthcare事件暴露了1.9亿患者记录,全国范围内的医疗运营也受到了影响。这表明医疗行业现在是网络攻击的第三大目标,去年勒索软件攻击增加了32%。而且,相关的网络保险索赔也在变得越来越严重,平均索赔金额从2024年的80万美元上升到2025年上半年的200万美元。 文章还提到合规并不等于安全。虽然超过一半的医疗领导者认为致命的网络攻击在未来五年内不可避免,但只有三分之一的人将其列为业务的主要担忧。医疗组织的复杂系统和高价值患者数据吸引了攻击者,而他们的网络安全策略过于依赖安全合规检查表,这些检查表并不能真正保护组织。 文章建议医疗行业需要超越基本要求,主动管理风险。有效的网络安全应该包括量化网络风险的战略性措施,而不是仅仅依赖静态的有效性指标。投资应该基于实际风险减少来评估,比如加强备份程序、培训员工防止人为错误、管理供应商风险等。 最后,文章强调合规只是迈向网络弹性的第一步,而不是终点。医疗行业需要改变策略以应对日益复杂的挑战。 好的,现在我需要把这些信息浓缩到100字以内。重点包括:美国医疗行业面临严重网络安全威胁、数据泄露事件、勒索软件攻击增加、保险索赔上升、合规不足、需主动风险管理等。 总结一下:美国医疗行业正面临严重的网络安全威胁。2024年Change Healthcare事件暴露了大量患者记录,并导致全国性运营中断。数据显示勒索软件攻击激增32%,相关保险索赔平均达200万美元。合规措施不足以保障安全,需加强风险管理以应对日益复杂的威胁。 </think> 美国医疗行业正面临严重的网络安全威胁。2024年Change Healthcare事件暴露了大量患者记录,并导致全国性运营中断。数据显示勒索软件攻击激增32%,相关保险索赔平均达200万美元。合规措施不足以保障安全,需加强风险管理以应对日益复杂的威胁。 2026-1-6 16:6:42 Author: securityboulevard.com(查看原文) 阅读量:7 收藏

The February 2024 Change Healthcare incident exposed 190 million patient records and disrupted healthcare operations nationwide, but it highlighted something far more concerning: the U.S. healthcare sector faces an unprecedented cybersecurity crisis. Healthcare is now the third most-targeted sector, experiencing a 32% surge in ransomware attacks last year. Cyber insurance claims tied to these incidents in healthcare are also becoming more severe. While we are still gathering data for the first half of 2025, early Resilience claims data is pointing upward with the average severity of cyber insurance claims topping $2 million, compared to an average of $800,000 in 2024.

Compliance Isn’t Security

Despite these major incidents making global headlines, there is still a clear gap in the sector’s own perceived cyber risk and the reality of its situation. More than half (52%) of healthcare leaders believe a fatal cyberattack is inevitable within five years, but only 33% of leaders list it as a primary concern for their business. The reality is that healthcare faces a perfect storm of cyber risk. Healthcare organizations host complex systems that can be hard to protect, and high-value patient data that attracts attackers. Their cybersecurity strategy overindexes on security compliance checklists that don’t actually keep organizations safe – this combination creates an environment that attackers can take advantage of.

As threats evolve and attacks become more frequent and harder to fight, reactive approaches and meeting compliance requirements cannot be considered effective on their own. While regulatory measures like HIPAA established baseline privacy protections, they weren’t designed for modern cyber threats.

Simply put, compliance is no longer a measure of security. Organizations must go beyond baseline requirements and manage their risk proactively, or they will remain vulnerable.

Effective healthcare cybersecurity takes many forms, but it should always require quantifying cyber risk strategically, rather than checking boxes using static measures of effectiveness. This type of approach moves security discussions from technical justifications and a checklist mentality to thoughtful investment decisions based on material risk. For example, understanding that a specific vulnerability could lead to a $5 million loss and a stall in a critical patient service can easily make the case for an investment in a system or process to ensure it is secure or backed up.

Reducing Risk Where It Matters Most

Cybersecurity investments should be evaluated based on their actual risk reduction, no matter how large or small a security budget might be. We often see healthcare organizations make meaningful improvements to their risk posture by focusing on comprehensive backup procedures for imaging files and databases, rigorous training to prevent human error, managing vendor risk, and quantifying cyber risk in financial terms.

Ensuring all critical systems and data are included in backup procedures is key to keeping essential operations running in case of an attack. These systems should be regularly tested to validate recovery capabilities and timeframes under realistic attack scenarios where primary systems are compromised. Human error, a significant vulnerability, should be mitigated through rigorous training programs that focus on identifying phishing and social engineering attempts and emphasize proper data handling to prevent accidental exposure of patient information.

Beyond internal measures, vendor risk management is crucial. Vendor-related vulnerabilities, exemplified by the Change Healthcare incident, represent a growing attack surface. Healthcare providers must continuously monitor the security of third-party vendors, as a single compromise can have a cascading effect across multiple organizations.

Building Cyber Resilience in Healthcare

While there is no one-size-fits-all approach for cybersecurity, organizations should adopt methods to quantify cyber risks based on their security profile and the crucial parts of their operation that must stay online to keep patients safe. This allows leadership to make data-driven investment decisions based on their own organization’s actual risk reduction. All these elements feed into a strong security plan that is regularly tested and accounts for the unique challenges of healthcare, such as patient safety and regulatory notification requirements.

Healthcare stands at a critical juncture. The Change Healthcare incident last year revealed how security challenges are growing more complex by the week. A change is needed in healthcare to stay ahead. Compliance is the first step in the journey to cyber resilience, not the destination.


文章来源: https://securityboulevard.com/2026/01/as-ransomware-attacks-surge-healthcare-must-look-beyond-compliance-to-establish-a-cyber-risk-mindset/
如有侵权请联系:admin#unsafe.sh