{"id":24461,"date":"2022-06-07T12:44:10","date_gmt":"2022-06-07T16:44:10","guid":{"rendered":"http:\/\/www.carecloud.com\/continuum\/?p=24461"},"modified":"2025-11-03T10:43:26","modified_gmt":"2025-11-03T10:43:26","slug":"top-cybersecurity-threats-healthcare-providers-should-be-aware-of","status":"publish","type":"post","link":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/","title":{"rendered":"Top Cybersecurity Threats Healthcare Providers Should be Aware of"},"content":{"rendered":"<p><span data-contrast=\"none\">If you have been paying attention to headlines over the last two years, then you should be fully aware of the increasing rate of cyberattacks impacting organizations across every sector, including government, technology, education, and healthcare, which unfortunately tends to be <\/span><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/2021-hph-cybersecurity-forecast.pdf\" rel=\"nofollow\"><span data-contrast=\"none\">one of the most targeted sectors.<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The reason for that is simple: healthcare organizations are typically very lucrative and handle a ton of high-value data, including patient records, proprietary information, and other sensitive personal health information (PHI) that can be stolen and leveraged.<\/span><\/p>\n<p><span data-contrast=\"none\"><a href=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/1.-stolen-medical-records.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-large wp-image-24463\" src=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/1.-stolen-medical-records-1024x427.jpg\" alt=\"\" width=\"1024\" height=\"427\" \/><\/a>Stolen medical records can be sold on the dark web for<\/span><a href=\"https:\/\/purplesec.us\/cyber-security-healthcare-statistics\/\" rel=\"nofollow\"><span data-contrast=\"none\"> as much as $1,000 per record<\/span><\/a><span data-contrast=\"none\">, making PHI an enticing target for cyber criminals, especially if a large enough system can be compromised. We\u2019re talking about large healthcare groups that hold records for millions of patients.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This is why healthcare organizations have the<\/span><span data-contrast=\"none\"> highest industry cost of a breach<\/span><span data-contrast=\"none\"> \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual <\/span><span data-contrast=\"none\">Cost of a Data Breach Report<\/span><span data-contrast=\"none\">, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks \u2013 an accolade the sector has claimed for 11 consecutive years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">A NOTE ABOUT HACKERS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Hackers \u2013 whether affiliated with a nation state or other organized crime groups \u2013 are opportunistic. They take advantage and pounce when your attention is diverted, which is why cyberattacks have increased since the start of the pandemic. Some 70% of hospitals, <\/span><a href=\"https:\/\/www.himss.org\/sites\/hde\/files\/media\/file\/2020\/11\/16\/2020_himss_cybersecurity_survey_final.pdf\" rel=\"nofollow\"><span data-contrast=\"none\">surveyed last November<\/span><\/a><span data-contrast=\"none\">, reported that they were the victim of a cyberattack within the last 12 months.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/2.-hospitals-targeted-by-cyber-criminal.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-24464\" src=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/2.-hospitals-targeted-by-cyber-criminal-1024x427.jpg\" alt=\"\" width=\"1024\" height=\"427\" \/><\/a><\/p>\n<p><span data-contrast=\"none\">The healthcare industry has been one of the heaviest targeted sectors since the beginning of the pandemic and, shockingly, cybersecurity is still not a high priority for health group executives and overworked practice administrators. Only 40% of healthcare cybersecurity professionals surveyed in an early<\/span><a href=\"https:\/\/www.himss.org\/news\/himss-research-how-cybersecurity-priorities-have-shifted-response-covid-19\" rel=\"nofollow\"><span data-contrast=\"none\"> 2021 HIMSS survey<\/span><\/a><span data-contrast=\"none\"> expect budgets to receive appropriate funding over the next two to three years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Coupled with the typical cybercrime model of exploiting world events, healthcare \u2013 much like every other sector \u2013 has increased its technology usage, creating an even greater opportunity for criminals to strike.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">TOP CYBER ATTACKS, AND HOW TO AVOID THEM<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h4><b><span data-contrast=\"none\">Phishing<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">Phishing is one of the most known, and most successful, attack strategies in a cyber criminal\u2019s arsenal. If you\u2019ve ever been alerted by your email provider of a suspicious email that included a link or attachment, you\u2019ve come face-to-face with a phishing email.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These emails are a social engineering trick designed to get you to click on a malicious link or attachment. When you do, malware is launched in your system. These attempts often look very legitimate and may appear to come from someone within your organization. The email may even appear to come from someone you\u2019ve interacted with in the past.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">U.S. agencies <\/span><a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/federal-agencies-warn-of-emerging-fraud-schemes-related-to-covid-19-vaccines\" rel=\"nofollow\"><span data-contrast=\"none\">warned during the pandemic<\/span><\/a><span data-contrast=\"none\"> of fraudulent emails purporting to be from the U.S. Centers for Disease Control or other organizations claiming to offer COVID information. Others asked for charitable donations, information about financial relief, and details about vaccines and testing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This was a clever strategy for cyber criminals because people were anxious and hungry for information regarding the virus. This resulted in high click volume, and many were infected with malware that gave criminals access to sensitive patient data, locked IT systems for ransom, and established a foothold in many IT environments.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/3.-protech-your-hospital-from-phishing-attacks.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-24465\" src=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/3.-protech-your-hospital-from-phishing-attacks-1024x427.jpg\" alt=\"\" width=\"1024\" height=\"427\" \/><\/a><\/p>\n<p><strong>\u00a0To combat phishing attacks, follow these steps:\u00a0<\/strong><\/p>\n<ul>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Conduct regular training with staff on how to spot a phishing attack. <\/span><\/b><span data-contrast=\"none\">End users are typically the weakest link when it comes to a cyberattack, and human error, like clicking on a malicious link in an email, is one of the main infection vectors. This training may include simulated phishing attacks to help you identify which users are a problem.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Invest in email security and firewalls.<\/span><\/b><span data-contrast=\"none\"> Several email filtering tools exist that can help identify suspicious emails and isolate them before anyone even thinks about clicking on them, and firewalls will help identify threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Keep web browsers and other software up to date.<\/span><\/b><span data-contrast=\"none\"> Tech companies routinely issue updates to patch security vulnerabilities, and hackers are usually quick to exploit those vulnerabilities once they\u2019re identified along with the update. Waste no time in patching your systems.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Implement multi-factor authentication. <\/span><\/b><span data-contrast=\"none\">This technology adds another layer of security when logging into accounts by asking for a code or other form of authentication, such as a USB security key. Without that code (typically delivered via email, text, or an authentication app), an attacker won\u2019t be unable to successfully log in.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h4><b><span data-contrast=\"none\">Ransomware<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">One of the main reasons hackers conduct phishing attacks is to deploy ransomware, which locks a computer until the victim pays a ransom. Depending on the attacker\u2019s abilities and the configuration of the victim\u2019s network, the infection may spread throughout the entire organization and force a system-wide shutdown.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, the ransom demand \u2013 which can <\/span><a href=\"https:\/\/www.healthcareitnews.com\/news\/healthcare-hackers-demanded-average-ransom-46m-last-year-says-bakerhostetler\" rel=\"nofollow\"><span data-contrast=\"none\">stretch into the millions <\/span><\/a><span data-contrast=\"none\">for a profitable healthcare organization \u2013 isn\u2019t the only concern. Ransomware operators have been known to engage in<\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-double-extortion-and-beyond-revil-clop-and-conti\" rel=\"nofollow\"><span data-contrast=\"none\"> double and triple extortion<\/span><\/a><span data-contrast=\"none\"> in which they threaten to release stolen records, taking the attack public if the ransom is not paid.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span class=\"ui-provider bqm bqn bqo bqp bqq bqr bqs bqt bqu bqv bqw bqx bqy bqz bra brb brc brd bre brf brg brh bri brj brk brl brm brn bro brp brq brr brs brt bru\" dir=\"ltr\">Secure Patient&#8217;s Data With Nordlabs:<\/span><\/strong><\/p>\n<p><span class=\"ui-provider bqm bqn bqo bqp bqq bqr bqs bqt bqu bqv bqw bqx bqy bqz bra brb brc brd bre brf brg brh bri brj brk brl brm brn bro brp brq brr brs brt bru\" dir=\"ltr\">Now, you can secure your patient&#8217;s data with <a href=\"https:\/\/spotlight.designrush.com\/news\/2023-08-31-nordvpn-nordlabs-cybersecurity-tech-platform-launch\" rel=\"nofollow\">Nordlabs platform<\/a>, which provides innovative cybersecurity-focused solutions, preventing unauthorized access and potential breaches.<\/span><\/p>\n<p><a href=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/4.-healthcare-at-risk-of-ransomware-attacks.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-24466\" src=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/4.-healthcare-at-risk-of-ransomware-attacks-1024x427.jpg\" alt=\"\" width=\"1024\" height=\"427\" \/><\/a><\/p>\n<p><span data-contrast=\"none\">Studies of ransomware trends over the pandemic have found a dramatic increase in attacks, with an <\/span><a href=\"https:\/\/newsroom.nccgroup.com\/pressreleases\/ncc-group-reveals-threefold-increase-in-targeted-ransomware-attacks-in-2021-3124798\" rel=\"nofollow\"><span data-contrast=\"none\">increase of nearly 300%<\/span><\/a><span data-contrast=\"none\"> during select quarters in 2021.\u00a0<\/span><span data-contrast=\"none\">Healthcare, of course, is one of the most targeted industries for ransomware, with <\/span><a href=\"https:\/\/www.aamc.org\/news-insights\/growing-threat-ransomware-attacks-hospitals\" rel=\"nofollow\"><span data-contrast=\"none\">some studies<\/span><\/a><span data-contrast=\"none\"> suggesting healthcare ransomware attacks have increased by 45% over the last 12 months.\u00a0<\/span><span data-contrast=\"none\">Recent cases include an<\/span><a href=\"https:\/\/www.zdnet.com\/article\/planned-parenthood-la-announces-ransomware-incident-healthcare-info-of-400000-patients-leaked\/\" rel=\"nofollow\"><span data-contrast=\"none\"> October attack against Planned Parenthood Los Angeles<\/span><\/a><span data-contrast=\"none\">, which notified about 400,000 patients that parts of their PHI were stolen.\u00a0<\/span><span data-contrast=\"none\">Meanwhile, <\/span><a href=\"https:\/\/www.healthcareitnews.com\/news\/biggest-healthcare-data-breaches-2021\" rel=\"nofollow\"><span data-contrast=\"none\">several other healthcare systems have reported ransomware attacks<\/span><\/a><span data-contrast=\"none\"> impacting millions of patients, resulting in system downtime that further impacted critical services.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>To avoid falling victim to a ransomware attack, we recommend the following (in addition to the steps listed above):\u00a0<\/strong><\/p>\n<ul>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Make sure systems are backed up offline.<\/span><\/b><span data-contrast=\"none\"> When a ransomware attack happens, the cheapest method of mitigation is usually to recover from a system backup. However, that backup must be stored offline to block the threat actor.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Segment networks.<\/span><\/b><span data-contrast=\"none\"> If the attacker compromises systems on a non-critical network that has been segmented from the rest of the organization\u2019s systems, then recovery will be much easier and there will be less of an impact on the rest of the organization.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Patch systems immediately.<\/span><\/b><span data-contrast=\"none\"> While phishing and human error are the main entry points for ransomware, hackers also look for flaws in software that allow them to enter networks. Quickly patching those flaws and applying updates, as they become available, will help limit your organization\u2019s exposure to attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Secure remote desktop protocol (RDP).<\/span><\/b><span data-contrast=\"none\"> Hackers can also gain access through exposed, poorly secured remote services. Look for systems using RDP, close unused RDP ports, and enforce account lockouts after a specified number of attempts.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Create an incident response plan. <\/span><\/b><span data-contrast=\"none\">A response plan is designed to give IT and other employees a roadmap for mitigating a ransomware attack.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h4><b><span data-contrast=\"none\">Supply Chain attacks<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">These clever, hard-to-detect attacks leverage a trusted software or service provider to infect an organization.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In the <\/span><a href=\"https:\/\/www.businessinsider.com\/solarwinds-hack-explained-government-agencies-cyber-security-2020-12\" rel=\"nofollow\"><span data-contrast=\"none\">SolarWinds incident,<\/span><\/a><span data-contrast=\"none\"> hackers believed to be affiliated with the Russian government first compromised a widely used IT management product from the company and inserted malware into an update. This gave the hackers unfettered access into thousands of organizations using the software, including some U.S. agencies. The<\/span><a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" rel=\"nofollow\"><span data-contrast=\"none\"> Kaseya incident<\/span><\/a><span data-contrast=\"none\"> was a massive ransomware campaign that leveraged another popular IT management product to deploy ransomware via third-party IT services providers.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Microsoft calls these attacks an<\/span><span data-contrast=\"none\"> emerging threat<\/span><span data-contrast=\"none\"> in which attackers gain access to source codes, build processes or update mechanisms of IT vendors, and leverage the massive IT supply chain for distribution. Instead of targeting individual victims, attackers use this method to compromise thousands at the same time, giving them the ability to pick and choose which customer of the IT vendor to attack further.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These attacks are difficult to spot because these tools from trusted companies aren\u2019t normally on an organization\u2019s threat radar.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/5.-cyber-attack-on-supply-chain-healthcare.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-24467\" src=\"https:\/\/www.carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/5.-cyber-attack-on-supply-chain-healthcare-1024x427.jpg\" alt=\"\" width=\"1024\" height=\"427\" \/><\/a><\/p>\n<p><strong>However, there are several recommended steps to prevent and mitigate these attacks:\u00a0<\/strong><\/p>\n<ul>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Be selective when choosing a software vendor.<\/span><\/b><span data-contrast=\"none\"> Before doing business with a services provider, ask for a software bill of materials (SBOM) that provides a detailed list of the components in the software product. This allows you to perform a vulnerability or license analysis. Partnering with a <\/span><a href=\"https:\/\/www.carecloud.com\/hipaa-compliant-cloud-storage\/\"><span data-contrast=\"none\">service and solution provider with a strong cybersecurity posture<\/span><\/a><span data-contrast=\"none\"> will help ease concerns. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Monitor software for unusual activity. <\/span><\/b><span data-contrast=\"none\">If the program is behaving in an unexpected way, it could be a sign that the tool is being used or of malicious activity present. If malicious activity is detected, disable the software, remote its access to the network, and notify the vendor. Engage your incident response plan and work with forensic teams to track down the extent of the compromise.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"?\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;?&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Implement a Zero Trust network architecture. <\/span><\/b><span data-contrast=\"none\">This approach goes beyond monitoring users and external threats. Each user is authenticated every step of the way, and nothing on the network is inherently trusted. This strategy includes multi-factor authentication on all systems, network micro-segmentation, endpoint detection and response tools, and more.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><b><span data-contrast=\"none\">Conclusion<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">The modern hacker is no longer an amateur attacker operating out of a dark basement. Attacks are most often launched by complex, experienced groups that are well-organized. They are increasingly<\/span><a href=\"https:\/\/www.helpnetsecurity.com\/2021\/08\/31\/cybercrime-as-a-service-market\/\" rel=\"nofollow\"><span data-contrast=\"none\"> adopting business models<\/span><\/a><span data-contrast=\"none\"> similar to legitimate technology providers, which is contributing to a growing cybercrime market estimated to cost the world more than $10 trillion by 2025.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This is why it is critical that your organization invests in <\/span><a href=\"https:\/\/www.carecloud.com\/continuum\/3-ways-cloud-security-can-offer-greater-data-protection\/\"><span data-contrast=\"none\">network defenses<\/span><\/a><span data-contrast=\"none\"> and partners with <\/span><a href=\"https:\/\/www.carecloud.com\/\"><span data-contrast=\"none\">software providers<\/span><\/a><span data-contrast=\"none\"> who will work to keep your system and PHI secure. Ask yourself if you can afford to have systems offline for more than a few minutes. Think about the damage it will do to your patients, your revenues, and your organization\u2019s reputation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have been paying attention to headlines over the last two years, then you should be fully aware of the increasing rate of cyberattacks impacting organizations across every sector, including government, technology, education, and healthcare, which unfortunately tends to be one of the most targeted sectors.\u00a0 The reason for that is simple: healthcare organizations [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":43596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[412],"tags":[294],"class_list":["post-24461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clinical","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Healthcare Providers are Facing these Top Cybersecurity Threats<\/title>\n<meta name=\"description\" content=\"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare Providers are Facing these Top Cybersecurity Threats\" \/>\n<meta property=\"og:description\" content=\"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/\" \/>\n<meta property=\"og:site_name\" content=\"Continuum\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T16:44:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T10:43:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"594\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"cc_continuum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cc_continuum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/\"},\"author\":{\"name\":\"cc_continuum\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/person\\\/6af17e75a684cc5cd23741e014351348\"},\"headline\":\"Top Cybersecurity Threats Healthcare Providers Should be Aware of\",\"datePublished\":\"2022-06-07T16:44:10+00:00\",\"dateModified\":\"2025-11-03T10:43:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/\"},\"wordCount\":1655,\"publisher\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-Cybersecurity-Threats-Healthcare.webp\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Clinical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/\",\"name\":\"Healthcare Providers are Facing these Top Cybersecurity Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-Cybersecurity-Threats-Healthcare.webp\",\"datePublished\":\"2022-06-07T16:44:10+00:00\",\"dateModified\":\"2025-11-03T10:43:26+00:00\",\"description\":\"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#primaryimage\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-Cybersecurity-Threats-Healthcare.webp\",\"contentUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-Cybersecurity-Threats-Healthcare.webp\",\"width\":1440,\"height\":594,\"caption\":\"Top Cybersecurity Threats Healthcare\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Cybersecurity Threats Healthcare Providers Should be Aware of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#website\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\",\"name\":\"Continuum\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\",\"name\":\"Continuum\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cc-logo-header-2021-1-2.png\",\"contentUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cc-logo-header-2021-1-2.png\",\"width\":218,\"height\":57,\"caption\":\"Continuum\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/person\\\/6af17e75a684cc5cd23741e014351348\",\"name\":\"cc_continuum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"caption\":\"cc_continuum\"},\"sameAs\":[\"https:\\\/\\\/carecloud.com\\\/continuum\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare Providers are Facing these Top Cybersecurity Threats","description":"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare Providers are Facing these Top Cybersecurity Threats","og_description":"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks","og_url":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/","og_site_name":"Continuum","article_published_time":"2022-06-07T16:44:10+00:00","article_modified_time":"2025-11-03T10:43:26+00:00","og_image":[{"width":1440,"height":594,"url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp","type":"image\/webp"}],"author":"cc_continuum","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cc_continuum","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#article","isPartOf":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/"},"author":{"name":"cc_continuum","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/person\/6af17e75a684cc5cd23741e014351348"},"headline":"Top Cybersecurity Threats Healthcare Providers Should be Aware of","datePublished":"2022-06-07T16:44:10+00:00","dateModified":"2025-11-03T10:43:26+00:00","mainEntityOfPage":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/"},"wordCount":1655,"publisher":{"@id":"https:\/\/carecloud.com\/continuum\/#organization"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#primaryimage"},"thumbnailUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp","keywords":["cybersecurity"],"articleSection":["Clinical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/","url":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/","name":"Healthcare Providers are Facing these Top Cybersecurity Threats","isPartOf":{"@id":"https:\/\/carecloud.com\/continuum\/#website"},"primaryImageOfPage":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#primaryimage"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#primaryimage"},"thumbnailUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp","datePublished":"2022-06-07T16:44:10+00:00","dateModified":"2025-11-03T10:43:26+00:00","description":"Healthcare organizations have the highest industry cost of a breach \u2013 $9.23 million per incident. This cost is up nearly 30% from 2020, according to IBM\u2019s annual Cost of a Data Breach Report, which has listed healthcare as the costliest industry when it comes to mitigating cyberattacks","breadcrumb":{"@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#primaryimage","url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp","contentUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2022\/06\/Top-Cybersecurity-Threats-Healthcare.webp","width":1440,"height":594,"caption":"Top Cybersecurity Threats Healthcare"},{"@type":"BreadcrumbList","@id":"https:\/\/carecloud.com\/continuum\/top-cybersecurity-threats-healthcare-providers-should-be-aware-of\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carecloud.com\/continuum\/"},{"@type":"ListItem","position":2,"name":"Top Cybersecurity Threats Healthcare Providers Should be Aware of"}]},{"@type":"WebSite","@id":"https:\/\/carecloud.com\/continuum\/#website","url":"https:\/\/carecloud.com\/continuum\/","name":"Continuum","description":"","publisher":{"@id":"https:\/\/carecloud.com\/continuum\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carecloud.com\/continuum\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/carecloud.com\/continuum\/#organization","name":"Continuum","url":"https:\/\/carecloud.com\/continuum\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/logo\/image\/","url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2025\/03\/cc-logo-header-2021-1-2.png","contentUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2025\/03\/cc-logo-header-2021-1-2.png","width":218,"height":57,"caption":"Continuum"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/person\/6af17e75a684cc5cd23741e014351348","name":"cc_continuum","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","caption":"cc_continuum"},"sameAs":["https:\/\/carecloud.com\/continuum"]}]}},"_links":{"self":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/24461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/comments?post=24461"}],"version-history":[{"count":6,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/24461\/revisions"}],"predecessor-version":[{"id":43791,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/24461\/revisions\/43791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/media\/43596"}],"wp:attachment":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/media?parent=24461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/categories?post=24461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/tags?post=24461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}