cxo voice
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home Cyber Security

Healthcare Ransomware Victims Forced to Halt Operations

Deepa Sharma by Deepa Sharma
October 12, 2022
A A
Security Policy

Cyber attacks on healthcare organizations have increased in recent times. Trend Micro data shows that 86% of global healthcare organizations compromised by ransomware suffered operational outages. Cybercriminals use ransomware malware to alter your device files and make the devices inaccessible to the user until the ransom is paid. They may lock your applications or threaten to leak your confidential data online, or sell them to another malicious agent. This is the most common way cybercriminals make money. 

57% of global healthcare organizations acknowledge being compromised by ransomware over the past three years, according to the study. Of these, 25% say they were forced to halt operations completely, while 60% reveal that some business processes were impacted as a result.

On average, it took most responding organizations days (56%) or weeks (24%) to restore these operations fully.

Ransomware is not only causing the healthcare industry significant operational pain. The Trend Micro data also states that 60% of responding healthcare organizations say that important data was also leaked by cybercriminals. This creates compliance and reputational risk, as well as investigation, remediation, and clean-up costs.

Respondents to the study also underline supply chain weaknesses as a major challenge. Specifically:

  • 43% say their partners have made them a more attractive target for attack
  • 43% say a lack of visibility across the ransomware attack chain has made them more vulnerable
  • 36% say a lack of visibility across attack surfaces has made them a bigger target

The good news is that most (95%) healthcare organizations say they regularly update patches, while 91% restrict email attachments to mitigate malware risk. Many also use detection and response tools for their network (NDR) endpoint (EDR) and across multiple layers (XDR).

However, the study also highlights potential weaknesses, including:

  • A fifth (17%) don’t have any remote desktop protocol (RDP) controls in place
  • Many HCOs don’t share any threat intelligence with partners (30%), suppliers (46%) or their broader ecosystem (46%)
  • A third (33%) don’t share any information with law enforcement
  • Only half or fewer HCOs currently use NDR (51%), EDR (50%), or XDR (43%)
  • Worryingly few respondents can detect lateral movement (32%), initial access (42%) or use of tools like Mimikatz and PsExec (46%)

“In cybersecurity we often talk in abstractions about data breaches and network compromise. But in the healthcare sector, ransomware can have a potentially very real and very dangerous physical impact,” said Bharat Mistry, Technical Director at Trend Micro.

ADVERTISEMENT

“Operational outages put patient lives at risk. We can’t rely on the bad guys to change their ways, so healthcare organisations need to get better at detection and response and share the appropriate intelligence with partners to secure their supply chains.” 

Also Read: Comparison On Keeping Your Emails Secure: Special Analysis

Deepa Sharma

Deepa Sharma

Deepa Sharma is CXOVoice’s Managing Editor, overseeing all coverage technology, cybersecurity, banking, and financial coverage. She can be reached at [email protected]

Related Posts

HCLTech and Cisco
Business

HCLTech and Cisco Unveil AI-Enabled Contact Center Platform

February 13, 2026
AI Hackathon
News

TCS Hosts AI Hackathon for Non-Engineering Students

February 12, 2026
Palo Alto Acquisition of CyberArk
Cyber Security

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

February 12, 2026
Capgemini and Microsoft
Business

Capgemini and Microsoft Deepen Partnership on Sovereign Cloud Solutions

February 12, 2026
IBM FlashSystem
Business

IBM Launches AI-Powered FlashSystem Storage with Autonomous Operations and Ransomware Detection

February 11, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

February 10, 2026
Indian Family Businesses
Business

Indian Family Businesses Poised for Growth, But Tech Investments Lag, PwC Survey Finds

February 9, 2026
Sovereign AI
Business

Global AI Momentum Fuels Sovereign Cloud Surge, Gartner Forecasts $80 Billion Market in 2026

February 9, 2026
Load More
ADVERTISEMENT

Other Articles

AI India

AI as a Public Good: From Democratic Principles to Ground-Level Practice

February 13, 2026
HCLTech and Cisco

HCLTech and Cisco Unveil AI-Enabled Contact Center Platform

February 13, 2026
AI Hackathon

TCS Hosts AI Hackathon for Non-Engineering Students

February 12, 2026
Palo Alto Acquisition of CyberArk

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

February 12, 2026
Capgemini and Microsoft

Capgemini and Microsoft Deepen Partnership on Sovereign Cloud Solutions

February 12, 2026
IBM FlashSystem

IBM Launches AI-Powered FlashSystem Storage with Autonomous Operations and Ransomware Detection

February 11, 2026
AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

by Govind Rammurthy
December 23, 2025

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
AI India
Artificial Intelligence

In economic theory, a "public good" is non-excludable (access cannot be denied) and non-rivalrous (one person's use doesn't diminish another's)....

Read moreDetails

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
Cyber Resilience
Cyber Security

Safer Internet Day is a timely reminder that the internet is no longer just a place we visit. It is...

Read moreDetails

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
HDDs storage
Opinion

Enterprises today are grappling with an unprecedented surge in data creation. Every interaction from video and images to logs, sensor...

Read moreDetails

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025
Cybersecurity predictions 2026
Cyber Security

As organizations in India accelerate their growth, the rise of targeted cyberattacks becomes inevitable. Threat tactics are evolving in sophistication...

Read moreDetails
AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
HCLTech and Cisco
Business

HCLTech and Cisco Unveil AI-Enabled Contact Center Platform

by Deepa Sharma
February 13, 2026
AI Hackathon
News

TCS Hosts AI Hackathon for Non-Engineering Students

by Deepa Sharma
February 12, 2026
Palo Alto Acquisition of CyberArk
Cyber Security

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

by Deepa Sharma
February 12, 2026
AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

by Govind Rammurthy
December 23, 2025
AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

December 23, 2025
Storage Engineers
Opinion

5 Future-Ready Skills Every Storage Engineer Should Build in 2026

December 22, 2025

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. We publish informed analysis, news reporting, expert commentary, and expert insights across enterprise technology, digital transformation, cybersecurity, data, AI, sustainability, and governance.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads
Loading
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Editorial Policy
  • Feedback

Copyright © 2025 de Audience - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion
  • Leaders Talk

Copyright © 2025 de Audience - All Right Reserved