What the 2025 healthcare cybersecurity claims data reveals
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章主要讲的是医疗保健机构面临的网络风险增加,引用了Resilience的一份报告。报告分析了2023年到2025年上半年的数据,指出网络攻击的严重性在上升,尤其是勒索软件和社交工程攻击。 然后,文章提到报告中提到的五个有效的控制措施,这些措施成本不高但效果显著。还有两个突出的发现:不可变备份在医疗行业效果更好,有正式数据治理委员会的组织风险降低更多。 最后,文章通过两个案例研究对比了采取措施和不采取措施的机构的不同结果。 现在我需要把这些信息浓缩到100字以内。要包括关键点:医疗保健网络安全风险增加、报告来源、攻击趋势、主要威胁因素(如社交工程)、有效控制措施、案例对比等。 可能的结构是:医疗保健网络安全风险加剧,报告分析显示勒索软件和社交工程攻击增加,五个有效控制措施降低成本和风险,案例显示采取措施机构表现更好。 检查一下字数是否合适,并确保没有使用不需要的开头语。 </think> 医疗保健网络安全风险加剧,报告指出勒索软件和社交工程攻击频发,损失严重。五大控制措施有效降低风险成本。案例显示积极应对的机构表现更佳。 2026-4-8 06:15:0 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Healthcare organizations are absorbing more cyber risk than ever, and the claims data tells a more specific story than the headlines. Resilience has just released The State of Healthcare Cybersecurity: Risk Trends and Proven Controls for 2025, a new report drawing on portfolio-level analysis of healthcare cyber incidents from 2023 through the first half of 2025. The findings identify which threats are actually driving losses, where defenders are gaining ground, and which controls are measurably moving the needle on value at risk. The full report is available now—download it here.

A sector under sustained pressure

The headline numbers from 2024 set the stage. The U.S. healthcare sector saw 275 million records breached, more than double the prior year and the largest healthcare data exposure in U.S. history. Ransomware attacks against the sector climbed 32%, and a single vendor incident at Change Healthcare exposed an estimated 190 million records and disrupted care delivery nationwide.

Resilience’s portfolio data adds dimension to those headlines. Average severity of incurred losses per healthcare claim shifted meaningfully between 2023 and 2024, and early signals from 2025 suggest severity is climbing again. In the first half of the year, extortion demands in healthcare-related incidents reached as high as $4 million—costs that take on a different weight when patient care is at stake. The report unpacks the year-over-year severity trend and what it suggests about how attacks against healthcare are evolving.

Where the losses are actually coming from

The report walks through what is driving material loss inside the Resilience portfolio, and the answer is less about exotic zero-days than about the human layer. Social engineering drove 88% of material losses across the portfolio in the first half of 2025, and healthcare-specific claims followed the same pattern. Phishing, business email compromise, and vendor compromise show up repeatedly in the underlying incident data, alongside backup gaps that leave organizations exposed when ransomware lands and tracking pixel errors that quietly expose patient information.

The threat actor landscape is also more distributed than the most visible groups suggest. While BlackCat and Cl0p appeared most frequently in healthcare-related activity, the actually successful intrusions were spread more evenly across actors like Interlock, Lockbit, and Medusa. That distribution suggests healthcare defenders may be hardening against the loudest names while remaining exposed to lesser-known operators.

Five controls that are moving the needle

The most actionable section of the report identifies five controls and processes delivering the highest measurable risk reduction in healthcare environments. They are not exotic. They are not expensive. They are the kind of practices most healthcare organizations can implement without a transformational budget request, and the data shows they meaningfully reduce value at risk. The report walks through each one, why it matters specifically in healthcare, and what the portfolio data shows about its impact.

Two additional findings stand out. Immutable backups deliver stronger risk reduction in healthcare than in other industries on average, and organizations with a formal data governance committee see more than three times the risk reduction compared to peers in other sectors. These findings echo the broader argument we have been making in our work on [linked text: quantifying cyber risk for strategic business alignment]—that the highest-impact security investments are knowable, and they are often the ones that get deprioritized.

Two organizations, two outcomes

The report closes with a pair of contrasting case studies. One is a mid-sized regional health system that believed its security posture was stronger than it turned out to be, and discovered the gap the hard way during a major incident—including the discovery that clinical imaging files had been left out of its backup strategy. The other is a mid-market biotechnology firm that built a quantified, prioritized cyber risk program and was able to redirect security spending toward the controls with the highest return. The contrast is the argument: healthcare organizations have a growing body of evidence about what works, and the ones acting on it are pulling ahead of their peers.

Read the full report

If you lead security, finance, or risk at a healthcare organization, the full report is built for you. It covers the underlying claims trends, the five high-ROI controls in detail, the case studies, and a practical framework for translating cyber risk into financial terms your board will understand. Download The State of Healthcare Cybersecurity here.

Stay ahead with the latest in AI-powered cyber risk management


文章来源: https://securityboulevard.com/2026/04/what-the-2025-healthcare-cybersecurity-claims-data-reveals/
如有侵权请联系:admin#unsafe.sh