industry
41 min read

When Minutes Mean Lives: Healthcare Cyber Crisis Exercises in the Era of Patient-Threatening Attacks

Healthcare cyberattacks affected 81% of Americans in 2024, with 72% of attacked organizations reporting direct patient care disruption and 29% seeing increased mortality rates. Learn why healthcare organizations must treat cyber tabletop exercises as essential patient safety interventions.

RST
By RTable Security Team
41 min read

When Minutes Mean Lives: Healthcare Cyber Crisis Exercises in the Era of Patient-Threatening Attacks

Healthcare cyberattacks killed patient care operations at 734 U.S. facilities in 2024, exposing 276.7 million patient records—affecting 81% of Americans—while 72% of attacked organizations reported direct patient care disruption, 29% saw increased mortality rates, and one alleged infant death awaits legal confirmation. Unlike financial institutions that can temporarily suspend operations, hospitals face an impossible paradox: cybersecurity best practices demand isolating compromised systems, yet patient survival depends on keeping those exact systems operational. The February 2024 Change Healthcare ransomware attack paralyzed every hospital in America, proving that healthcare cyber incidents function as mass casualty disasters requiring specialized crisis preparedness. This definitive research report synthesizes current threat data, regulatory requirements, real-world patient impacts, and evidence-based frameworks demonstrating why healthcare organizations must treat cyber tabletop exercises as essential patient safety interventions—not IT formalities.

The catastrophic scale of healthcare cyber threats in 2024-2025

2024 shattered all records for healthcare data breaches, with attacks affecting more Americans than the previous five years combined. The scope is staggering: 734 large breaches reported to HHS, compromising 276.7 million records in a single year—a 64% increase from 2023 despite breach counts remaining relatively flat. This isn’t just a data security problem; it’s a patient safety crisis evidenced by 69% of attacked healthcare organizations reporting care disruption, with more than one-quarter documenting increased patient mortality.

The Change Healthcare attack in February 2024 represents the inflection point where cyber incidents became undeniable patient safety emergencies. Attackers exploited a Citrix portal lacking multi-factor authentication to compromise a single subsidiary of UnitedHealth Group, yet the blast radius affected every hospital in the United States. For weeks, providers couldn’t verify insurance eligibility, process prior authorizations, or submit claims. The attack disrupted 15 billion annual healthcare transactions, touching one in three patient records nationwide. An American Hospital Association survey found 74% of hospitals experienced direct patient care impacts—delays in medically necessary care authorizations, prescription drug processing disruptions, and patients struggling to access timely treatment. The financial hemorrhage totaled $2.457 billion for UnitedHealth alone, with $6.3 billion in claims processing frozen in just the first three weeks.

Healthcare continues its 14-year reign as the most expensive sector for data breaches at $9.77 million per incident, nearly double the global average of $4.88 million. The IBM/Ponemon 2024 Cost of a Data Breach Report reveals that while healthcare breach costs decreased slightly from 2023’s record $10.93 million, they remain catastrophically higher than any other industry—the second-costliest sector, finance, averages just $6.1 million. These figures don’t capture the full devastation: the average most expensive single cyberattack cost healthcare organizations $4.74 million in direct incident costs, plus $1.47 million in operational disruption (up 13% from 2023), $995,484 in lost productivity, and $853,272 to correct patient care impacts.

Real-world patient safety data paints an even grimmer picture. According to the 2024 Proofpoint/Ponemon Healthcare Cybersecurity Study, 56% of attacked organizations reported poor patient outcomes due to delays in procedures and tests, 53% saw increased medical procedure complications, and 28% documented increased patient mortality rates—representing a 21% year-over-year increase in mortality impacts. The 2025 update shows continued deterioration: 93% of healthcare organizations experienced at least one cyberattack (up from 92%), averaging 43 attacks per organization, with 72% of those attacked suffering patient care disruption.

Attack-specific impacts reveal which threats pose the gravest danger to patients. Supply chain attacks proved most devastating in 2024, with 82% of affected organizations reporting patient care disruption, 51% experiencing increased procedure complications, and 48% seeing delays causing poor outcomes. Ransomware attacks affected 59% of organizations, with 70% reporting negative patient care impacts—61% experienced delays in procedures and tests resulting in poor outcomes, and 58% saw longer hospital lengths of stay. Business email compromise attacks disrupted care at 65% of victim organizations, with 69% causing delays resulting in poor outcomes. Even data loss incidents, affecting 92% of organizations with an average of 20 incidents per organization over two years, resulted in 50% increased mortality rates.

The FBI’s 2024 Internet Crime Report confirms healthcare as the most-targeted critical infrastructure sector with 444 reported incidents (238 ransomware threats, 206 data breach incidents)—more than any other sector. The top ransomware groups terrorizing healthcare in 2024 include RansomHub (600+ organizations breached globally), Akira ($42 million in payments from 250+ entities), and the disrupted but resurgent LockBit. Attack vectors have evolved with exploitation of vulnerabilities increasing 180% year-over-year, now accounting for 14% of breaches, while stolen credentials remain the leading cause at 38%.

Third-party business associate breaches now account for 30% of healthcare data breaches, up dramatically from 15% in 2023—a 287% increase in affected individuals from 2022 to 2023. The Change Healthcare incident exemplifies this systemic vulnerability: a single clearinghouse compromise cascaded across the entire U.S. healthcare ecosystem. Eight of the 14 mega-breaches exceeding one million records in 2024 involved business associates, demonstrating that healthcare organizations can execute perfect security practices yet still face existential patient safety threats from vendor compromises.

HIPAA’s regulatory teeth sharpen as enforcement targets incident response failures

The regulatory landscape shifted dramatically in January 2025 when HHS published a proposed rule that would fundamentally transform HIPAA Security Rule requirements. The proposed changes eliminate all “addressable” implementation specifications, making previously optional security controls mandatory—including encryption for ePHI at rest and in transit, multi-factor authentication for all ePHI access, and regular testing of incident response plans through tabletop exercises. The $9 billion first-year compliance cost estimate signals the magnitude of changes ahead, with $6 billion in annual ongoing costs.

The proposal arrives with compelling justification: between 2018 and 2023, large breaches increased 102% while affected individuals surged 1,002%. HHS’s 2016-2017 audit program found only 14% of covered entities substantially compliant with risk analysis requirements—the single most cited violation in enforcement actions. The proposed rule mandates comprehensive risk analysis including technology asset inventories, ePHI mapping through information systems, and formal threat modeling. For incident response specifically, the rule requires written policies and procedures, regular testing of response plans, and periodic reviews and updates—transforming tabletop exercises from best practice to regulatory obligation.

Current HIPAA requirements already impose strict incident response timelines that most healthcare organizations struggle to meet. The 60-day breach notification requirement runs from the day a breach is discovered or reasonably should have been discovered through diligent investigation. Organizations must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery, notify HHS via the breach portal (immediately for 500+ individuals, annually for smaller breaches), and notify prominent media outlets when breaches affect 500+ residents in a state or jurisdiction. Business associates must notify covered entities within 60 days, creating cascading notification obligations.

The penalty structure under HITECH Act enhancements creates a four-tier system with 2024 values ranging from $141 to $70,828 per violation depending on culpability, with annual caps from $25,000 to $2,134,831 per violation category. The “willful neglect not corrected” tier carries mandatory minimum penalties of $70,828 per violation with no enforcement discretion—a $2.1+ million annual maximum that accumulates across violation categories. With annual inflation adjustments (2025 multiplier: 1.02598), these penalties continue escalating.

Recent enforcement demonstrates OCR’s aggressive posture. In 2024, OCR closed 22 HIPAA investigations with financial penalties totaling $12.8 million—including seven civil monetary penalties and 15 settlements. October 2024 marked a watershed moment when OCR launched a targeted Risk Analysis Enforcement Initiative, making failure to conduct risk analysis—the foundation of all HIPAA security—a priority enforcement focus. The first case under this initiative resulted in Bryan County Ambulance Authority paying $90,000 for never conducting any risk analysis whatsoever.

Ransomware attacks dominated 2024 enforcement actions, appearing in seven of the first eleven cases. Gulf Coast Pain Consultants paid $1.19 million after ransomware attackers exploited failures to conduct risk analysis and monitor systems. Children’s Hospital Colorado settled for $548,265 following two phishing attacks that succeeded because multi-factor authentication was disabled. Inmediata Health Group paid $250,000 to OCR (plus $33 million in multistate settlements) after leaving 1.5+ million individuals’ protected health information accessible online without authentication for nearly three years.

State attorneys general have joined the enforcement surge. New York, New Jersey, and Connecticut collectively fined Enzo Biochem $4.5 million for inadequate cybersecurity leading to a 2.4 million-record breach. New York separately penalized Albany ENT & Allergy Services $2.25 million after suffering two ransomware attacks just ten days apart—evidence of failed remediation and security improvement.

The pattern across enforcement actions reveals what regulators consider inexcusable: failure to conduct risk analysis, lack of multi-factor authentication, absence of encryption, inadequate system monitoring, missing or inadequate incident response plans, and delayed breach notifications. Organizations cannot claim surprise when attacks succeed if they’ve neglected foundational security practices. The proposed 2025 rule changes signal that the era of “addressable” specifications serving as optional guidance has ended—cybersecurity in healthcare is becoming a mandatory, enforceable standard with severe penalties for noncompliance.

California’s CMIA (Confidentiality of Medical Information Act) imposes stricter requirements than federal HIPAA, including prohibitions on disclosure without authorization, mandatory breach notification to the California Attorney General for 500+ residents, and a private right of action unavailable under HIPAA. Recent 2024 expansions extended CMIA protections to reproductive/sexual health digital services and mental health apps. California CMIA is not preempted by HIPAA, meaning healthcare entities in California must comply with both frameworks—the stricter standard controls.

FDA medical device cybersecurity requirements, effective March 29, 2023 under Section 524B of the FD&C Act, add another compliance layer. Manufacturers of “cyber devices” (those with internet connectivity including Wi-Fi, cellular, Bluetooth, USB, or Ethernet) must submit cybersecurity management plans, secure product development frameworks, and Software Bills of Materials (SBOMs) with all premarket applications. Healthcare delivery organizations must navigate the intersection of HIPAA obligations, FDA device requirements, Joint Commission standards, and state-specific laws—each with distinct compliance mandates.

Medical device vulnerabilities create life-threatening attack surfaces

Three-quarters of the 200,000+ infusion pumps analyzed contain known security vulnerabilities, according to Palo Alto Networks Unit 42 research—a shocking statistic given these devices directly control medication delivery with lethal dose potential. The vulnerability landscape across medical devices reveals systemic insecurity: between 2001 and 2022, researchers identified 661 distinct vulnerabilities in medical devices, with more than half deemed critical or high-severity. The average medical device contains 6.2 vulnerabilities according to the U.S. Government Accountability Office, with the number of critical vulnerabilities projected to grow through 2025.

The National Vulnerability Database and MITRE CVE database contain 135 CVE records matching medical device searches, with 42% allowing remote exploitation and 92% rated low complexity—meaning they’re relatively easy for attackers to exploit. The top vulnerable healthcare systems include electronic health records (highest vulnerability count), wireless infusion pumps (second highest), endoscope cameras, radiology information systems, and PACS imaging systems. Common vulnerability patterns include hard-coded credentials (CWE-798, accounting for 9% of all cases), improper authorization, buffer overflows, cross-site scripting, authentication bypass, SQL injection, improper access control, missing encryption, insufficiently protected credentials, and improper input validation.

Recent critical vulnerabilities demonstrate the life-threatening nature of medical device security failures. The Contec CMS8000 patient monitoring system, still in active use as of January 2025, contains a hidden backdoor with hard-coded IP addresses routing to China (CVE-2025-0626, CVSS 7.5), automatically exfiltrating patient data to hard-coded public IPs when patients are connected (CVE-2025-0683, CVSS 5.9), plus an out-of-bounds write vulnerability enabling remote code execution (CVE-2024-12248, CVSS 9.8). The FDA and CISA issued urgent advisories recommending immediate network removal or, if impossible, blocking the entire subnet 202.114.4.0/24.

Infusion pump vulnerabilities span multiple manufacturers. The URGENT/11 vulnerabilities in Wind River VxWorks software affect 52% of scanned infusion pumps, including critical flaws like CVE-2019-12255 (CVSS 9.8) enabling buffer overflow in the TCP component and CVE-2019-12264 (CVSS 7.1) for incorrect access control in DHCP client. Smiths Medical Medfusion 4000 pumps contain CVE-2017-12718 (CVSS 8.1) allowing remote code execution via buffer overflow, plus CVE-2017-12723 (CVSS 3.7) with hard-coded passwords in configuration files. Baxter systems suffer from numerous vulnerabilities including CVE-2020-12040 and CVE-2020-12041 (both CVSS 9.8) enabling man-in-the-middle attacks through clear-text communication and unencrypted Telnet data transmission.

Cardiac implantable devices present unique attack scenarios where exploitation could directly cause patient death. Medtronic CareLink programmers experienced FDA Class I recall in October 2018 after discovery of Conexus Telemetry Protocol vulnerabilities—no encryption, authentication, or authorization, making them vulnerable to man-in-the-middle attacks enabling unauthorized modification of programmer functionality or implanted device settings during procedures. The Medtronic Paceart Optima System contains CVE-2023-31222 (CVSS 9.8), a critical vulnerability in the messaging service allowing remote code execution, denial-of-service, and the ability to delete, steal, or modify cardiac device data. Abbott (formerly St. Jude Medical) recalled 465,000 pacemakers and ICDs in 2017 for radio frequency vulnerabilities enabling battery drain attacks and inappropriate shock delivery—remediated through automatic firmware updates to patient transmitters.

Medical imaging systems across all major manufacturers contain critical vulnerabilities. GE Healthcare’s MDhex-Ray vulnerability (CVSS 9.8) affects 100+ models including CT scanners, MRI machines, PET scanners, mammography devices, ultrasound systems, X-ray machines, molecular imaging devices, and surgical imaging workstations—exploitable through hard-coded default passwords publicly available online, enabling remote access to PHI, arbitrary code execution, system manipulation, and device unavailability. Philips medical imaging systems contain multiple vulnerabilities including lack of authentication for critical MRI monitoring software functionality (CVSS 6.5), enabling unauthenticated remote shutdown. Siemens molecular imaging systems (SPECT, SPECT/CT, PET/CT) contain four publicly exploitable vulnerabilities with remote code execution potential.

Ventilators join the critical vulnerability list. Baxter Welch Allyn Life2000 ventilators received FDA Class I recall in April 2025 affecting 4,100+ units, with a MedCrypt VP stating the devices were “so easy to hack, a teenager could do it”—vulnerabilities described as easily avoidable with secure-by-design practices. Patient monitoring systems from Philips suffer from CVE-2020-16216 (CVSS 6.5) for improper input validation causing device crashes, and CVE-2021-43548 enabling denial-of-service with system-wide watchdog triggering reboots—interrupting patient monitoring during critical care.

The fundamental problem is IT/OT convergence in healthcare environments creates incompatible security paradigms. Information Technology (IT) systems focus on data processing with acceptable patching cycles and moderate downtime tolerance. Operational Technology (OT) controls physical medical devices and building systems, requiring 24/7/365 uptime where patching risks device malfunction or FDA clearance violations. Legacy medical devices have 10-20 year lifecycles, often running obsolete operating systems (Windows XP, Windows 7) that no longer receive security updates. Research shows 76% of medical devices run 20+ different operating system versions—creating a heterogeneous environment nearly impossible to secure uniformly.

Network segmentation, the primary defense against lateral movement, presents massive implementation challenges in healthcare. Medical devices originally designed for isolation now require network connectivity for clinical workflows. Departments need devices to communicate across segments for care delivery, yet flat networks allow attackers to move freely once inside. Asset visibility problems compound the challenge—55% of organizations have inaccurate or nonexistent asset inventories, with Armis customers discovering 50-60% more networked assets than previously documented. Mobile medical devices move between departments, making static inventory impossible.

The cascade effects of compromised medical devices create multi-patient harm scenarios. Centralized monitoring systems allow a single compromise to affect all connected bedside monitors—imagine a simultaneous restart of all patient monitors in an intensive care unit leaving the entire floor unmonitored. Infusion pump networks share vulnerabilities across entire fleets, enabling hospital-wide smart pump compromise from a single exploit. PACS compromise disables all imaging capabilities simultaneously: CT scanners for stroke diagnosis, MRI for neurological emergencies, X-ray for trauma—leaving radiologists unable to access images and referring physicians unable to get reports, delaying critical diagnoses. Pharmacy system failures prevent access to medication administration records, allergy information, and drug interaction alerts—manual processes become error-prone and dangerously slow.

The threat is actively exploited. FBI, CISA, and international partners issued warnings about Akira ransomware’s specific focus on medical device compromise, noting the group can exfiltrate data from connected devices in approximately two hours. The 2024 threat landscape includes nation-state actors, criminal ransomware groups, and insider threats—all recognizing that medical device compromise offers both lucrative extortion opportunities and geopolitical leverage through critical infrastructure disruption.

Real-world attacks document patient harm, deaths, and healthcare system collapse

The Springhill Medical Center case in Mobile, Alabama may represent the first confirmed U.S. death from a ransomware attack, pending legal resolution. In July 2019, Ryuk ransomware compromised the hospital’s IT systems for eight days, forcing complete reliance on paper documentation. On July 16, 2019, Teiranni Kidd entered the hospital for scheduled labor induction, unaware that electronic health records and patient monitoring systems were offline. Her baby, Nicko Silar, was born with an umbilical cord wrapped around his neck causing severe brain damage. The lawsuit alleges that critical fetal monitoring information showing distress never reached the attending physician Dr. Katelyn Braswell Parnell because wireless trackers for locating medical staff were non-functional, fetal tracing systems weren’t working, and patient health records were inaccessible at the nurses’ station—requiring manual bedside checks of paper records. The baby spent months in NICU before dying in April 2020. The wrongful death lawsuit claims the hospital continued accepting patients during compromised operations without disclosing the attack, eliminating “important safety-critical layers of redundancy.” While the hospital denies wrongdoing and the case remains unresolved, Harvard Business School created a case study (Case 123-065) examining the incident’s implications for healthcare cybersecurity and patient safety.

Universal Health Services, a Fortune 500 company operating 400+ hospitals and behavioral health facilities, suffered a devastating Ryuk ransomware attack on September 27, 2020 that wiped out IT systems across 250 U.S. facilities for three weeks. All electronic health records became inaccessible, laboratory and pharmacy systems went offline, phone systems failed, and staff reverted entirely to pen and paper. Ambulances were diverted to competitor facilities in the early hours after the attack, elective procedures were postponed or diverted, and patient activity dropped significantly. The attack cost UHS $67 million in pre-tax losses: decreased patient activity from diversions, increased labor expenses for internal and external resources, delayed billing and coding operations extending into December 2020, and professional fees. Recovery proceeded on a “rolling/staggered basis” throughout October, with full restoration by late October 2020. Senator Mark Warner sent a letter demanding answers about the incident, highlighting congressional concern about healthcare cybersecurity preparedness.

The Scripps Health ransomware attack in May 2021 provides the most rigorous academic documentation of regional cascade effects. When attackers shut down Scripps’ five acute care hospitals (1,300+ inpatient beds) and 19 outpatient facilities for nearly four weeks, forcing paper charting and diverting ambulances from four main hospitals, the impact radiated across San Diego County. A groundbreaking JAMA Network Open study published May 2023 analyzed two adjacent emergency departments at UC San Diego Health—entirely unaffected by the Scripps attack—and documented shocking spillover effects:

  • Daily ED census increased 15.1% (218.4 → 251.4 mean daily visits)
  • EMS ambulance arrivals surged 35.2% (1,741 → 2,354)
  • Patients who left without being seen skyrocketed 127.8% (158 → 360)
  • Patients leaving against medical advice increased 50.4% (107 → 161)
  • Median waiting room time jumped 47.6% (21 minutes → 31 minutes)
  • Median total length of stay for admitted patients increased 33.9% (614 minutes → 822 minutes)
  • County-wide EMS diversion time increased 74.1% (27 → 47 cumulative hours/day median)
  • ED stroke code activations increased 74.6% (59 → 103)
  • Confirmed stroke diagnoses doubled, up 113.6% (22 → 47)

The study concluded that ransomware attacks function as disasters necessitating coordinated regional planning and response efforts similar to natural disasters—not isolated IT incidents. Scripps lost $113 million ($91.6M in revenue, $21.1M in response costs) and ultimately settled a class action lawsuit for $3.57 million covering 1.2 million affected patients who experienced inability to access healthcare information, request prescription refills, manage appointments, or communicate with doctors.

CommonSpirit Health, the second-largest non-profit hospital chain in the United States with 164+ facilities in 13 states and 142 hospitals, detected a ransomware attack on October 2, 2022. Networks were proactively taken offline across the entire U.S. enterprise, electronic health records went down at multiple hospitals, ambulances were diverted, appointments and surgeries were canceled, and patients were turned away. Some hospitals remained without full EHR access for over a month. The attack cost $160 million, including $91.6 million in lost operating income during four-week recovery, with billing and claims processing delays continuing for months. The breach ultimately affected 623,774 individuals across 100+ current and former facilities. A class action lawsuit alleged the organization lacked necessary preventive measures and had no third-party security expert support prior to the attack.

The February 2024 Change Healthcare ransomware attack represents the watershed moment proving that healthcare cyber incidents threaten the entire U.S. healthcare system. BlackCat/ALPHV exploited a Citrix portal without multi-factor authentication to compromise Change Healthcare, a UnitedHealth Group subsidiary processing 15 billion healthcare transactions annually and touching one in three patient records nationwide. The attack paralyzed claims processing, prescription drug fulfillment, insurance eligibility verification, prior authorizations, and payment processing—affecting every single hospital in America. The AHA survey of nearly 1,000 hospitals revealed 74% reported direct patient care impact (delays in medically necessary care, prescription access problems), 94% experienced financial impact, and 33% saw disruption to more than half their revenue. Recovery took 2-3 months for 60% of affected organizations. Claims submission value dropped $6.3 billion in three weeks, threatening provider solvency nationwide. UnitedHealth paid a $22 million ransom in March 2024, yet the BlackCat group pulled an exit scam, and RansomHub later attempted secondary extortion. Total costs reached $2.457 billion, with the breach affecting 192.7 million individuals—the largest healthcare data breach in U.S. history.

Ascension Health’s May 2024 ransomware attack by Black Basta affected 140 hospitals across 19 states for six weeks, locking electronic health records and forcing clinicians to practice medicine blind—resulting in harrowing near-miss medication errors and documented patient harm. NPR interviewed more than a dozen Ascension doctors and nurses who reported that patient care was compromised. NICU nurse Marvin Ruckle at Ascension Via Christi St. Joseph in Wichita nearly administered the wrong narcotic dose to a baby due to confusing paper documentation: “It was really hard to decipher which was the correct dose. I never had this much confusion when I was using the computer.” Staff reported waiting four hours for head CT results on stroke and brain bleed patients, medication types and doses were unavailable, allergy information was inaccessible, and hospitals diverted ambulances while emergency wait times tripled. The attack contributed to a $1.1 billion net loss for fiscal year 2024, with facility volumes dropping 8-12% during May-June. The breach affected 5.6 million individuals, with patient notifications not beginning until December 2024—seven months post-attack.

Rural hospitals face existential vulnerability from cyberattacks due to geographic isolation and financial fragility. University of Minnesota research documented that rural hospitals experienced similar operational disruptions as urban facilities from ransomware, with inpatient admissions falling 14.7% and outpatient visits dropping 35.3% in the first week—but the critical difference lies in patient consequences. The median travel time to the nearest non-attacked hospital is 30+ minutes for rural residents versus less than 10 minutes for urban patients—4-7 times greater distance threatening outcomes for time-sensitive conditions like heart attacks and strokes. Approximately 50% of rural hospitals are already losing money according to 2024 Chartis analysis, with 700+ rural hospitals (31%) at risk of closure. The average $11 million recovery cost from ransomware attacks is devastating for financially fragile rural facilities. Sky Lakes Medical Center in Oregon spent 28 days offline in 2020, repairing or replacing 2,500 computers after refusing to pay ransom—an outcome possible only due to adequate financial reserves many rural hospitals lack.

Common failure patterns across incidents reveal what doesn’t work. The Change Healthcare attack exposed catastrophic failure: lacking multi-factor authentication on critical infrastructure, maintaining legacy technology with older systems, insufficient network segmentation allowing rapid attack spread, and inadequate investment in basic cybersecurity despite being critical infrastructure—resulting in months-long recovery and threats to provider solvency nationwide. Ascension demonstrated inadequate employee training enabling phishing success, lack of robust incident response plans leaving staff unprepared, and focus only on main EHR systems while ancillary systems remained vulnerable—leading to compromised patient safety during manual operations. Springhill Medical Center’s alleged failure to inform patients of the attack, concealment of operational impacts, and continuation of normal patient acceptance during compromised operations may have contributed to an infant’s death.

Successful responses share common elements: proactive system isolation to contain spread (CommonSpirit), immediate engagement of third-party forensic experts (multiple organizations), activation of pre-established emergency protocols (UHS), and rapid mobilization of IT security partners working around the clock. However, even “successful” responses cost tens to hundreds of millions of dollars and require weeks to months for recovery—demonstrating that reactive response, no matter how competent, cannot substitute for proactive preparedness.

Healthcare faces impossible incident response choices other industries avoid

Healthcare organizations face an operational paradox that makes cyber incident response fundamentally different from every other sector: security best practices often require isolating or shutting down systems, yet patient survival depends on those exact systems remaining operational. Financial institutions can temporarily halt transactions during incidents. Retailers can close stores and pause e-commerce. Manufacturers can idle production lines. Healthcare cannot stop—patients in emergency departments, intensive care units, operating rooms, and labor and delivery units require continuous, uninterrupted care regardless of system availability.

This creates acute tensions at every decision point during cyber incidents. During attacks, security teams want extended shutdowns for thorough forensic investigation and remediation. Clinical teams need immediate access to patient records, medication lists, allergy information, laboratory results, and vital signs monitoring. IT staff face simultaneous demands for general IT support ensuring technology works for end users, disaster recovery bringing systems back online quickly, and forensic investigation understanding the attack to prevent recurrence—three missions requiring the same limited personnel.

The Israeli Hillel Yaffe Medical Center case demonstrates the triage framework healthcare must employ during active attacks: immediately halt all non-life-saving procedures, stop elective surgeries until ventilators, ICU monitors, and critical equipment are verified safe, divert ambulances for mild-to-moderate trauma cases (not all ambulances—only those not requiring immediate life-saving intervention), and continue emergency, life-threatening, and time-sensitive care including cardiac events, strokes, and deliveries. Organizations must pre-authorize specific individuals to make immediate shutdown decisions without waiting for executive approval, establishing clear triggers and thresholds including disconnecting from public internet, severing vendor VPN connections, segmenting medical device networks at major points, mass quarantine of infected endpoints, and disconnecting backup systems.

Short-term outages of 1-3 days allow implementation of standard downtime procedures using pre-printed forms, downtime computers with EHR snapshots, and maintaining critical services through paper processes. Extended outages of three days to weeks require activating full business continuity plans: establishing department command centers, implementing labor pools to redistribute staff, expanding operating hours to catch up on postponed procedures, and systematic patient treatment prioritization. The University of Vermont Medical Center operated with systems offline for 25 days, requiring multiple command centers for complex departments, coordinated expanded operating hours with additional shifts, traveling nurses and covering physicians, and systematic patient treatment prioritization—an extraordinary operational burden few organizations practice in advance.

Regional cascade effects compound response challenges. The Scripps Health JAMA study proved that adjacent hospitals to attacked facilities experience dramatic patient surges: 35.2% increase in ambulance arrivals, 47.6% increase in median wait times, 127.8% increase in patients leaving without being seen, and 6.7% increase in admissions. Organizations must coordinate with Healthcare Coalitions and regional partners to manage spillover effects—treating cyber incidents as community disasters requiring mutual aid and load-balancing across the regional healthcare system.

Clinical staff involvement presents unique challenges because most healthcare workers entered the profession to provide patient care, not manage technology disruptions. Training must span multiple tiers: executives (CEO, CISO, CIO, CFO, COO, communications, legal) require policy exercises on ransomware engagement, notification requirements, and communication strategies through annual tabletop exercises minimum. Operational-level “cyber champions” bridge IT and clinical workforce, alleviating pressure on stretched technical staff during incidents by distributing downtime supplies, mentoring colleagues on procedures, and fielding basic questions. Department-level “downtime teams” include staff, managers, and patient quality/safety representatives receiving hands-on training with paper charting, equipment and supply inventory management, and department-specific workflow adaptations. Frontline staff need recurring competency training on cybersecurity integrated into new-hire orientation, HRO huddles, and practiced during planned maintenance windows.

A critical training gap emerged during the Ascension attack when clinicians reported receiving “no training” for extended cyberattack scenarios. Many younger nurses and physicians have never practiced medicine without electronic systems—they lack manual clinical skills like auscultating blood pressure manually (versus automated cuffs), manual cardiac telemetry monitoring, paper prescription writing with proper safety components, manual medication calculations without automated systems, and writing proper medical orders (dose, route, frequency, timeline) without EHR prompts. The Ascension NICU nurse nearly administering wrong narcotic dose to an infant, ICU nurses nearly giving wrong blood pressure medication dosages, an ER doctor reporting a patient receiving wrong narcotic requiring intubation, and a woman dying after four hours waiting for lab results that never arrived—all these incidents trace directly to inadequate downtime training.

Paper-based workarounds require extensive advance preparation. Department “go-bags” or “downtime boxes” must contain downtime forms mimicking EHR format, portable radios for floor communication when phones fail, printed reference materials (protocols, treatment guidelines, quick-start cards), office supplies, patient demographic forms, medication order forms with safety checklists, laboratory and radiology order forms, vital signs flowsheets, critical drug interaction reference guides, and emergency protocol checklists. Forms must follow proper principles: use patient Medical Record Numbers consistently, require minimum two patient identifiers on all documents, implement “read-back” processes for verbal information transfer, organize by location/alphabetically (NOT chronologically), and establish designated Quality Control coordinators reviewing all critical orders before processing.

Communication failures during cyber incidents lead to chaos, mistrust, and legal liability. When VoIP phone systems fail (most hospital phones use network-connected Voice over Internet Protocol), organizations need emergency analog phone systems at key locations, personal devices for calls (with HIPAA considerations), runners to convey information physically, and portable radios for unit-level communication. Email alternatives include cloud-based group chats using personal phones, mass notification tools sending to personal emails, and physical bulletin boards with updates. The Johnson Memorial Health case where nurses used Google Translate to communicate with an Afghan refugee during childbirth after remote translation services failed illustrates the dangerous improvisation that occurs without planning—raising serious legal and safety concerns.

Patient and family communication requires pre-scripted message templates for employee alerts, patient portal notices, inpatient notifications, media statements, and public website/social media posts. The California Hospital Association and Greater New York Hospital Association Cyber Disruption Toolkit provides excellent templates. Organizations must establish regular update schedules, use multiple channels (PA systems, postings, radios, town halls, administrative rounding), timestamp all communications for currency, and tailor talking points for different audiences. Leadership visibility through “management by walking around” during crises builds trust when staff feel most vulnerable.

Emergency departments face unique constraints versus elective facilities. EDs cannot defer care due to EMTALA (Emergency Medical Treatment and Labor Act) requirements, must accept emergent patients regardless of system status, cannot close without formal diversion declaration, and trauma designation requirements may mandate maintaining certain capabilities despite compromises. Time-sensitive decision-making for strokes (CT interpretation within minutes), STEMIs (cardiac catheterization lab availability), and trauma (rapid blood typing and surgical readiness) allows no time to retrieve patient history from alternate sources or wait for system restoration. Higher acuity means medication errors and monitoring failures become immediately life-threatening—laboratory delays like the four-hour wait at Ascension leading to patient death demonstrate the stakes.

Elective and ambulatory facilities can defer non-urgent care—postponing elective surgeries, rescheduling routine clinic appointments, delaying screening procedures, and moving wellness visits—though not without serious consequences. Cancer treatment delays of 4+ weeks are associated with increased mortality, cardiac procedures may be urgent even if not emergent, and orthopedic injuries require intervention within specific timeframes. The University of Vermont Medical Center oncology department created prioritization systems during their 25-day outage: command center for paper database management, coordinating body for treatment prioritization, expanded operating hours with additional shifts and traveling nurses, network referrals for patients needing immediate treatment, and new patient screening distinguishing recently established versus new referrals.

Legal and liability considerations add another dimension of complexity. The Springhill Medical Center case established potential precedent: hospitals may be liable for patient harm during cyber incidents regardless of attack source if they fail to maintain alternate care standards or inform patients of compromised capabilities. HIPAA violations accumulate even when organizations are victimized—covered entities remain ultimately responsible for breach notifications within 60 days, HHS Office for Civil Rights can impose fines for inadequate security safeguards even after attacks, and delayed treatment, missed diagnoses, or medication errors during downtime create medical malpractice exposure. Cyber liability insurance typically covers breach response costs and regulatory fines but may exclude physical patient harm through bodily injury exclusions, while healthcare professional liability policies may cover cyber-related patient injury unless electronic data exclusions apply—creating coverage gaps precisely when organizations face greatest financial exposure.

Regulatory mandates and voluntary frameworks converge on tabletop exercise requirements

The Joint Commission’s Emergency Management standards, revised effective July 2022 for hospitals and January 2025 for laboratories, explicitly require addressing cybersecurity risks in Hazard Vulnerability Analyses (HVA) under Standard EM.03.01.01. The Joint Commission guidance states organizations should prepare to operate entirely offline for at least four weeks (96 hours minimum operational planning)—a stark contrast to most organizations’ planning assumptions of hours or single-digit days. Standard EM.16.01.01 mandates hospitals conduct two exercises per year at each site through either two full exercises annually or one exercise plus participation in an actual community emergency event. While tabletop exercises are accepted for some requirements, the Joint Commission clarifies that “tabletop sessions, though useful, cannot serve for this portion of the exercise” for elements requiring operational testing—meaning drills, functional exercises, or full-scale exercises must validate actual operational capabilities. Required exercise elements include communication capabilities, safety and security, staff roles and responsibilities, utility systems, patient flow and clinical operations, and supplies and resources management.

Documentation requirements are extensive: After-Action Reports (AARs), Improvement Plans, and updates to Emergency Operations Plans based on findings. Standard EM.15.01.01 requires ongoing education for all staff, volunteers, physicians, and licensed practitioners consistent with their roles and responsibilities—not one-time training but continuous competency maintenance. These Joint Commission standards align with CMS Emergency Preparedness Final Rule requirements, creating both accreditation and regulatory obligations for exercise programs.

HHS’s January 2024 release of Cybersecurity Performance Goals (CPGs) provides the most comprehensive voluntary framework for healthcare sector cybersecurity. The CPGs divide into Essential and Enhanced tiers, with Essential CPG #9 explicitly requiring: “Ensure organizations consistently maintain, drill, and update cybersecurity incident response plans for relevant threat scenarios.” The ten Essential CPGs—Email Security, Endpoint Protection, Access Control, Data Protection, Asset Management, Vulnerability Management, Incident Response Planning, Multifactor Authentication, Basic Training, and Response & Recovery—represent high-impact foundational practices. The ten Enhanced CPGs add advanced capabilities including penetration testing, security operations centers, threat hunting, supply chain risk management, and cyber resilience testing.

The HHS 405(d) Program, established under the Cybersecurity Act of 2015 Section 405(d), produces Health Industry Cybersecurity Practices (HICP) guidance consisting of four volumes: the main document addressing five top threats (email phishing, ransomware, loss/theft of equipment or data, insider threats, attacks against connected medical devices) with ten best practices; Technical Volume 1 for small healthcare organizations; Technical Volume 2 for medium and large organizations; and Resources and Templates including cybersecurity assessment toolkits and policy templates. All HICP guidance maps to NIST Cybersecurity Framework based on organizational size and resources, providing scalable implementation pathways.

CISA (Cybersecurity and Infrastructure Security Agency) offers the most extensive free exercise resources through CISA Tabletop Exercise Packages (CTEPs)—comprehensive packages with 100+ pre-developed scenarios covering cybersecurity, physical security, and convergence scenarios. Healthcare-specific scenarios include ransomware attacks on healthcare systems, insider threats in medical settings, phishing campaigns targeting healthcare staff, Industrial Control System (ICS) compromise in medical facilities, medical device compromise, and Electronic Health Record (EHR) system outages. Each complete CTEP package includes a Situation Manual (SITMAN) with scenario description, exercise objectives, core capabilities being tested, module questions, and timeline of events with injects; Exercise Planner Handbook with step-by-step instructions and 12-16 week development timeline; Facilitator/Evaluator Handbook with facilitation techniques and data collection methods; Exercise Brief Slide Deck Template; Participant Materials including invitation letters and reference materials; and Evaluation Tools including HSEEP-compliant After-Action Report/Improvement Plan templates.

Healthcare-specific scenarios must reflect actual threats documented in recent incidents. Ransomware attack scenarios should include initial infection vectors (phishing email with malicious attachment), lateral movement across networks, encryption of critical systems (EHR, PACS, pharmacy systems), ransom demand discovery, decision points about paying versus restoring from backup, extended downtime lasting days to weeks, patient diversion considerations, and communication with patients, staff, media, and regulators. EHR system outage scenarios must address complete loss of EHR access, medication administration challenges, laboratory order and results management, patient identification procedures, clinical documentation methods, 4-6 week offline operation duration, and recovery prioritization.

Medical device compromise scenarios require addressing connected medical device vulnerability exploitation, patient safety implications for infusion pumps, ventilators, and imaging equipment, asset inventory challenges, patch management decisions during active patient care, coordination with device manufacturers, FDA reporting requirements, and clinical workflow alternatives. Insider threat scenarios must include privileged users with system administrative access being compromised or malicious, Personal Health Information access and exfiltration, credential misuse, detection challenges, investigation procedures while maintaining operations, HIPAA breach notification requirements, and legal and law enforcement coordination. Supply chain/third-party vendor compromise scenarios should address vendor system breaches affecting multiple healthcare organizations, service disruption for revenue cycle, telehealth platforms, or lab services, data breach notification complexities, alternative vendor activation, Business Associate Agreement implications, and long-term recovery from vendor incidents.

The Healthcare Sector Coordinating Council (HSCC) Cybersecurity Working Group, with 400-470+ members from healthcare providers, pharmaceutical companies, medical technology manufacturers, payers, and health IT entities, emphasizes the principle that “Cyber Safety is Patient Safety” across all guidance. The HSCC Health Industry Cybersecurity Strategic Plan 2024-2029, published February 27, 2024, aims to “measurably raise the level of cybersecurity preparedness and resiliency by 2029.” The October 2024 SMART Initiative (Sector Mapping and Risk Toolkit), released in response to the Change Healthcare attack, provides 17 healthcare workflow maps, usage guidelines to visualize key services supporting essential healthcare workflows, risk prioritization methodology, and recovery and continuity planning frameworks. The “On the Edge” report addresses cybersecurity challenges facing resource-constrained, small, and rural healthcare providers with recommendations for workforce development, financial support, and strategic partnerships.

Essential participants for healthcare cyber exercises span far beyond IT and security personnel. Executive leadership (CEO, COO, CFO) must participate for strategic decision-making, resource allocation, and external communications. Clinical leadership (Chief Medical Officer, Chief Nursing Officer, Department Chairs) brings patient safety perspectives, clinical workarounds knowledge, and triage protocols. Information Technology/Security (CIO, CISO, IT Director, Security Operations) provides technical response, forensics, and system recovery expertise. Legal/Compliance (General Counsel, Compliance Officer, Privacy Officer) addresses regulatory requirements, breach notification, and contracting issues. Communications (Public Relations, Marketing, Media Relations) handles internal/external messaging and reputation management. Facilities/Operations (COO, Facilities Director, Supply Chain) addresses physical security, utilities, and equipment. Human Resources (CHRO, HR Director) manages workforce communication and surge staffing. Finance (CFO, Revenue Cycle Director) assesses financial impacts, business continuity, and insurance claims. Emergency Management Coordinators activate Incident Command System and coordinate with coalitions. Clinical Informatics (Chief Medical Information Officer, clinical application specialists) prioritizes clinical system restoration and designs workarounds.

Exercise success metrics include both quantitative and qualitative measures. Quantitative metrics capture time to incident detection, time to incident declaration, time to executive notification, number of decision points successfully navigated, completeness of documentation, and stakeholder notification timeliness. Qualitative metrics assess understanding of roles and responsibilities, effectiveness of communication protocols, quality of decision-making under pressure, identification of policy/procedure gaps, cross-functional coordination effectiveness, and recognition of regulatory requirements.

Common gaps identified in healthcare exercises from HSCC, CHIME, and industry reports include: communication breakdowns (outdated contact information, redundant systems unavailable, unclear external stakeholder notification, inadequate media response); decision-making authority issues (unclear escalation paths, undefined ransom payment authority, ambiguous system shutdown/isolation authority, delayed patient diversion authorization); technical capability deficiencies (incomplete asset inventories, untested backup/recovery procedures, insufficient forensic capabilities, missing vendor contact information); clinical impact understanding gaps (IT staff unaware of clinical workflow dependencies, clinical staff unfamiliar with paper procedures, inadequate patient safety impact assessment, medical device cybersecurity knowledge deficits); regulatory/legal knowledge deficits (HIPAA breach notification requirements misunderstood, unclear law enforcement engagement procedures, unknown regulatory reporting timelines, ambiguous Business Associate responsibilities); and resource constraints (insufficient cybersecurity staffing, lack of retainer agreements with forensic firms, inadequate cyber insurance coverage, missing managed security service provider relationships).

The integration of cyber exercises with emergency preparedness programs follows NIST Cybersecurity Framework functions—Identify, Protect, Detect, Respond, Recover—and FEMA’s Homeland Security Exercise and Evaluation Program (HSEEP) methodology. HSEEP’s five-phase exercise cycle (Program Management, Design and Development, Conduct, Evaluation, Improvement Planning) provides standardized structure ensuring exercises produce actionable findings and measurable improvements. ASPR TRACIE (Technical Resources, Assistance Center, and Information Exchange) provides healthcare-specific HSEEP implementation support including exercise templates, CMS-compliant After-Action Report templates, healthcare scenario libraries, Subject Matter Expert support, and peer networking opportunities.

The evidence overwhelmingly demonstrates that tabletop exercises aren’t optional formalities but essential patient safety interventions. Memorial Health Systems successfully managed a ransomware attack specifically because prior tabletop exercise training covered paper-based workflow procedures, department-specific response protocols, executive decision-making processes, and communication protocols—preparation that directly translated to operational resilience during actual crisis. Organizations that treat exercises as compliance checkboxes rather than serious preparedness investments consistently experience the communication failures, authority confusion, technical gaps, and patient safety compromises documented across recent major incidents.

The verdict: cyber exercises are patient safety imperative, not IT exercise

When attackers encrypted Change Healthcare’s systems on February 21, 2024, they didn’t just compromise data—they threatened the ability of every American to access healthcare. This wasn’t hyperbole. Within days, patients couldn’t get prescription authorizations, providers couldn’t verify insurance eligibility, hospitals couldn’t submit claims for services rendered, and the entire revenue cycle ground to a halt. The attack exposed what security professionals have warned for years: in healthcare, cyber incidents aren’t abstract technology problems but immediate threats to human life requiring the same systematic preparedness as natural disasters, mass casualty events, and pandemics.

The statistics compiled in this research paint an unambiguous picture. With 72% of attacked healthcare organizations suffering patient care disruption, 29% documenting increased mortality rates, medication errors occurring when electronic safety checks disappear, four-hour delays for critical lab results leading to patient deaths, regional hospital systems experiencing 35% surges in emergency volume from adjacent facility attacks, and confirmed cases of near-fatal medication errors during downtime, the evidence that cyberattacks directly threaten patient survival is overwhelming.

Healthcare’s fundamental difference from every other sector creates the urgent need for specialized crisis exercises. Banks can shut down during incidents and restore service when secure. Retailers can close stores temporarily. Manufacturers can idle production. Healthcare cannot stop—patients in emergency departments, intensive care units, operating rooms, and labor and delivery units require continuous care regardless of system availability. This creates impossible tensions: security teams need extended shutdowns for forensic investigation while clinical teams need immediate access to patient records, medication lists, and vital signs. The Springhill Medical Center case crystallizes the stakes—an alleged infant death during ransomware downtime when fetal monitoring systems failed represents the difference between cyber incidents in healthcare versus every other industry.

The regulatory landscape has shifted from voluntary guidance to mandatory requirements with substantial penalties. The proposed January 2025 HIPAA Security Rule changes eliminate “addressable” specifications, making encryption, multi-factor authentication, and regular incident response testing mandatory with $9 billion first-year compliance costs. OCR’s October 2024 Risk Analysis Enforcement Initiative makes inadequate preparedness a priority enforcement target. Seven of the first eleven 2024 enforcement actions involved ransomware, with penalties ranging from $90,000 to $1.19 million plus multi-million dollar state settlements. The Joint Commission requires demonstrating 96-hour operational capability without electronic systems through tested exercises conducted twice yearly. State laws like California’s CMIA impose stricter standards than federal HIPAA. FDA medical device cybersecurity requirements add another compliance layer. Organizations can no longer defer cybersecurity preparedness as “when we get to it”—regulators expect demonstrated competency through exercised plans.

The vulnerability landscape ensures attacks will continue escalating. With 75% of infusion pumps containing known vulnerabilities, 661 distinct medical device vulnerabilities identified, average devices containing 6.2 vulnerabilities, and new critical flaws like the Contec CMS8000 patient monitor backdoor emerging regularly, medical devices create exploitable attack surfaces directly connected to patient lives. IT/OT convergence problems—76% of devices running 20+ different OS versions, legacy systems with 10-20 year lifecycles, incomplete asset inventories discovering 50-60% more devices than documented—make comprehensive security nearly impossible. The 180% year-over-year increase in vulnerability exploitation as initial attack vector shows adversaries actively targeting these weaknesses.

Healthcare-specific incident response challenges require healthcare-specific preparedness. Generic cybersecurity tabletop exercises designed for financial services or retail fail to address medication administration without electronic drug interaction alerts, laboratory result delivery through runner systems when pneumatic tubes fail, radiologist on-site availability for manual CT interpretation during stroke protocols, blood bank type-and-crossmatch procedures without electronic systems, language access services when remote translation fails, communication when VoIP phones go down, facility security when badge systems fail, and the fundamental patient care versus containment tension that healthcare uniquely faces. The Ascension attack revealed that younger clinicians lack basic manual skills—manual blood pressure auscultation, paper prescription writing, medication calculations without automated systems, proper medical order documentation—because they’ve never practiced medicine without electronics. Training must address this competency gap.

The comprehensive frameworks now available eliminate any excuse for inadequate preparedness. HHS 405(d) HICP guidance provides scalable practices for organizations of all sizes. HHS Cybersecurity Performance Goals specify exactly which capabilities to prioritize. CISA CTEPs offer 100+ free pre-developed scenarios with complete facilitation guides, participant materials, and evaluation tools. Joint Commission standards clarify exercise requirements and documentation expectations. Healthcare Sector Coordinating Council resources provide sector-specific expertise. The step-by-step implementation guidance exists—organizations need only commit resources and leadership attention.

The choice facing healthcare organizations is stark: invest in systematic preparedness through realistic tabletop exercises and operational drills now, or improvise during actual incidents when patients’ lives hang in balance. The pattern across documented incidents shows that organizations with prior exercise experience successfully maintain patient care during attacks while unprepared organizations experience medication errors, laboratory delays causing deaths, ambulance diversions, and extended downtimes threatening financial viability. Memorial Health Systems succeeded specifically because tabletop training prepared staff for paper workflows, decision protocols, and communication procedures. Ascension, despite being a massive 140-hospital system, suffered near-fatal medication errors and documented patient harm because staff reported receiving “no training” for extended outages.

The JAMA study of Scripps Health’s ransomware attack provides the definitive proof that cyber incidents function as regional disasters, not isolated events. When one health system goes down, adjacent facilities experience 35% increases in ambulance arrivals, wait times jump 48%, patients leaving without being seen more than double, and county-wide diversion hours increase 74%. This requires coordinated regional planning through Healthcare Coalitions, mutual aid agreements, patient surge protocols, and information sharing—all elements that must be exercised before crisis, not improvised during chaos.

The evidence compiled in this definitive research report demonstrates beyond question that healthcare cybersecurity tabletop exercises represent essential patient safety interventions, not IT formalities. When cyberattacks can cause medication errors, laboratory result delays leading to deaths, ambulance diversions during strokes and heart attacks, and system-wide paralysis affecting every hospital in America, organizations cannot afford to treat preparedness as optional. The regulatory mandates, proven vulnerabilities, documented patient harms, and comprehensive frameworks all converge on a single imperative: healthcare must systematically prepare for cyber disasters through realistic exercises where the only casualties are lessons learned, not human lives.

In healthcare, minutes mean lives. When ransomware encrypts systems and electronic health records vanish, when medication alerts disappear and drug interaction checks fail, when laboratory results can’t reach clinicians and vital signs monitoring goes dark, every delayed decision, every confused staff member, every missing procedure or protocol directly threatens patient survival. Tabletop exercises transform those critical minutes from chaos into coordinated response, from improvisation into execution of practiced plans, from preventable tragedy into demonstrated resilience. The investment in preparedness today—the executive time, the staff training, the scenario development, the facilitated discussions—quite literally translates to saved lives tomorrow. Healthcare organizations that recognize this reality and commit to rigorous, ongoing cyber exercise programs will protect both their patients and their institutions. Those that don’t will join the growing list of cautionary tales where inadequate preparedness met sophisticated attackers, and patients paid the price.

Share this article

Tags

healthcare patient safety cyberattacks HIPAA hospital security critical infrastructure
More Insights

Explore More Insights

Discover more cybersecurity training strategies and war gaming insights in our blog.