




版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
2024HIMSSHealthcareCybersecuritySurvey
TableofContents
ExecutiveSummary 3
MethodologyandDemographics 4
Methodology 4
Demographics 4
LevelsofResponsibility 5
TypesofOrganizationsRepresented 5
EconomicsofHealthcareCybersecurity 6
BudgetsareImproving 6
OverallITBudgetsareModestlyImproving 6
AllocationofcurrentITbudgettocybersecurity 7
Comparing2023to2024:CybersecurityBudgetAllocations 8
TrendsinCybersecurityBudgetAllocations 9
CybersecurityBudgetsProjectedtoRise 10
Changestocybersecuritybudgetin2025 10
EffectofCybersecurityBudgetIncreasesin2025 11
SecurityAwareness 12
SecurityAwarenessPrograms 12
Effectivenessofsecurityawarenessprograms 13
SecurityIncidents 14
SignificantSecurityIncidents 14
InitialPointsofCompromise 14
TestingofIncidentResponsePlans 15
StakeholderParticipationinTabletopExercises 16
What’sHappeningwithRansomware 17
PresentState 17
2024RansomwareTrends 17
RansomwareTrends:2022-2024 18
ToPayorNottoPay–RansomwarePayments 19
Proactivevs.ReactiveSecurityMeasures 20
FutureState 21
AIAdoptioninHealthcare 22
AllowingtheUseofAIinHealthcare 22
2
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ToGovernorNot:OrganizationalApproachestoAI 22
AITechnologyUseCases 23
AIGuardrails 24
ApprovalProcessforAITechnology 24
ActiveMonitoringofAITechnology 25
AcceptableUsePolicyforAITechnology 25
FutureConcernsRegardingAI 26
ManagingThird-PartyRisks 27
Third-PartyRiskManagementPrograms 27
Third-PartySecurityIncidents 28
ImpactsofThird-PartySecurityIncidents 29
InsiderThreatPrograms 30
FormalInsiderThreatPrograms 30
InsiderThreatandAI 31
InsiderThreatActivityInvolvingThirdParties 32
Conclusion 33
AboutHIMSS 34
HowtoCitethisSurvey 34
HowtoRequestAdditionalInformation 34
3
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ExecutiveSummary
CybersecurityBudgets
昭Investments-Organizationsarededicatingmoreresourcestofortifydefenses.皿StrategicFocus-Budgetsareincreasinglyalignedwithcriticalvulnerabilities.
SecurityAwareness
回PhishingMitigation-Programstargetphishing,theleadingattackvector.
InnovativeTraining-Gamificationandscenario-basedtrainingboostengagement.
SecurityIncidents
PhishingDominance-Phishingisthetopmethodofcompromise.岔AI-DrivenAttacks-Deepfakesareanemergingthreat.
Ransomware
VCombattingRansomware-Ransomwaredefensecontinuestobeapriority.
×FewerRansomPayments-Fewerransomwarevictimsarereportingpayingransom.
ArtificialIntelligence
目PolicyShortfalls-AlackofformalAIgovernanceincreasesrisk.虱LimitedOversight-ThereislimitedmonitoringofAIusage.
Third-PartyRisks
&Third-PartyIncidents-Significantincidentsinvolvingthird-partiesarenotable.?Impacts-Third-partyincidentscausedisruptionandotherimpacts.
InsiderThreats
圓FormalPrograms-Formalprogramsareneededtomanageinsiderthreats.
4
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
MethodologyandDemographics
The2024HIMSSHealthcareCybersecuritySurveyreflectstheresponsesof273healthcarecybersecurityprofessionals.Theseprofessionalshadatleastsomeresponsibilityforday-to-daycybersecurityoperationsoroversightofthehealthcareorganization’scybersecurity
program.Respondentswhoindicatedtheydidnothaveanylevelofresponsibilityforeitherday-to-daycybersecurityoperationsoroversightwerenoteligibletotakethesurvey.
Methodology
ThedataforthissurveywascollectedbetweenNovember6andDecember16,2024.
Questionsaskedrespondentsabouttheirperspectives,knowledge,andexperiencesoverthepast12months.Forsimplicity,werefertothisdataas"2024"throughoutthisreport.
Similarly,datafromprevioussurveysisidentifiedbytheyearinwhichitwascollected.
Demographics
AsshowninFigure1below,respondentsheldvariousroles,includingexecutive
management(50%),non-executivemanagement(37%),andnon-management(13%).
ExecutivemanagementincludedindividualsintheC-suite,non-executivemanagementcomprisedseniormanagement,andnon-managementencompassedanalystsand
specialists.
Figure1:RespondentRoles
5
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
LevelsofResponsibility
AsshowninFigure2below,respondentsreportedvaryinglevelsofinvolvementintheir
organization'scybersecurityprograms.46%hadprimaryresponsibility,30%shared
responsibility,and24%wereinvolvedasneededintheday-to-dayoperationsoroversight.
Figure2:RespondentCybersecurityResponsibility
TypesofOrganizationsRepresented
AsshowninFigure3below,respondentsrepresentedadiverserangeoforganizations,includinghealthcareproviders(50%),vendors(18%),consultingfirms(13%),governmententities(8%),andotherorganizations(11%).Otherorganizationsincludedacademic
institutions,non-profits,payors,andlifesciencescompanies.
Figure3:TypesofOrganizations
6
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
EconomicsofHealthcareCybersecurity
Investinginrobustcybersecuritymeasuresisnolongeroptionalforhealthcare
organizations—itisessential.Yet,achievingastrongcybersecurityposturerequires
sufficientresources,whichareoftenlimitedbybudgetaryconstraints.ChiefInformationSecurityOfficersandtheirteamsfrequentlyfindthemselvesbalancingtheneedto
addressevolvingthreatswiththerealityoftightfinancialresources.
Healthcareorganizationswithgreaterfinancialresourcesarebetterequippedtoleveragerobustcybersecuritysolutions.Sufficientcybersecurityfundingenablesorganizationsto
accessadvancedtools,hireskilledpersonnel,andimplementcomprehensivestrategies.Conversely,limitedbudgetscanposechallenges,makingitmoredifficulttoaddresstheever-evolvingcyberthreatlandscapeeffectively.However,evenwithmodestresources,strategicplanningandprioritizationcanplayacriticalrole.
BudgetsareImproving
OverallITBudgetsareModestlyImproving
Traditionally,healthcareorganizationshavegenerallyallocated6%orlessoftheirIT
budgetstocybersecurity,accordingtoaggregatedatafromthe2018to2022and2024
HIMSSHealthcareCybersecuritySurveys.SincecybersecuritybudgetsaretypicallycarvedoutofoverallITbudgets,thissurveyexaminedboththeexpectedchangesinoverallIT
budgetsfromfiscalyear2024tofiscalyear2025andthecurrentallocationofthosebudgetstocybersecurity.
AsshowninFigure4below,aslightmajorityofrespondents(52%)reportedthattheir
organizations’overallITbudgetswouldincreaseduringthisperiod,while10%indicatedadecrease.28%ofrespondentsreportednochangeintheiroverallITbudgets.TenpercentofrespondentsdidnotknowabouttheanticipatedchangeinITbudgetfrom2024to
2025.
Figure4:AnticipatedChangeinITBudget2024to2025
7
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
AllocationofcurrentITbudgettocybersecurity
UnderstandinghoworganizationsallocatetheirITbudgetstocybersecurityprovides
valuableinsightintotheirprioritizationofsecuritymeasures.Variabilityinspendinglevelshighlightsdifferencesinhoworganizationsapproachprotectingtheirsystemsanddata.Thesebudgetarydecisionspresentopportunitiestostrengthendefensesandenhance
preparednessagainstevolvingthreats.
WhenaskedaboutorganizationalallocationofthecurrentITbudgettocybersecurity,20%ofrespondentsindicatedthattheirorganizationhadnospecificcarve-outbutspent
moneyoncybersecurity,asshowninFigure5below.However,19%ofrespondents
reportedtheirorganizationsallocated3-6%oftheoverallITbudgettocybersecurity;14%reported7-10%;7%reported11-14%;9%reportedmorethan14%;and7%reported1-2%.Onepercentofrespondents—severalvendorsandahealthcareprovider—indicated
theirorganizationsdonotspendanymoneyoncybersecurity.Notably,23%of
respondentsdidnotknowwhatpercentageoftheirorganizations’ITbudgetswereallocatedtocybersecurity.
Figure5:PercentofOrganization’sITBudgetSpentonCybersecurity
8
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Comparing2023to2024:CybersecurityBudgetAllocations
Datafromthe2023and2024HIMSSHealthcareCybersecuritySurveysrevealanotable
shiftincybersecuritybudgetallocations.Thepercentageoforganizationsallocating3-6%oftheirITbudgetstocybersecurityincreasedfrom13%in2023to18%in2024,whilethoseallocating1-2%decreasedfrom10%to7%,asshownbelowinFigure6.Allocations
between7-10%weresimilar,decreasingslightlyfrom15%oforganizationsin2023to14%in2024,whileabove10%droppedsignificantly,from21%oforganizationsin2023to16%in
2024,reflectingapossibleredistributionofresourcesormorestrategicspending.
Thepercentageoforganizationswithoutaspecificcarve-outforcybersecurityincreasedslightly,from19%in2023to20%in2024.Additionally,respondentsunawareoftheir
organizations’cybersecuritybudgetallocationsrosefrom19%in2023to23%in2024,
pointingtopotentialgapsincommunicationorgovernanceovercybersecurityspending.
Thesefindingssuggestthatorganizationsareoptimizingcybersecurityinvestments,movingtowardmoremoderatebudgetallocations.However,theincreaseinrespondents
unawareoftheirorganizations’cybersecuritybudgetallocationsunderscorestheneedforimprovedcommunicationaroundcybersecuritypriorities.Whileexecutivemanagement
respondentsweregenerallyawareofcybersecuritybudgetallocations,non-managementandnon-executivemanagementrespondentsdemonstratedlimitedawareness,
highlightinganopportunityforbetterinformationsharingaboutorganizationalcybersecurityprograms.
Figure6:CybersecurityBudgetAllocation,2023vs.2024
TrendsinCybersecurityBudgetAllocations
Overtheyears,cybersecuritybudgetallocationwithinITbudgetshasshownnotable
fluctuations,reflectingchangesinorganizationalprioritiesandresourceallocation
strategies.AsshowninTable1,organizationsreportingnocybersecurityallocation
remainedsteadyat1-3%,whileallocationsinthe1-2%rangepeakedat18%in2020but
droppedto7%in2024.Budgetsinthe3-6%rangedippedto13%in2023beforerecoveringto18%in2024,indicatingstabilityinmoderatespending.Allocationsinthe7-10%range
graduallyincreasedfrom10%in2020to14%in2024,showinggrowinginvestmentinhighercybersecuritybudgets.Budgetsexceeding10%peakedat21%in2023beforefallingto
16%in2024,suggestingshiftstowardmorebalancedspending.
Thepercentageofhealthcareorganizationswithflexibleorunspecifiedcybersecurity
budgetsdeclinedfrom26%in2019to20%in2024,reflectingimprovedbudgeting
practices.However,respondentsunawareoftheirorganizations’cybersecuritybudgets
rosefrom18%in2020to23%in2024,highlightingcommunicationgaps.Whilemodest
increasesinhealthcarecybersecuritybudgetsareevident,additionalinvestmentsare
criticaltoaddressgrowingthreats,protectsensitiveassets,andsupportnewtechnologies.Withoutsufficientfunding,organizationsriskdisruptionstopatientcare,lossoftrust,and
significantfinancialandreputationalharm.
Table1:CybersecurityBudgetAllocation,2019-2024
BudgetAllocation
2019
2020
2021
2023
2024
Noallocation
1%
1%
1%
3%
1%
1-2percent
9%
18%
18%
10%
7%
3-6percent
25%
24%
22%
13%
19%
7-10percent
11%
10%
15%
15%
14%
Morethan10percent
10%
6%
11%
21%
16%
FlexibleAllocation
26%
23%
24%
19%
20%
Don’tKnow
18%
18%
10%
19%
23%
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety9
10
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
CybersecurityBudgetsProjectedtoRise
Changestocybersecuritybudgetin2025
Anticipatedchangestocybersecuritybudgetsprovideinsightintoorganizations,evolvingprioritiesandstrategies.Withthegrowingcomplexityofcyberthreats,manyorganizationsrecognizetheneedtoadjusttheirspendingtostayahead.Theseshiftshighlightan
increasingfocusonbolsteringdefensesandaddressingemergingrisks.AsshowninFigure7below,amongrespondentswhoreportedaspecificallocationfortheirorganizations,
cybersecuritybudgets,aslightmajority(55%)anticipatedanincreasein2025.Only4%expectedadecrease,while21%statedtheirbudgetswouldremainthesame.Notably,20%ofrespondentsindicatedtheydidnotknow.
Figure7:ChangetoCybersecurityBudgetin2025
11
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
EffectofCybersecurityBudgetIncreasesin2025
Amongrespondentswhoindicatedthattheircybersecuritybudgetswouldincrease,we
askedwhethertheincreaseenabledtheirorganizationstomakemeaningful
improvements,suchasinvestinginadditionalstaff,tools,and/orpolicies.Asshownin
Figure8,amajority(57%)reportedsignificantimprovementstothetoolstheyuse,47%
reportedsignificantimprovementstopolicies,and31%reportedsignificantimprovementstostaff.Notably,34%statedthattheincreaseallowedforonlysomeimprovementsacrossstaff,tools,andpolicies.Threepercentindicatedthattheincreasemerelymaintained
existingsupportforstaff,tools,andpolicies,and8%ofrespondentsstatedthattheydidnotknow.
Figure8:ImpactofIncreaseinCybersecurityBudgetfor2025
12
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
SecurityAwareness
SecurityAwarenessPrograms
Effectivesecurityawarenesstrainingisvitalforhelpingemployeesrecognizeandrespondtocybersecuritythreats.Organizationsuseavarietyofmethodstoengagetheir
workforcesandreinforcekeyconcepts,tailoringtheirapproachestoaddresstheirspecificrisks.Understandingthestrategiesemployedprovidesvaluableinsightintohow
organizationsprioritizeeducationaspartoftheiroveralldefensestrategies.
AsshowninFigure9below,respondentsreportedusingavarietyofmethodsforsecurityawarenesstraining,with73%citingregularemailalertsandcommunications,63%using
simulatedphishing,49%usinginteractivediscussions,and47%holdingin-personorvirtualworkshops.Incidentresponseexercisesliketabletopswereusedby38%,while10%
engagedininteractivegames.Notably,4%reportednotraining,2%wereunawareif
trainingoccurred,and3%usedalternatemethodslikevideo-basedtrainingor
complianceactivities,whicharenotequivalenttoeffectivecybersecuritytraining.Only40%addressedemergingthreatslikedeepfakes,quishing(QRcodephishing),and
smishing(SMSphishing),highlightingtheneedforcomprehensive,up-to-datetrainingprogramstocounterevolvingthreats.
Organizationsmayneedtodevelopcustomtrainingprogramssinceoff-the-shelfsecurity
awarenesstrainingmightnotadequatelyaddressemergingthreats.Tailoredapproachesensurethattrainingisrelevantandcomprehensive,equippingteamstoeffectivelyidentifyandrespondtosophisticatedattacks.
Figure9:MethodsforSecurityAwarenessTraining
13
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Effectivenessofsecurityawarenessprograms
Securityawarenessprogramsareakeyelementoforganizationaldefense,designedto
educateemployeesonrecognizingandrespondingtopotentialthreats.Ascybersecurityriskscontinuetoevolve,theeffectivenessoftheseprogramsiscriticalinreducing
vulnerabilitiesandpreventingincidents.Evaluatinghowwelltheseprogramsperformcanhighlightareasforimprovementandensuretheyremainalignedwiththechangingthreatlandscape.
AsshowninFigure10below,weaskedrespondentswhoseorganizationsconductsecurityawarenessprogramstoassesstheeffectivenessoftheseprograms.Amajority(62%)
indicatedtheirprogramsaresomewhateffective,while18%describedthemasvery
effective.Another18%reportedtheirprogramsareonlyslightlyeffective,and2%statedtheyarenoteffectiveatall.Therelativelylowpercentageofrespondentsratingtheir
programsasveryeffective(18%)suggestsaneedforenhancedstrategies.Itissuggestedthatorganizationsfocusonkeyareasforimprovement,includingaddressingemerging
threatsandmitigatingrisksfromnewandemergingtechnologies.Strengtheningthese
securityawarenessprogramscouldbetterequiporganizationstostayaheadofevolvingcybersecuritychallengesandbolstertheiroveralldefenses.
Proactivemeasures,suchasgamification,tabletopexercises,andinteractiveworkshops,canhelpeducatetheworkforceaboutbothbasicandadvancedthreats.These
approachescanengageemployeeseffectively,fosteringpracticalskillsandawareness.
Socialengineeringremainsadominantattackmethod,makingitcrucialforsecurityawarenessprogramsinhealthcareorganizationstoaddressemergingthreatssuchasdeepfakes(image,audio,video),smishing,andquishing.
Figure10:EffectivenessofSecurityAwarenessTrainingPrograms
14
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
SecurityIncidents
SignificantSecurityIncidents
InitialPointsofCompromise
Understandinginitialpointsofcompromiseiskeytoidentifyingvulnerabilitiesand
strengtheningdefensessincetheyoftenserveasgatewaysforattackers.Addressingtheseweaknessescansignificantlyreducetheriskofbreachesandimprovesecurityposture.AsshowninFigure11below,weaskedrespondentstoidentifyinitialpointsofcompromiseforsignificantsecurityincidentsinthepastyear.Generalemailphishing(63%),SMSphishing
andtargetedspear-phishing(each34%),businessemailcompromise(31%),phishing
websites(21%),maliciousads(20%),socialmediaphishing(19%),vishing(voicephishing)(17%),andwhaling(alsoknownasexecutiveimpersonation)(16%),deepfakeimages(6%),audiodeepfakes(4%),videodeepfakes(3%),distributeddenialofservice(DDoS)attacks(3%),andprivacybreaches(3%)werereported.Eightpercentdidnotknow.Eighteen
percentreportednosignificantsecurityincidents,
Figure11:InitialPointsofCompromiseforSignificantSecurityIncidentsinthePast12Months
15
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
TestingofIncidentResponsePlans
Regulartestingofincidentresponseplansisessentialtoensureorganizationsarepreparedtohandlecybersecurityincidentseffectively.Tabletopexercisesplayacriticalrolein
identifyinggaps,improvingcoordination,andstrengtheningoverallresponsecapabilities.Understandinghowfrequentlyorganizationsengageintheseexercisesprovidesinsight
intotheirlevelofpreparednessandcommitmenttomitigatingpotentialrisks.
Weaskedrespondentswhethertheirorganizationsconducttabletopexercisestotestthecapabilitiesoftheirincidentresponseprograms.AsshowninFigure12below,45%of
respondentsindicatedthattheirorganizationsdoconducttabletopexercises,while39%reportedtheydonot.Sixteenpercentstatedthattheywereunsurewhethertheir
organizationsconducttabletopexercises.
Thesefindingshighlightamixedlevelofpreparednessamongorganizations,withmany
failingtotesttheirincidentresponseplansbyusingtabletopexercises.Tabletopexercisesarecriticalforsimulatingvariousscenarios,identifyinggapsinresponsecapabilities,andstrengtheningoverallincidentresponsestrategies.
The16%ofrespondentsunawareofwhethertheirorganizationsconducttheseexercisespointstopotentialgapsincommunicationandparticipation.Thisunderscoresthe
importanceofincludingallrelevantstakeholders—regardlessoftheirrole—intabletopexercises.Improvingcommunicationandtransparencyaboutincidentresponseefforts
canhelpensurebroaderorganizationalawarenessandmoreeffectivepreparednessforpotentialincidents.
Figure12:OrganizationsConductingTabletopExercisesforIncidentResponseTesting
16
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
StakeholderParticipationinTabletopExercises
Respondentswhoseorganizationsconducttabletopexercisesidentifiedparticipants.Theresultsshowadiverserangeofparticipantsbutalsohighlightgapsinparticipation.As
showninFigure13below,ITstaff(89%)andcybersecuritystaff(77%)werethemost
frequentlyinvolvedstakeholders,reflectingtheircriticalrolesinmanagingandrespondingtoincidents.Seniormanagementparticipationwasreportedat73%,whileexecutives,
includingC-suiteleaders,participatedin58%ofcases,demonstratingrobustlevelofleadershipengagement.
Otherdepartmentswithinhealthcareorganizationswereinvolvedintabletopexercises:
?Compliance(48%)
?Clinicians(44%)
?Informatics(44%)
?Humanresources(43%)
?Legal(42%)
?Accountingandfinance(35%)
Externalparties,suchasvendors(22%)andcontractors(15%),hadlowparticipationrates.Thismaypointtoanareaforimprovement,giventheirpotentialinvolvementwhen
incidentsoccur.Additionally,theboardofdirectorsparticipatedinonly21%ofcases,
despitetheircriticalroleinoverseeingcybersecurityrisk.Twopercentofrespondents
statedtheydidnotknowwhichstakeholdersparticipate,whileanother2%reportedthatotherstakeholders,suchasemergencypreparednessprofessionals,wereinvolvedonanadhocbasis.
Figure13:TabletopExerciseParticipants
What’sHappeningwithRansomware
PresentState
Ransomwareattackscontinuetobeasignificantthreat.Oftenstatesponsored,these
attacksarehighlyorganizedandsophisticated.Healthcareorganizationsexperienced
aggressiveattackssinceatleast2018,andthethreatremainsaspersistentasever
.1
Ransomwareleaksitesareprevalent
.2
Healthcareproviders,payors,vendors,andotherentitiesacrossthehealthcareecosystemhavebeentargeted.Ransomwareremainsa
criticalissue,highlightingtheneedforrobustdefensesandeffectiveresponsestrategies.
2024RansomwareTrends
Healthcareorganizationsappeartobepreparedtopreventanddefendagainst
ransomwareattacksin2024.AsshownbelowinFigure14,amajorityofrespondents(74%)indicatedthattheirorganizationshadnotexperiencedransomwareattacksinthepast12months.However,13%reportedthattheirorganizationshadbeentargeted,underscoringtheongoingriskransomwareposestothehealthcareandpublichealthsector.Thirteen
percentofrespondents—primarilyfromnon-executivemanagementandnon-managementroles—statedtheydidnotknowwhethertheirorganizationshadexperiencedsuchanattack.
Figure14:RansomwareAttackin2024
1U.S.DepartmentofHealthandHumanServices.RansomwareTrendsinHealthcare.,
/sites/default/files/ransomware-healthcare.pdf.AccessedJan.242025
.
2PaloAltoNetworks.Unit42RansomwareLeakSiteDataAnalysis.PaloAltoNetworks,
/unit-42-ransomware-leak-site-data-analysis/.AccessedJan
.242025.
17
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
18
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
RansomwareTrends:2022-2024
Thepercentageofrespondentsreportingthattheirorganizationsexperienced
ransomwareattackshasremainedrelativelyconsistentinrecentyears.AsshowninFigure15below,in2024,13%indicatedtheirorganizationshadexperiencedaransomware
attack,slightlyhigherthanthe12%reportedin2023andmatchingthe13%reportedin
2022.Similarly,thepercentageofrespondentsreportingnoransomwareattacksremainedsteadyat74%in2024,comparedto75%in2023and78%in2022.Respondentswhodid
notknowwhethertheirorganizationsexperiencedaransomwareattackwere13%ofrespondentsin2023and2024,comparedto9%in2022.
Thesefindingshighlighttheimportanceofimprovingvisibilityandtransparencyregardingransomwareincidents.Evenwhenorganizationsarenotdirectlyimpacted,thepersistentthreatofransomwarenecessitatesconstantvigilance,proactiveplanning,androbust
defensestosafeguardsensitiveassetsandensureoperationalandclinicalcontinuity.
Figure15:RansomwareAttacksfrom2022-2024
19
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ToPayorNottoPay-RansomwarePayments
Ransomwarevictimsfacethetoughdecisionofwhethertopay,basedontheirspecificcircumstances.Amonghealthcareorganizationsvictimizedin2024,62%ofrespondentsreportednotpayingaransom,11%paidtheransom,and27%didnotknow,asshowninFigure16.In2023,30%ofrespondentsstatedthattheirorganizationspaidtheransom,
while52%didnot,and18%didnotknow,asshownbelowinFigure17.Payingaransomnotonlyhasthepotentialtoemboldenthreatactorsbutalsoincreasesthelikelihoodofrepeatedtargetingoradditionalattacksonotherhealthcareorganizations.Thereisa
needforbettercoordination,planning,andinformationsharingtoimproveresilience.
Figure16:RansomwarePaymentsin2024
Figure17:RansomwarePaymentsin2023-2024
20
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Proactivevs.ReactiveSecurityMeasures
Organizationsreportedarangeofproactivean
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 酒店管理師協(xié)會管理試題及答案
- 2024廣西環(huán)江毛南族自治縣公開招聘國有企業(yè)高層管理人員2人筆試參考題庫附帶答案詳解
- 2024年西安工業(yè)投資集團有限公司招聘(2人)筆試參考題庫附帶答案詳解
- 2024天津中煤進出口有限公司招聘工作人員3人筆試參考題庫附帶答案詳解
- 2024中鋁國際貿(mào)易集團有限公司招聘4人筆試參考題庫附帶答案詳解
- 《第二單元 漢字輸入:6 連詞成句變化多》教學設計-2023-2024學年浙江攝影版(2023)三年級下冊
- 人教版初中歷史與社會七年級下綜合探究八過去是怎樣被記載下來的之認識不同類型的資料 教學設計
- 二年級道德與法治上冊 第四單元 2《你真棒》教學實錄2 浙教版
- Unit 6 Im going to study computer science. Section A 2a-2d 教學設計 2024-2025學年人教版英語八年級上冊
- (新課標)高中歷史 第八單元 日本明治維新 8.4 走向世界的日本教學實錄 新人教版選修1
- 團體心理輔導課件-團體輔導的目標及類型
- 風力發(fā)電機機組齒輪箱檢修知識培訓課件
- 鼎太風華五期商業(yè)策劃執(zhí)行報告-課件
- PEP人教版英語五年級下冊 Unit 2 My favourite season大單元作業(yè)設計
- 小學心理健康教育-幸福賬單教學設計學情分析教材分析課后反思
- WebRTC音視頻實時互動技術:原理、實戰(zhàn)與源碼分析
- 鍋爐房日常隱患排查表
- 維也納國際酒店-績效考核管理制度
- 美克爾憩室課件
- Unit 2 Morals and Virtues Reading and Thinking (I)示范課教案【英語人教必修第三冊】
- 雨、污水管道施工方案
評論
0/150
提交評論