




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
2024HIMSSHealthcareCybersecuritySurvey
TableofContents
ExecutiveSummary 3
MethodologyandDemographics 4
Methodology 4
Demographics 4
LevelsofResponsibility 5
TypesofOrganizationsRepresented 5
EconomicsofHealthcareCybersecurity 6
BudgetsareImproving 6
OverallITBudgetsareModestlyImproving 6
AllocationofcurrentITbudgettocybersecurity 7
Comparing2023to2024:CybersecurityBudgetAllocations 8
TrendsinCybersecurityBudgetAllocations 9
CybersecurityBudgetsProjectedtoRise 10
Changestocybersecuritybudgetin2025 10
EffectofCybersecurityBudgetIncreasesin2025 11
SecurityAwareness 12
SecurityAwarenessPrograms 12
Effectivenessofsecurityawarenessprograms 13
SecurityIncidents 14
SignificantSecurityIncidents 14
InitialPointsofCompromise 14
TestingofIncidentResponsePlans 15
StakeholderParticipationinTabletopExercises 16
What’sHappeningwithRansomware 17
PresentState 17
2024RansomwareTrends 17
RansomwareTrends:2022-2024 18
ToPayorNottoPay–RansomwarePayments 19
Proactivevs.ReactiveSecurityMeasures 20
FutureState 21
AIAdoptioninHealthcare 22
AllowingtheUseofAIinHealthcare 22
2
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ToGovernorNot:OrganizationalApproachestoAI 22
AITechnologyUseCases 23
AIGuardrails 24
ApprovalProcessforAITechnology 24
ActiveMonitoringofAITechnology 25
AcceptableUsePolicyforAITechnology 25
FutureConcernsRegardingAI 26
ManagingThird-PartyRisks 27
Third-PartyRiskManagementPrograms 27
Third-PartySecurityIncidents 28
ImpactsofThird-PartySecurityIncidents 29
InsiderThreatPrograms 30
FormalInsiderThreatPrograms 30
InsiderThreatandAI 31
InsiderThreatActivityInvolvingThirdParties 32
Conclusion 33
AboutHIMSS 34
HowtoCitethisSurvey 34
HowtoRequestAdditionalInformation 34
3
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ExecutiveSummary
CybersecurityBudgets
昭Investments-Organizationsarededicatingmoreresourcestofortifydefenses.皿StrategicFocus-Budgetsareincreasinglyalignedwithcriticalvulnerabilities.
SecurityAwareness
回PhishingMitigation-Programstargetphishing,theleadingattackvector.
InnovativeTraining-Gamificationandscenario-basedtrainingboostengagement.
SecurityIncidents
PhishingDominance-Phishingisthetopmethodofcompromise.岔AI-DrivenAttacks-Deepfakesareanemergingthreat.
Ransomware
VCombattingRansomware-Ransomwaredefensecontinuestobeapriority.
×FewerRansomPayments-Fewerransomwarevictimsarereportingpayingransom.
ArtificialIntelligence
目PolicyShortfalls-AlackofformalAIgovernanceincreasesrisk.虱LimitedOversight-ThereislimitedmonitoringofAIusage.
Third-PartyRisks
&Third-PartyIncidents-Significantincidentsinvolvingthird-partiesarenotable.?Impacts-Third-partyincidentscausedisruptionandotherimpacts.
InsiderThreats
圓FormalPrograms-Formalprogramsareneededtomanageinsiderthreats.
4
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
MethodologyandDemographics
The2024HIMSSHealthcareCybersecuritySurveyreflectstheresponsesof273healthcarecybersecurityprofessionals.Theseprofessionalshadatleastsomeresponsibilityforday-to-daycybersecurityoperationsoroversightofthehealthcareorganization’scybersecurity
program.Respondentswhoindicatedtheydidnothaveanylevelofresponsibilityforeitherday-to-daycybersecurityoperationsoroversightwerenoteligibletotakethesurvey.
Methodology
ThedataforthissurveywascollectedbetweenNovember6andDecember16,2024.
Questionsaskedrespondentsabouttheirperspectives,knowledge,andexperiencesoverthepast12months.Forsimplicity,werefertothisdataas"2024"throughoutthisreport.
Similarly,datafromprevioussurveysisidentifiedbytheyearinwhichitwascollected.
Demographics
AsshowninFigure1below,respondentsheldvariousroles,includingexecutive
management(50%),non-executivemanagement(37%),andnon-management(13%).
ExecutivemanagementincludedindividualsintheC-suite,non-executivemanagementcomprisedseniormanagement,andnon-managementencompassedanalystsand
specialists.
Figure1:RespondentRoles
5
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
LevelsofResponsibility
AsshowninFigure2below,respondentsreportedvaryinglevelsofinvolvementintheir
organization'scybersecurityprograms.46%hadprimaryresponsibility,30%shared
responsibility,and24%wereinvolvedasneededintheday-to-dayoperationsoroversight.
Figure2:RespondentCybersecurityResponsibility
TypesofOrganizationsRepresented
AsshowninFigure3below,respondentsrepresentedadiverserangeoforganizations,includinghealthcareproviders(50%),vendors(18%),consultingfirms(13%),governmententities(8%),andotherorganizations(11%).Otherorganizationsincludedacademic
institutions,non-profits,payors,andlifesciencescompanies.
Figure3:TypesofOrganizations
6
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
EconomicsofHealthcareCybersecurity
Investinginrobustcybersecuritymeasuresisnolongeroptionalforhealthcare
organizations—itisessential.Yet,achievingastrongcybersecurityposturerequires
sufficientresources,whichareoftenlimitedbybudgetaryconstraints.ChiefInformationSecurityOfficersandtheirteamsfrequentlyfindthemselvesbalancingtheneedto
addressevolvingthreatswiththerealityoftightfinancialresources.
Healthcareorganizationswithgreaterfinancialresourcesarebetterequippedtoleveragerobustcybersecuritysolutions.Sufficientcybersecurityfundingenablesorganizationsto
accessadvancedtools,hireskilledpersonnel,andimplementcomprehensivestrategies.Conversely,limitedbudgetscanposechallenges,makingitmoredifficulttoaddresstheever-evolvingcyberthreatlandscapeeffectively.However,evenwithmodestresources,strategicplanningandprioritizationcanplayacriticalrole.
BudgetsareImproving
OverallITBudgetsareModestlyImproving
Traditionally,healthcareorganizationshavegenerallyallocated6%orlessoftheirIT
budgetstocybersecurity,accordingtoaggregatedatafromthe2018to2022and2024
HIMSSHealthcareCybersecuritySurveys.SincecybersecuritybudgetsaretypicallycarvedoutofoverallITbudgets,thissurveyexaminedboththeexpectedchangesinoverallIT
budgetsfromfiscalyear2024tofiscalyear2025andthecurrentallocationofthosebudgetstocybersecurity.
AsshowninFigure4below,aslightmajorityofrespondents(52%)reportedthattheir
organizations’overallITbudgetswouldincreaseduringthisperiod,while10%indicatedadecrease.28%ofrespondentsreportednochangeintheiroverallITbudgets.TenpercentofrespondentsdidnotknowabouttheanticipatedchangeinITbudgetfrom2024to
2025.
Figure4:AnticipatedChangeinITBudget2024to2025
7
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
AllocationofcurrentITbudgettocybersecurity
UnderstandinghoworganizationsallocatetheirITbudgetstocybersecurityprovides
valuableinsightintotheirprioritizationofsecuritymeasures.Variabilityinspendinglevelshighlightsdifferencesinhoworganizationsapproachprotectingtheirsystemsanddata.Thesebudgetarydecisionspresentopportunitiestostrengthendefensesandenhance
preparednessagainstevolvingthreats.
WhenaskedaboutorganizationalallocationofthecurrentITbudgettocybersecurity,20%ofrespondentsindicatedthattheirorganizationhadnospecificcarve-outbutspent
moneyoncybersecurity,asshowninFigure5below.However,19%ofrespondents
reportedtheirorganizationsallocated3-6%oftheoverallITbudgettocybersecurity;14%reported7-10%;7%reported11-14%;9%reportedmorethan14%;and7%reported1-2%.Onepercentofrespondents—severalvendorsandahealthcareprovider—indicated
theirorganizationsdonotspendanymoneyoncybersecurity.Notably,23%of
respondentsdidnotknowwhatpercentageoftheirorganizations’ITbudgetswereallocatedtocybersecurity.
Figure5:PercentofOrganization’sITBudgetSpentonCybersecurity
8
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Comparing2023to2024:CybersecurityBudgetAllocations
Datafromthe2023and2024HIMSSHealthcareCybersecuritySurveysrevealanotable
shiftincybersecuritybudgetallocations.Thepercentageoforganizationsallocating3-6%oftheirITbudgetstocybersecurityincreasedfrom13%in2023to18%in2024,whilethoseallocating1-2%decreasedfrom10%to7%,asshownbelowinFigure6.Allocations
between7-10%weresimilar,decreasingslightlyfrom15%oforganizationsin2023to14%in2024,whileabove10%droppedsignificantly,from21%oforganizationsin2023to16%in
2024,reflectingapossibleredistributionofresourcesormorestrategicspending.
Thepercentageoforganizationswithoutaspecificcarve-outforcybersecurityincreasedslightly,from19%in2023to20%in2024.Additionally,respondentsunawareoftheir
organizations’cybersecuritybudgetallocationsrosefrom19%in2023to23%in2024,
pointingtopotentialgapsincommunicationorgovernanceovercybersecurityspending.
Thesefindingssuggestthatorganizationsareoptimizingcybersecurityinvestments,movingtowardmoremoderatebudgetallocations.However,theincreaseinrespondents
unawareoftheirorganizations’cybersecuritybudgetallocationsunderscorestheneedforimprovedcommunicationaroundcybersecuritypriorities.Whileexecutivemanagement
respondentsweregenerallyawareofcybersecuritybudgetallocations,non-managementandnon-executivemanagementrespondentsdemonstratedlimitedawareness,
highlightinganopportunityforbetterinformationsharingaboutorganizationalcybersecurityprograms.
Figure6:CybersecurityBudgetAllocation,2023vs.2024
TrendsinCybersecurityBudgetAllocations
Overtheyears,cybersecuritybudgetallocationwithinITbudgetshasshownnotable
fluctuations,reflectingchangesinorganizationalprioritiesandresourceallocation
strategies.AsshowninTable1,organizationsreportingnocybersecurityallocation
remainedsteadyat1-3%,whileallocationsinthe1-2%rangepeakedat18%in2020but
droppedto7%in2024.Budgetsinthe3-6%rangedippedto13%in2023beforerecoveringto18%in2024,indicatingstabilityinmoderatespending.Allocationsinthe7-10%range
graduallyincreasedfrom10%in2020to14%in2024,showinggrowinginvestmentinhighercybersecuritybudgets.Budgetsexceeding10%peakedat21%in2023beforefallingto
16%in2024,suggestingshiftstowardmorebalancedspending.
Thepercentageofhealthcareorganizationswithflexibleorunspecifiedcybersecurity
budgetsdeclinedfrom26%in2019to20%in2024,reflectingimprovedbudgeting
practices.However,respondentsunawareoftheirorganizations’cybersecuritybudgets
rosefrom18%in2020to23%in2024,highlightingcommunicationgaps.Whilemodest
increasesinhealthcarecybersecuritybudgetsareevident,additionalinvestmentsare
criticaltoaddressgrowingthreats,protectsensitiveassets,andsupportnewtechnologies.Withoutsufficientfunding,organizationsriskdisruptionstopatientcare,lossoftrust,and
significantfinancialandreputationalharm.
Table1:CybersecurityBudgetAllocation,2019-2024
BudgetAllocation
2019
2020
2021
2023
2024
Noallocation
1%
1%
1%
3%
1%
1-2percent
9%
18%
18%
10%
7%
3-6percent
25%
24%
22%
13%
19%
7-10percent
11%
10%
15%
15%
14%
Morethan10percent
10%
6%
11%
21%
16%
FlexibleAllocation
26%
23%
24%
19%
20%
Don’tKnow
18%
18%
10%
19%
23%
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety9
10
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
CybersecurityBudgetsProjectedtoRise
Changestocybersecuritybudgetin2025
Anticipatedchangestocybersecuritybudgetsprovideinsightintoorganizations,evolvingprioritiesandstrategies.Withthegrowingcomplexityofcyberthreats,manyorganizationsrecognizetheneedtoadjusttheirspendingtostayahead.Theseshiftshighlightan
increasingfocusonbolsteringdefensesandaddressingemergingrisks.AsshowninFigure7below,amongrespondentswhoreportedaspecificallocationfortheirorganizations,
cybersecuritybudgets,aslightmajority(55%)anticipatedanincreasein2025.Only4%expectedadecrease,while21%statedtheirbudgetswouldremainthesame.Notably,20%ofrespondentsindicatedtheydidnotknow.
Figure7:ChangetoCybersecurityBudgetin2025
11
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
EffectofCybersecurityBudgetIncreasesin2025
Amongrespondentswhoindicatedthattheircybersecuritybudgetswouldincrease,we
askedwhethertheincreaseenabledtheirorganizationstomakemeaningful
improvements,suchasinvestinginadditionalstaff,tools,and/orpolicies.Asshownin
Figure8,amajority(57%)reportedsignificantimprovementstothetoolstheyuse,47%
reportedsignificantimprovementstopolicies,and31%reportedsignificantimprovementstostaff.Notably,34%statedthattheincreaseallowedforonlysomeimprovementsacrossstaff,tools,andpolicies.Threepercentindicatedthattheincreasemerelymaintained
existingsupportforstaff,tools,andpolicies,and8%ofrespondentsstatedthattheydidnotknow.
Figure8:ImpactofIncreaseinCybersecurityBudgetfor2025
12
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
SecurityAwareness
SecurityAwarenessPrograms
Effectivesecurityawarenesstrainingisvitalforhelpingemployeesrecognizeandrespondtocybersecuritythreats.Organizationsuseavarietyofmethodstoengagetheir
workforcesandreinforcekeyconcepts,tailoringtheirapproachestoaddresstheirspecificrisks.Understandingthestrategiesemployedprovidesvaluableinsightintohow
organizationsprioritizeeducationaspartoftheiroveralldefensestrategies.
AsshowninFigure9below,respondentsreportedusingavarietyofmethodsforsecurityawarenesstraining,with73%citingregularemailalertsandcommunications,63%using
simulatedphishing,49%usinginteractivediscussions,and47%holdingin-personorvirtualworkshops.Incidentresponseexercisesliketabletopswereusedby38%,while10%
engagedininteractivegames.Notably,4%reportednotraining,2%wereunawareif
trainingoccurred,and3%usedalternatemethodslikevideo-basedtrainingor
complianceactivities,whicharenotequivalenttoeffectivecybersecuritytraining.Only40%addressedemergingthreatslikedeepfakes,quishing(QRcodephishing),and
smishing(SMSphishing),highlightingtheneedforcomprehensive,up-to-datetrainingprogramstocounterevolvingthreats.
Organizationsmayneedtodevelopcustomtrainingprogramssinceoff-the-shelfsecurity
awarenesstrainingmightnotadequatelyaddressemergingthreats.Tailoredapproachesensurethattrainingisrelevantandcomprehensive,equippingteamstoeffectivelyidentifyandrespondtosophisticatedattacks.
Figure9:MethodsforSecurityAwarenessTraining
13
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Effectivenessofsecurityawarenessprograms
Securityawarenessprogramsareakeyelementoforganizationaldefense,designedto
educateemployeesonrecognizingandrespondingtopotentialthreats.Ascybersecurityriskscontinuetoevolve,theeffectivenessoftheseprogramsiscriticalinreducing
vulnerabilitiesandpreventingincidents.Evaluatinghowwelltheseprogramsperformcanhighlightareasforimprovementandensuretheyremainalignedwiththechangingthreatlandscape.
AsshowninFigure10below,weaskedrespondentswhoseorganizationsconductsecurityawarenessprogramstoassesstheeffectivenessoftheseprograms.Amajority(62%)
indicatedtheirprogramsaresomewhateffective,while18%describedthemasvery
effective.Another18%reportedtheirprogramsareonlyslightlyeffective,and2%statedtheyarenoteffectiveatall.Therelativelylowpercentageofrespondentsratingtheir
programsasveryeffective(18%)suggestsaneedforenhancedstrategies.Itissuggestedthatorganizationsfocusonkeyareasforimprovement,includingaddressingemerging
threatsandmitigatingrisksfromnewandemergingtechnologies.Strengtheningthese
securityawarenessprogramscouldbetterequiporganizationstostayaheadofevolvingcybersecuritychallengesandbolstertheiroveralldefenses.
Proactivemeasures,suchasgamification,tabletopexercises,andinteractiveworkshops,canhelpeducatetheworkforceaboutbothbasicandadvancedthreats.These
approachescanengageemployeeseffectively,fosteringpracticalskillsandawareness.
Socialengineeringremainsadominantattackmethod,makingitcrucialforsecurityawarenessprogramsinhealthcareorganizationstoaddressemergingthreatssuchasdeepfakes(image,audio,video),smishing,andquishing.
Figure10:EffectivenessofSecurityAwarenessTrainingPrograms
14
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
SecurityIncidents
SignificantSecurityIncidents
InitialPointsofCompromise
Understandinginitialpointsofcompromiseiskeytoidentifyingvulnerabilitiesand
strengtheningdefensessincetheyoftenserveasgatewaysforattackers.Addressingtheseweaknessescansignificantlyreducetheriskofbreachesandimprovesecurityposture.AsshowninFigure11below,weaskedrespondentstoidentifyinitialpointsofcompromiseforsignificantsecurityincidentsinthepastyear.Generalemailphishing(63%),SMSphishing
andtargetedspear-phishing(each34%),businessemailcompromise(31%),phishing
websites(21%),maliciousads(20%),socialmediaphishing(19%),vishing(voicephishing)(17%),andwhaling(alsoknownasexecutiveimpersonation)(16%),deepfakeimages(6%),audiodeepfakes(4%),videodeepfakes(3%),distributeddenialofservice(DDoS)attacks(3%),andprivacybreaches(3%)werereported.Eightpercentdidnotknow.Eighteen
percentreportednosignificantsecurityincidents,
Figure11:InitialPointsofCompromiseforSignificantSecurityIncidentsinthePast12Months
15
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
TestingofIncidentResponsePlans
Regulartestingofincidentresponseplansisessentialtoensureorganizationsarepreparedtohandlecybersecurityincidentseffectively.Tabletopexercisesplayacriticalrolein
identifyinggaps,improvingcoordination,andstrengtheningoverallresponsecapabilities.Understandinghowfrequentlyorganizationsengageintheseexercisesprovidesinsight
intotheirlevelofpreparednessandcommitmenttomitigatingpotentialrisks.
Weaskedrespondentswhethertheirorganizationsconducttabletopexercisestotestthecapabilitiesoftheirincidentresponseprograms.AsshowninFigure12below,45%of
respondentsindicatedthattheirorganizationsdoconducttabletopexercises,while39%reportedtheydonot.Sixteenpercentstatedthattheywereunsurewhethertheir
organizationsconducttabletopexercises.
Thesefindingshighlightamixedlevelofpreparednessamongorganizations,withmany
failingtotesttheirincidentresponseplansbyusingtabletopexercises.Tabletopexercisesarecriticalforsimulatingvariousscenarios,identifyinggapsinresponsecapabilities,andstrengtheningoverallincidentresponsestrategies.
The16%ofrespondentsunawareofwhethertheirorganizationsconducttheseexercisespointstopotentialgapsincommunicationandparticipation.Thisunderscoresthe
importanceofincludingallrelevantstakeholders—regardlessoftheirrole—intabletopexercises.Improvingcommunicationandtransparencyaboutincidentresponseefforts
canhelpensurebroaderorganizationalawarenessandmoreeffectivepreparednessforpotentialincidents.
Figure12:OrganizationsConductingTabletopExercisesforIncidentResponseTesting
16
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
StakeholderParticipationinTabletopExercises
Respondentswhoseorganizationsconducttabletopexercisesidentifiedparticipants.Theresultsshowadiverserangeofparticipantsbutalsohighlightgapsinparticipation.As
showninFigure13below,ITstaff(89%)andcybersecuritystaff(77%)werethemost
frequentlyinvolvedstakeholders,reflectingtheircriticalrolesinmanagingandrespondingtoincidents.Seniormanagementparticipationwasreportedat73%,whileexecutives,
includingC-suiteleaders,participatedin58%ofcases,demonstratingrobustlevelofleadershipengagement.
Otherdepartmentswithinhealthcareorganizationswereinvolvedintabletopexercises:
?Compliance(48%)
?Clinicians(44%)
?Informatics(44%)
?Humanresources(43%)
?Legal(42%)
?Accountingandfinance(35%)
Externalparties,suchasvendors(22%)andcontractors(15%),hadlowparticipationrates.Thismaypointtoanareaforimprovement,giventheirpotentialinvolvementwhen
incidentsoccur.Additionally,theboardofdirectorsparticipatedinonly21%ofcases,
despitetheircriticalroleinoverseeingcybersecurityrisk.Twopercentofrespondents
statedtheydidnotknowwhichstakeholdersparticipate,whileanother2%reportedthatotherstakeholders,suchasemergencypreparednessprofessionals,wereinvolvedonanadhocbasis.
Figure13:TabletopExerciseParticipants
What’sHappeningwithRansomware
PresentState
Ransomwareattackscontinuetobeasignificantthreat.Oftenstatesponsored,these
attacksarehighlyorganizedandsophisticated.Healthcareorganizationsexperienced
aggressiveattackssinceatleast2018,andthethreatremainsaspersistentasever
.1
Ransomwareleaksitesareprevalent
.2
Healthcareproviders,payors,vendors,andotherentitiesacrossthehealthcareecosystemhavebeentargeted.Ransomwareremainsa
criticalissue,highlightingtheneedforrobustdefensesandeffectiveresponsestrategies.
2024RansomwareTrends
Healthcareorganizationsappeartobepreparedtopreventanddefendagainst
ransomwareattacksin2024.AsshownbelowinFigure14,amajorityofrespondents(74%)indicatedthattheirorganizationshadnotexperiencedransomwareattacksinthepast12months.However,13%reportedthattheirorganizationshadbeentargeted,underscoringtheongoingriskransomwareposestothehealthcareandpublichealthsector.Thirteen
percentofrespondents—primarilyfromnon-executivemanagementandnon-managementroles—statedtheydidnotknowwhethertheirorganizationshadexperiencedsuchanattack.
Figure14:RansomwareAttackin2024
1U.S.DepartmentofHealthandHumanServices.RansomwareTrendsinHealthcare.,
/sites/default/files/ransomware-healthcare.pdf.AccessedJan.242025
.
2PaloAltoNetworks.Unit42RansomwareLeakSiteDataAnalysis.PaloAltoNetworks,
/unit-42-ransomware-leak-site-data-analysis/.AccessedJan
.242025.
17
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
18
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
RansomwareTrends:2022-2024
Thepercentageofrespondentsreportingthattheirorganizationsexperienced
ransomwareattackshasremainedrelativelyconsistentinrecentyears.AsshowninFigure15below,in2024,13%indicatedtheirorganizationshadexperiencedaransomware
attack,slightlyhigherthanthe12%reportedin2023andmatchingthe13%reportedin
2022.Similarly,thepercentageofrespondentsreportingnoransomwareattacksremainedsteadyat74%in2024,comparedto75%in2023and78%in2022.Respondentswhodid
notknowwhethertheirorganizationsexperiencedaransomwareattackwere13%ofrespondentsin2023and2024,comparedto9%in2022.
Thesefindingshighlighttheimportanceofimprovingvisibilityandtransparencyregardingransomwareincidents.Evenwhenorganizationsarenotdirectlyimpacted,thepersistentthreatofransomwarenecessitatesconstantvigilance,proactiveplanning,androbust
defensestosafeguardsensitiveassetsandensureoperationalandclinicalcontinuity.
Figure15:RansomwareAttacksfrom2022-2024
19
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
ToPayorNottoPay-RansomwarePayments
Ransomwarevictimsfacethetoughdecisionofwhethertopay,basedontheirspecificcircumstances.Amonghealthcareorganizationsvictimizedin2024,62%ofrespondentsreportednotpayingaransom,11%paidtheransom,and27%didnotknow,asshowninFigure16.In2023,30%ofrespondentsstatedthattheirorganizationspaidtheransom,
while52%didnot,and18%didnotknow,asshownbelowinFigure17.Payingaransomnotonlyhasthepotentialtoemboldenthreatactorsbutalsoincreasesthelikelihoodofrepeatedtargetingoradditionalattacksonotherhealthcareorganizations.Thereisa
needforbettercoordination,planning,andinformationsharingtoimproveresilience.
Figure16:RansomwarePaymentsin2024
Figure17:RansomwarePaymentsin2023-2024
20
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
Proactivevs.ReactiveSecurityMeasures
Organizationsreportedarangeofproactivean
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 車(chē)輛安全檢查合同范本
- 防腐分包合同范本
- 裝修合同范本提取公積金
- 賣(mài)房資金托管合同范本
- 酒吧轉(zhuǎn)讓終止合同范本
- 奧迪融資購(gòu)車(chē)合同范本
- 住宅裝修合同范本簡(jiǎn)單
- 胰腺癌患者護(hù)理查房
- 員工離職原因及解決方案培訓(xùn)課件
- 2025終止合伙合同協(xié)議書(shū)模板
- 司法雇員考試題目及答案
- 2025年03月廣西玉林博白縣總工會(huì)社會(huì)化工會(huì)工作者13人筆試歷年典型考題(歷年真題考點(diǎn))解題思路附帶答案詳解
- 人教版二年級(jí)數(shù)學(xué)下冊(cè)全冊(cè)大單元教學(xué)設(shè)計(jì)
- 中小跨徑橋梁結(jié)構(gòu)健康監(jiān)測(cè)技術(shù)講稿PPT(107頁(yè))
- HG第四章顯示儀表
- 二五公式驗(yàn)光法
- 車(chē)庫(kù)建筑設(shè)計(jì)規(guī)范《車(chē)庫(kù)建筑設(shè)計(jì)規(guī)范》JGJ100-2015修訂對(duì)照表(2022)
- 《智能運(yùn)輸系統(tǒng)》復(fù)習(xí)提綱解析
- 圖書(shū)館智能照明控制系統(tǒng)設(shè)計(jì)-畢業(yè)論文
- 土地復(fù)墾方案編制規(guī)程第1部分通則
- 機(jī)動(dòng)車(chē)登記翻譯(適用于出國(guó)資料)
評(píng)論
0/150
提交評(píng)論