Close

New Workspace Modernization Research from CDW

See how IT leaders are tackling workspace modernization opportunities and challenges.

Jan 06 2026
Security

What Healthcare Organizations Should Know About Advanced Persistent Threats

These long-term attacks are a real concern for an industry that is frequently targeted with ransomware.

At this point, healthcare organizations are unfortunately more than familiar with ransomware — it’s not a matter of if but when. Providers are expected to stay vigilant and enhance their cyber resilience.

But what happens when an attack isn’t a quick hit? What happens when a malicious actor or group has entered your network undetected, through stolen credentials or any type of backdoor access such as a zero-day vulnerability, and is just lying in wait? Then, after they’ve attacked once, what happens if they never lose that access and attack again?

These are advanced persistent threats (APTs), and once a threat actor gets in, they tend to live off the land as long as possible (what’s known as dwell time), sitting in the environment and collecting as much information as they can about their target, either to understand what assets the organization has or to exfiltrate data.

Here’s what healthcare providers should know about these low-and-slow attacks, especially since these threats may involve elements familiar to an organization.

Click the banner below to read the recent CDW Cybersecurity Research Report.

 

From the ’80s to Now: Ransomware Involves Trust

Healthcare has been a target of ransomware from its start: The first known ransomware attack involved sending a Trojan virus on a floppy disk to AIDS researchers in 1989. The sender was a fellow researcher, so those who received the disk had no reason to doubt its contents.

When we think of defending against a cyberattack, we often think of it the way we think of protecting our homes: Securing a perimeter, installing dead bolts and making sure nothing from the outside gets in. But what’s really concerning is when the threat actors know how to get past your four walls without setting off any alarms. That’s what makes advanced persistent threats a serious concern.

When training employees to respond to such threats, healthcare is a particularly tricky industry because it requires trust to deliver high-quality care. You want the people working within your organization to be caring, trustworthy and ready to help others. For malicious actors, those are the traits they want to exploit.

That is what makes cybersecurity training and education in healthcare especially challenging: First, organizations may not have updated training to address more recent and emerging threats, and second, you can’t train healthcare professionals to be unhelpful and mistrusting. It may be useful to have role-based security training; for example, help desk employees should be more familiar with the personnel or roles in clinical departments so that when they receive a password change request from an oncologist claiming to be onsite at the emergency department, they would know it’s an unusual ask.

Generative artificial intelligence has also become more prevalent as a tool for threat actors. Malicious organizations have even made their own toolkits widely available for others who want to launch APT attacks.

EXPLORE: Here are four cybersecurity trends to watch in 2026.

Back to Basics With Security

Providers are becoming more savvy with foundational elements of security, focusing on building core cybersecurity programs. There are more CISOs in healthcare, and more professionals are ready to take on similar roles. There has been a noticeable shift in the industry, and now more organizations are familiar with how to tighten up their perimeter defenses.

Cyber resilience has been another area of focus. Organizations should train their teams to act as if they’re always at risk of compromise, because that's the best way to test their resilience, identify where the gaps are and then implement effective solutions for rapid recovery. All providers will eventually get hit at some point, so it is essential for them to maintain both robust layered defenses and efficient recovery plans.

To remain informed about emerging security threats, healthcare security professionals require ongoing training and education. Security operations center staffers have a lot on their plates, but increased automation within their workflows would give them time to renew their knowledge. Organizations need their security teams to be laser-focused and up to date on protecting their environment, because any disruptions to patient care could have serious consequences. A patient suffering a stroke cannot be met by a care team compromised by a ransomware attack. The ability to fail over to another communication platform and implement other contingency measures is incredibly important. Prioritizing resilience becomes top of mind when trying to prevent a catastrophe.

READ MORE: Why do healthcare organizations need an IRE for Epic?

Connected medical devices are yet another area of concern for security. There are many devices linked to clinical workflows, yet most of them basically operate like a black box. Once data enters, it's difficult to see how the gears move inside because of proprietary industry and manufacturer trade secrets. And while it may seem as if they have protective measures in place, such devices can connect to networks without an organization having full insight into their security status. Gaining that visibility and isolating those devices will help providers as they try to manage their complex environments.

Last, healthcare organizations need to get better at sharing their ransomware experiences with each other. Talk about how it started, what was done to remedy the situation and what can be done to prevent it. If we’re going to improve as an industry, we need to share our experiences so that we can better identify APTs, the indicators of compromise and other elements of exposure so that all providers know how to identify, prevent and protect against these long-term, targeted cyberattacks.

This article is part of HealthTech’s MonITor blog series.

MonITor_logo_sized.jpg

AndreyPopov/Getty Images