Hospital cyber attacks are increasingly hitting patient care
New research shows only 14% are confident they can lose access to health records for 72 hours without risk to patients
The main risk from hospital cyber incidents is no longer data breaches or IT disruption – it's direct threats to care delivery.
According to a Black Book Research survey of 284 European hospital cybersecurity buyers, 82% rate their 2026 cyber attack concern as very high or extreme, while 74% believe their organization is likely or highly likely to face a major cyber event this year.
And, the researchers found, attacks are no longer viewed primarily as privacy events, compliance events, or IT disruptions – but as threats to the delivery of care.
"Europe's hospitals are operating in one of the most complex cyber-risk environments in the world: nationally connected health systems, public-sector capacity pressure, cross-border supplier ecosystems, aging infrastructure, accelerated cloud migration, strict regulatory accountability, and clinical operations that cannot go offline," said Doug Brown, founder of Black Book Research.
"Attackers know the pressure points. They are not only targeting data; they are targeting authentication, availability, recovery windows, third-party dependencies, and the fragile digital workflows that move patients through emergency departments, labs, imaging, pharmacy, theatres, ICUs, and discharge."
As a result, European hospital cybersecurity buying has shifted sharply from breach prevention toward clinical continuity. Two-thirds are investing in identity, IAM, PAM, SSO failover and break-glass access, and 57% in ransomware recovery, immutable backup, and read-only clinical access.
Just over half are looking to network segmentation, zero trust, and ZTNA, 46% to incident-response retainers and crisis-response services, and 45% to third-party supplier and vendor cyber-risk management. Meanwhile, 37% are investing in medical device/IoMT security, and 29% in cyber range, downtime simulation, and resilience exercise services.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
However, while 78% of survey respondents said their board receives general cybersecurity risk updates, only 31% receive cyber-resilience metrics tied to clinical continuity.
Only a quarter reported a full clinical downtime simulation within the past 12 months, and 32% said their organization had never conducted a full clinical downtime simulation, had only completed tabletop activity, or did not know when the last exercise occurred.
Worryingly, while 59% of respondents said they were confident that their hospitals could operate safely for 24 hours without core Electronic Health Record (EHR) access, that figure fell to 32% at 48 hours and just 14% at 72 hours.
"The 72-hour number should disturb every hospital board and ministry-level health technology leader in Europe. A hospital that can improvise through the first day of downtime is not necessarily resilient," said Brown.
"By day two and day three, medication reconciliation, laboratory turnaround, radiology workflow, identity access, pharmacy verification, transfer coordination, discharge planning, and backlog reconciliation become patient-safety risks. Cyber resilience is now an operational medicine issue."
The health sector is an increasingly popular target for cyber criminals, thanks to its critical nature. And many attacks have led to problems delivering patient care, including a 2024 ransomware attack on NHS pathology provider Synnovis, and, more recently, an attack on medical technology firm Stryker being described by the firm as 'destructive, not ransomware'.
"In Europe, the cyber battleground has moved from the server room to the bedside," said Brown.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Russian sentenced to jail for his part in ransomware attacksNews Aleksei Volkov operated as an initial access broker, helping cybercrime groups, including the Yanluowang ransomware group
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Former NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bareNews Researchers said they place the UK financial impact of the attack on Jaguar Land Rover at around £1.9 billion.
-
Japan running super dry of its favourite beer as Asahi cyberattack continuesNews Production of Asahi beer, one of the country's favourite beverages, has been halted, and reserves are running low
-
A new 'top-tier' Chinese espionage group is stealing sensitive datanews Phantom Taurus has been operating for two years and uses custom-built malware to maintain long-term access to critical targets
-
Asahi production halted by cyberattackNews Yet another big brand suffers operational disruption following apparent hacking attack
-
Kido nursery hackers threaten to release more details – along with the personal data of 100 employeesNews The attack is the first to be claimed by the new threat group 'Radiant'
-
A cyber attack has caused chaos at airports across Europe – here's everything we know so farNews Passengers at a string of European airports faced severe disruption


