743,000+ (from McLaren breach alone)
A new report highlights a severe degradation in the cybersecurity posture of the Healthcare sector, which saw the number of data breaches double over the past year. This alarming trend is being fueled by a combination of emerging and persistent threats. The report identifies the proliferation of unmanaged generative AI tools used by employees ('shadow AI') and systemic weaknesses in the security of third-party vendors as primary drivers. The McLaren ransomware attack, which compromised the data of over 743,000 patients, serves as a stark example of the real-world consequences. The findings suggest that healthcare organizations are struggling to keep pace with the evolving threat landscape and must urgently address the risks posed by shadow AI and their extensive supply chains.
The healthcare sector is a prime target for cybercriminals due to the high value of protected health information (PHI) on the dark web and the critical nature of its operations, which makes it more likely to pay ransoms. The report points to two accelerating risk factors:
T1199 - Trusted Relationship abuse.T1537 - Transfer Data to Cloud Account). Users copy sensitive data and paste it into a web browser connected to an external cloud service. This bypasses traditional DLP controls that might be focused on blocking file uploads.The doubling of breaches in healthcare has profound consequences:
User Data Transfer Analysis.Healthcare organizations must adopt a more proactive and comprehensive security strategy.
Network Isolation.Isolate critical clinical systems, medical devices, and patient data repositories from the general administrative network to contain breaches.
Specifically train all staff on data handling policies related to AI, making them aware that pasting PHI into public AI tools is a data breach.
To combat the 'shadow AI' problem, healthcare organizations must gain visibility into data movement at the endpoint and network edge. Deploy a Data Loss Prevention (DLP) solution or a Cloud Access Security Broker (CASB) with content inspection capabilities. Create specific policies that identify Protected Health Information (PHI) using pattern matching (e.g., for medical record numbers, patient names combined with diagnoses). Configure these tools to monitor data being sent to known public AI websites (like ChatGPT, Gemini, etc.). The policy should, at a minimum, alert the security team when a user attempts to paste PHI into one of these sites. For a stronger posture, the policy should be set to block the action entirely and present the user with a notification explaining the policy violation. This provides both a technical control to prevent data leakage and a real-time training opportunity for the employee.
To address the significant risk from third-party vendors, healthcare organizations must enhance their monitoring of vendor accounts. For every third-party vendor that requires access to your systems, create a unique, dedicated service account—never allow shared or generic accounts. These accounts should be subject to intense monitoring. Ingest all authentication and activity logs for these accounts into your SIEM. Establish a baseline of normal activity for each vendor: What systems do they access? From what IP addresses? During what hours? Create high-priority alerts for any deviation from this baseline. For example, if a vendor account for a billing software suddenly tries to access the patient records database, or logs in from a new country, an alert should fire immediately. This allows for the rapid detection of a compromised vendor account being abused by an attacker.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats