Securing connected healthcare technology systems in Hospitals: The Achilles Heel of the Healthcare Industry

In 2025, healthcare facilities face more than medical challenges — they confront a persistent cyber health crisis. The pandemic years accelerated digital transformation across the sector, but many organizations are still recovering from the rapid, unplanned expansion of their digital footprint. Connected devices, cloud-based records, and telemedicine have created vast new entry points for attackers.

According to the World Economic Forum (2024), healthcare now pays the highest price of any sector for cyberattacks, with breaches averaging $10.9 million per incident — nearly double that of finance. These attacks no longer just compromise data; they disrupt care, delay treatments, and endanger lives. The combination of legacy systems, staff shortages, and expanding digital ecosystems has made cyber resilience — not just security — a clinical necessity.

Weaknesses in the Healthcare Sector Defense System

The Million-Dollar Question: How do Hackers Attack Healthcare Facilities?

Most attacks against the healthcare sector target third-party service providers, who have extensive access rights to perform maintenance and upgrades to hospital equipment.

These service providers regularly connect to healthcare facilities’ OT environment, whether on the medical side – SCANNER, MRI, monitoring tools, ventilators, syringe pumps – or on the building side –energy management, elevator, air conditioning, medical fluids… And it is this heterogeneity together with the low-security level of the means of connection that strongly accentuates the associated cyber risks.

The Role of OT Technology in the Healthcare Industry

In the words of Gartner, Operational Technology (OT) is “hardware and software that detects or causes a change, through the direct monitoring and/or control of physical devices, processes, and events.”

In recent years, automation and digitization have accelerated in healthcare devices for the purposes of monitoring, tracking, and efficiency of care. While there is no doubt that all these devices and connected healthcare technology systems using OT technology are helping the healthcare industry improve care, reduce costs, and increase efficiency, they are also significantly increasing the attack surface for organizations, according to Fortinet.

The Risks of Connected Medical Devices

Hospitals today use cardiac pacemakers, insulin pumps, and other medical devices that run on software. These devices, which are not always kept up to date by the manufacturers, are based on obsolete operating systems, which generates multiple security breaches.

To begin with, many of these devices already have many potential vulnerabilities because their security is not built into the design. Data encryption, password management, and authentication are all missing features on this type of equipment.

Today, medical equipment is mainly deployed and maintained by manufacturers with biomedical engineers as local contacts. Competence is therefore primarily entrusted to manufacturers who need to be connected very frequently to maintain the associated services. This results in closed hardware and software infrastructures that are vulnerable in terms of cybersecurity.

Many manufacturers still rely on remote connection tools that are not very secure and are spread throughout the hospital. They thus bypass the security components implemented and expose the IT system. The introduction of targeted malware or ransomware can quickly lead to the complete paralysis of healthcare equipment. This means that protecting medical equipment is no longer just a matter of data loss or theft of sensitive information but can also pose a threat to patients’ lives.

Protecting the OT is Protecting our Health

A hacker who penetrates a healthcare network will necessarily seek to move inside the network to collect information and compromise other components such as databases or servers. Therefore, securing access for privileged users and controlling rights and bounce-back capabilities on target machines is critical.

For this reason, any healthcare facility looking to implement an OT solution must consider not only how to secure all devices, but also thoroughly examine the defenses it provides for all privileged resources beyond network devices.

By 2025, healthcare organizations are operating in a fully regulated cybersecurity landscape. International standards like MITRE ATT&CK for ICS and ISA/IEC 62443 now serve as the foundation for aligning IT and OT security strategies. In Europe, the NIS2 Directive, officially enforced in late 2024, has become a turning point — pushing healthcare providers to strengthen Operational Technology (OT) protections, enhance incident response, and demonstrate measurable cyber resilience. Together, these frameworks mark a shift from compliance-driven security to proactive, integrated defense.

Given the expected requirements, implementing a Privilege Access Management (PAM) solution will be critical to ensuring the security of the connected medical devices and OT components that enable the building to function.

But the challenges of service continuity, manufacturer warranty, and OT equipment obsolescence require a more specific approach than traditional PAM systems offer. Both compatibilities with proprietary protocols and the inability to install agents on the machines handling medical devices can be barriers to the effective implementation of a Privilege Access Management solution.

A PAM solution must provide robust tools and implement strict policies to secure credentials for privileged accounts. Real-time recording of account activity and automated monitoring (as well as termination) of sessions help prevent breaches and determine when a risk is detected. This is not only vital to maintaining the security of devices (and the networks to which they connect), but also crucial to meeting compliance requirements.

Security must be integrated into the deployment of medical devices and be accompanied by change management and user awareness, as attacks are becoming more frequent and their consequences more severe.

WALLIX PAM: A Solution Focused on the Protection of Industrial Medical Devices

WALLIX PAM, a unified privilege management solution, uses the principle of least privilege to ensure that all users, whether human or machine, can access only the minimum number of sensitive resources needed to perform a given task, at the right time and with the appropriate privilege level. This is called the Zero Trust approach.

The concept that the “users” of a system will not always necessarily be “people” is critical to ensuring the complete security of OT devices in the healthcare sector. This is because these devices may themselves have access to privileged resources and will need to be monitored and controlled in the same way as humans. By ensuring that system components are subject to the same PAM principles as humans (access only to necessary resources, under the right circumstances), IT administrators responsible for OT security will be able to eliminate potential threats posed by all connected devices in healthcare facilities.

In addition, the WALLIX PAM solution integrates security by design, controlling privileged users’ connections to systems and equipment.

Want to learn more about how to keep your healthcare organization safe from the challenges presented by industrial medical devices? Contact WALLIX’s teams of experts today!