November 11, 2019 By David Bisson 2 min read

An academic study found that the death rate tied to cardiovascular issues increased in the months and years following healthcare cyberattacks on hospitals.

In a report available for download through the Wiley Online Library, researchers from Vanderbilt University and the University of Central Florida used a difference‐in‐differences regression to analyze the effect that healthcare cyberattacks had on the quality of medical treatment received by patients at victim medical organizations. They specifically measured “hospital quality” by analyzing the time between when patients suffering from cardiovascular issues first entered a facility and when they received an electrocardiogram. The study also tracked the mortality rate associated with acute myocardial infarctions, the medical term for heart attacks.

The researchers found that hospital quality suffered as a result of a data breach. Specifically, they found that hospital time-to-electrocardiogram increased as much as 2.7 minutes and that 30‐day acute myocardial infarction mortality grew by 0.36 percent over a three-year window following a security incident.

The Human Impact of Healthcare Cyberattacks

This study helps shed light on the types of risks that healthcare cyberattacks pose to patients. Mortality is the greatest consequence of these types of security events. Dr. Sung J. Choi, a researcher from the University of Central Florida who led the project, said in a session for the 2018 4A Data Security & Privacy conference that data breaches at medical organizations are responsible for causing 2,100 patient deaths each year, as Digital Guardian reported.

Even so, mortality isn’t the only repercussion. An Accenture survey found that a healthcare data breach on average resulted in digital criminals stealing about a quarter of affected consumers’ personal medical information. Fifty percent of those affected revealed that they then experienced medical identity theft, which subsequently cost them $2,500 out-of-pocket on top of their existing medical bills.

What Healthcare Organizations Can Do to Fight Back

Security professionals can help defend healthcare organizations against data breaches by cooperating with IT management to develop effective security measures and build incident response teams who can prevent security issues from growing into a breach. Organizations should also monitor all connected medical devices’ activity for suspicious behavior that might be indicative of an intrusion.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today