Healthcare and cybersecurity: 73% of breaches lack DMARC enforcement

The healthcare sector has become a target for both low-level and occasionally spectacularly successful cyberattacks. Hospitals, insurers, medical supply chains, service providers and medical organizations are prime targets for threat actors, with email phishing attacks, ransomware, and data breaches on the rise. In 2024, 94% of U.S. healthcare organizations experienced a cyberattack, with the average cost per organization at $4,740,000, up 5% from the previous year. National security bodies predict that cyberattacks on healthcare and other critical infrastructure are likely to triple in the coming years.

A permanent fixture of the attack landscape, phishing, in which bad actors pretend to be the companies they are targeting, is the most significant cyber threat, responsible for an estimated 60% of all healthcare breaches. Ransomware attacks, which most often begin with phishing, are particularly damaging and also crushingly costly to remediate: the 2024 Change Healthcare breach affecting hundreds of millions of individuals also caused widespread disruptions. As such, email security – a weakness for many healthcare organizations – must be prioritized, including measures to combat these threats such as:   

  • Multi-factor authentication (MFA), 
  • Robust, protocol-driven email security policies (e.g. DMARC, SPF, DKIM), 
  • AI-driven threat detection, 
  • Regular employee cybersecurity training. 

Cybersecurity in healthcare: Growing risks

The healthcare industry’s increasing transformation to digital systems has revolutionized patient care, data sharing, and just-in-time delivery, but in parallel many of these benefits come with significant cybersecurity risks. Outdated systems, combined with the high value of electronic protected health information (ePHI), make healthcare organizations prime targets for threat actors.

The current threat environment

Bad actors operate by exploiting gaps and seams in security, using both common and advanced tactics, including social engineering, email phishing scams, often delivering damaging ransomware attacks. The scale and sophistication of global cybercrime is astonishing, with combating cybercrime now a feature in many national security strategies. Open source and national security intelligence estimates predict that cyberattacks against the critical infrastructure sector will triple in frequency and impact.

The financial value of ePHI on the black market (medical records can sell for $60, $15 for a Social Security number and $3 for a credit card), reliance on outdated legacy systems, the expansion of services that depend on data, growth through acquisitions, often under-resourced hospitals, and a lack of cybersecurity awareness among staff will continue to make the healthcare industry a high-value target for cybercriminals. 

Threats targeting healthcare

  • Email phishing attacks: Phishing is the most common cyber threat in healthcare, accounting for over half of all security breaches. Attackers use fraudulent emails and messages to deceive healthcare workers into disclosing login credentials or clicking on malicious links. A recent HHS report detailed BEC as among the most costly and prevalent attacks against healthcare.
  • Ransomware and data breaches: Ransomware attacks can lock down critical hospital systems, forcing organizations to pay a ransom or face major operational disruptions. The 2024 Change Healthcare ransomware attack, which affected over 190 million people and cost more than $2 billion USD and counting, highlights the devastating impact of such breaches.
  • Poor email security: Our research indicates that 73% of recently breached healthcare organizations lack a DMARC policy of p=reject (enforcement), making them susceptible to BEC, email spoofing, and domain impersonation. This allows cybercriminals to pose as trusted contacts and carry out phishing attacks.

A five-step model for phishing defense

Pillar
Description
Email security
Deploy DMARC, SPF, and DKIM alongside phishing protection and advanced ransomware detection for inbound email. Red Sift OnDMARC makes it easy, enabling enforcement within 6-8 weeks.
Decrease human errors
Block access to phishing websites, prevent malware downloads, and provide time-of-click protection against malicious links. Use blacklists and real-time content analysis.
Improve employee education
Educate employees on phishing tactics, improve detection and reporting of phishing emails, and strengthen the human element of security through ongoing training and simulations.
Enable multi-factor authentication (MFA)
Provide additional layers of security by requiring extra authentication beyond passwords, such as one-time codes, biometrics, or security keys, to prevent unauthorized account access and lateral movement.
Deploy Zero Trust
Assume that no user or device should be trusted by default. Enforce strict identity verification, least privilege access, continuous monitoring, and segmentation to prevent unauthorized access and lateral movement within a network.

The flatline

The healthcare industry faces consistent and rising cyber threats that will only increase with technological sophistication. Without robust email security policies, employee training, and advanced cybersecurity defenses, organizations risk further spectacular data breaches that could compromise financial stability, privacy, and even patient safety. Healthcare providers must take immediate action to safeguard sensitive data and ensure operational resilience.

Not sure where to start? Check your DMARC status for free with Red Sift Investigate and ensure your organization (and your patient’s data) remains secure today. 

PUBLISHED BY

Faisal Misle

23 Jun. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
DMARC

More than 50% of US banks remain vulnerable to phishing attacks

Stuart Rogers

Executive summary: Over half of major U.S. banks remain exposed to phishing attacks because of weak or absent DMARC enforcement, despite rising cybercrime losses and increasingly sophisticated email threats. Operational challenges, regulatory gaps, and underestimation of risk hinder stronger protections, putting customer trust and financial stability in jeopardy. Key takeaways Email remains the primary…

Read more
Product Release

Stream Red Sift telemetry to Sentinel, Splunk, and more with Event Hub

Francesca Rünger-Field

Event Hub is a new capability that streams real-time, structured security events from Red Sift products into the platforms security teams already use: SIEMs, SOARs, XDRs, ticketing tools, messaging platforms, and cloud storage. It enables faster, more consistent response by pushing telemetry directly into the workflows where detection, triage, and remediation already happen. Whether…

Read more
Thought Leadership

How the EU can mandate stronger email security

Antony Seedhouse

Executive summary: The article examines how the EU can proactively close email security gaps by leveraging the NIS2 Directive to mandate robust, harmonized standards like DMARC, DKIM, and SPF across all member states. By acting now, the EU not only protects its digital ecosystem but also sets a global benchmark for cybersecurity best practices.…

Read more
News

Europe’s #1 for DMARC: Red Sift OnDMARC does it again

Francesca Rünger-Field

G2’s Summer 2025 Report has landed, and we’re proud to share that Red Sift OnDMARC remains the #1-rated DMARC solution in Europe. This marks another strong season for OnDMARC, with continued recognition across G2’s category reports. We were featured in 18 reports this quarter, taking top spots in the Mid-Market Results Index and Mid-Market…

Read more