Healthcare and cybersecurity: 73% of breaches lack DMARC enforcement

The healthcare sector has become a target for both low-level and occasionally spectacularly successful cyberattacks. Hospitals, insurers, medical supply chains, service providers and medical organizations are prime targets for threat actors, with email phishing attacks, ransomware, and data breaches on the rise. In 2024, 94% of U.S. healthcare organizations experienced a cyberattack, with the average cost per organization at $4,740,000, up 5% from the previous year. National security bodies predict that cyberattacks on healthcare and other critical infrastructure are likely to triple in the coming years.

A permanent fixture of the attack landscape, phishing, in which bad actors pretend to be the companies they are targeting, is the most significant cyber threat, responsible for an estimated 60% of all healthcare breaches. Ransomware attacks, which most often begin with phishing, are particularly damaging and also crushingly costly to remediate: the 2024 Change Healthcare breach affecting hundreds of millions of individuals also caused widespread disruptions. As such, email security – a weakness for many healthcare organizations – must be prioritized, including measures to combat these threats such as:   

  • Multi-factor authentication (MFA), 
  • Robust, protocol-driven email security policies (e.g. DMARC, SPF, DKIM), 
  • AI-driven threat detection, 
  • Regular employee cybersecurity training. 

Cybersecurity in healthcare: Growing risks

The healthcare industry’s increasing transformation to digital systems has revolutionized patient care, data sharing, and just-in-time delivery, but in parallel many of these benefits come with significant cybersecurity risks. Outdated systems, combined with the high value of electronic protected health information (ePHI), make healthcare organizations prime targets for threat actors.

The current threat environment

Bad actors operate by exploiting gaps and seams in security, using both common and advanced tactics, including social engineering, email phishing scams, often delivering damaging ransomware attacks. The scale and sophistication of global cybercrime is astonishing, with combating cybercrime now a feature in many national security strategies. Open source and national security intelligence estimates predict that cyberattacks against the critical infrastructure sector will triple in frequency and impact.

The financial value of ePHI on the black market (medical records can sell for $60, $15 for a Social Security number and $3 for a credit card), reliance on outdated legacy systems, the expansion of services that depend on data, growth through acquisitions, often under-resourced hospitals, and a lack of cybersecurity awareness among staff will continue to make the healthcare industry a high-value target for cybercriminals. 

Threats targeting healthcare

  • Email phishing attacks: Phishing is the most common cyber threat in healthcare, accounting for over half of all security breaches. Attackers use fraudulent emails and messages to deceive healthcare workers into disclosing login credentials or clicking on malicious links. A recent HHS report detailed BEC as among the most costly and prevalent attacks against healthcare.
  • Ransomware and data breaches: Ransomware attacks can lock down critical hospital systems, forcing organizations to pay a ransom or face major operational disruptions. The 2024 Change Healthcare ransomware attack, which affected over 190 million people and cost more than $2 billion USD and counting, highlights the devastating impact of such breaches.
  • Poor email security: Our research indicates that 73% of recently breached healthcare organizations lack a DMARC policy of p=reject (enforcement), making them susceptible to BEC, email spoofing, and domain impersonation. This allows cybercriminals to pose as trusted contacts and carry out phishing attacks.

A five-step model for phishing defense

Pillar
Description
Email security
Deploy DMARC, SPF, and DKIM alongside phishing protection and advanced ransomware detection for inbound email. Red Sift OnDMARC makes it easy, enabling enforcement within 6-8 weeks.
Decrease human errors
Block access to phishing websites, prevent malware downloads, and provide time-of-click protection against malicious links. Use blacklists and real-time content analysis.
Improve employee education
Educate employees on phishing tactics, improve detection and reporting of phishing emails, and strengthen the human element of security through ongoing training and simulations.
Enable multi-factor authentication (MFA)
Provide additional layers of security by requiring extra authentication beyond passwords, such as one-time codes, biometrics, or security keys, to prevent unauthorized account access and lateral movement.
Deploy Zero Trust
Assume that no user or device should be trusted by default. Enforce strict identity verification, least privilege access, continuous monitoring, and segmentation to prevent unauthorized access and lateral movement within a network.

The flatline

The healthcare industry faces consistent and rising cyber threats that will only increase with technological sophistication. Without robust email security policies, employee training, and advanced cybersecurity defenses, organizations risk further spectacular data breaches that could compromise financial stability, privacy, and even patient safety. Healthcare providers must take immediate action to safeguard sensitive data and ensure operational resilience.

Not sure where to start? Check your DMARC status for free with Red Sift Investigate and ensure your organization (and your patient’s data) remains secure today. 

PUBLISHED BY

Faisal Misle

23 Jun. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
Awards

Wrapping up 2025 on a high: Red Sift OnDMARC tops G2’s Winter…

Francesca Rünger-Field

As 2025 comes to a close, we’re thrilled to share that Red Sift OnDMARC has hit a new milestone in the G2 Winter 2026 Report. This quarter, we’ve secured first place in 8 reports, been featured in 19 total, and earned a record-breaking 16 badges. It’s a standout moment made even more special by…

Read more
Product Release

Red Sift’s Quarterly Product Release, Fall 2025

Francesca Rünger-Field

This Fall marks a major expansion of Red Sift Brand Trust with the launch of Social Media Monitoring, a new add-on that helps organizations detect and respond to fraudulent company and executive profiles across platforms such as Facebook, Instagram, LinkedIn, TikTok, and X. By extending protection beyond domains, Brand Trust now gives security teams…

Read more
AI

Red Sift’s AI Agent, Part III: Performance in action

Phong Nguyen

This is the third article in our AI Agent series. In Part 1, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent solution for handling the ambiguous cases that rule-based automation can’t confidently resolve, offering analyst-grade triage autonomously. In Part 2, we took readers behind the scenes to explore the engineering…

Read more
Finance

41% of top Fintech companies are vulnerable to email phishing

Jack Lilley

Only 26% of leading Fintechs enforce DMARC at p=reject, the strongest protection against spoofing by bad actors. Phishing remains a top driver of breaches and fraud. Financial services are a prime target because email moves money, resets passwords, and confirms identity. Verizon’s 2025 Data Breach Investigations Report again lists social engineering and phishing among…

Read more