• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Life Sciences
  • Investments
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage

Vulnerability Threat Management 2026: How CISA KEVs Are Reshaping Healthcare Security

by Brandon Crawford, Manager of Vulnerability Threat Management at Fortified Health Security 02/04/2026 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print
Vulnerability Threat Management 2026: How CISA KEVs Are Reshaping Healthcare Security
Brandon Crawford, Manager of Vulnerability Threat Management at Fortified Health Security

Vulnerability threat management (VTM) in the healthcare space is too important to be conducted haphazardly. It’s critical to find software tools that let you prioritize vulnerabilities, spot trends instantly, and quickly filter by vulnerability type and severity.

Without such tools, managing vulnerability threats is a daunting task. Here’s what healthcare organizations are currently facing:

Scanners routinely find thousands of vulnerabilities across a typical healthcare environment – weaknesses in software, firmware or configuration on the IT, clinical or OT systems. They’re usually prioritized by asset type and Common Vulnerability Scoring System (CVSS) scores, which assess the severity of a vulnerability on a 0-to-10 scale.

The scanner reports create lengthy “to fix” lists that compete with patient care and maintenance windows.

CISA’s Known Exploited Vulnerabilities (KEVs) catalog contains vulnerabilities that the agency has confirmed are being actively exploited. When a vulnerability appears on this list, there’s a strong likelihood that bad actors are now attacking it. KEVs usually wind up at the top of patching and mitigation queues because they help your team focus its limited time on vulnerabilities most likely to lead to a real incident.

Here are some sobering statistics on the VTM landscape in healthcare today:

  • 99% of healthcare organizations have at least one device containing a CISA KEV in their environment.
  • 50% of organizations are investing in vulnerability tools, yet remediation across OT and clinical environments can still take weeks.
  • 96% of hospitals have end-of-life operating systems or software with known vulnerabilities.
  • 89% of healthcare organizations conduct vulnerability scanning quarterly, but far fewer do it monthly.
  • Fewer than 20% of these organizations do advanced testing like wireless penetration tests, red/blue team exercises, or tabletop drills quarterly.

Patient Safety Requires Prompt Patching

Most critical non-medical device vulnerabilities receive vendor patches within about 14 days, but hospitals still need regular scanning and strong processes to apply those patches.

Across more than 1.5 million patient-connected devices, about 8% have confirmed KEVs. A subset of those also have KEVs linked to ransomware and insecure connectivity, which means they are both exposed and attractive to attackers.

Nearly 80% of healthcare organizations have OT devices with KEVs – and 65% have OT devices with KEVs plus insecure Internet connectivity.

A More Productive Way To Patch

Here are some of the many benefits of using VTM software to guide your patching:

Makes efficient use of limited staff time – Your team doesn’t waste time addressing low-priority vulnerabilities.

Ability to isolate assets that rely on vendor validation – Some medical device and OT assets can’t be patched quickly, so a VTM tool lets you determine which assets can be placed on a bubble network that keeps them far away from medical records.

Improves reporting to executive leadership – VTM software lets you summarize the progress you’ve made in patching vulnerabilities – and documents any hurdles you’ve encountered.

End-to-end automation of non-critical patches – VTM tools allow you to authorize automatic patches for programs that pose little risk to your ongoing operations (Adobe Reader, Google Chrome, Microsoft Office, etc.).

VTM: A Patient Safety Priority

About 120,000 patient-connected devices in the U.S. have confirmed vulnerabilities. That opens the door to ransomware and puts patient safety in real jeopardy. VTM tools can help you stay one step ahead of attackers while maximizing precious staff time.


About Brandon Crawford
Brandon Crawford is Manager, Vulnerability Threat Management at Fortified Health Security, headquartered in Brentwood, Tennessee.

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

2026 Predictions & Trends

Healthcare 2026 Forecast: Executives on AI Survival, Financial Reckoning, and the End of Point Solutions

2026 Healthcare Executive Predictions: Why the AI “Pilot Era” Is Officially Over

Featured Research Report

2026 Best in KLAS Awards: The Full List of Software & Services Winners

Most-Read

Analysis: Oracle Cerner’s Plans for a National EHR

Oracle May Cut 30k Jobs and Sell Cerner to Fund $156B OpenAI Deal

Beyond the Hype: New KLAS Data Validates the Financial and Clinical ROI of Ambient AI

Beyond the Hype: New KLAS Data Validates the Financial and Clinical ROI of Ambient AI

Anthropic Debuts ‘Claude for Healthcare’ and Opus 4.5 to Engineer the Future of Life Sciences

Anthropic Debuts ‘Claude for Healthcare’ and Opus 4.5 to Engineer the Future of Life Sciences

OpenAI Debuts ChatGPT Health: A ‘Digital Front Door’ That Connects Medical Records to Agentic AI

OpenAI Debuts ChatGPT Health: A ‘Digital Front Door’ That Connects Medical Records to Agentic AI

From Genes to Hackers: The Hidden Cybersecurity Risks in Life Sciences

From Genes to Hackers: The Hidden Cybersecurity Risks in Life Sciences

Utah Becomes First State to Approve AI System for Prescription Renewals

Utah Becomes First State to Approve AI System for Prescription Renewals

NYC Health + Hospitals to Acquire Maimonides in $2.2B Safety Net Overhaul

NYC Health + Hospitals to Acquire Maimonides in $2.2B Safety Net Overhaul

KLAS Report: Why Hospitals Are Choosing Efficiency Over 'Agentic' AI Hype in 2025

KLAS Report: Why Hospitals Are Choosing Efficiency Over ‘Agentic’ AI Hype in 2025

Advanced Primary Care 2026: Top 6 Investments for Health Systems According to Harvard Medical School

Advanced Primary Care 2026: Top 6 Investments for Health Systems According to Harvard Medical School

AI Nutrition Labels: The Key to Provider Adoption and Patient Trust?

AI Nutrition Labels: The Key to Provider Adoption and Patient Trust?

Secondary Sidebar

Footer

Company

  • About Us
  • 2026 Editorial Calendar
  • Advertise with Us
  • Reprints and Permissions
  • Op-Ed Submission Guidelines
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2026. HIT Consultant Media. All Rights Reserved. Privacy Policy |