• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

ecw Leaderboard Ad
  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Life Sciences
  • Investments
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage

Why Compromised OT Devices are the Biggest Cyber Risk for Hospitals

by Sıla Özeren, Security Research engineer at Picus Security 11/25/2025 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print
Sıla Özeren, Security Research engineer at Picus Security

When a hospital’s connected devices are compromised, it’s more than just data or dollars at risk — it’s patient lives. In recent years, operational technology (OT) devices, such as infusion pumps, ventilators and imaging systems, have become essential to clinical operations. Unfortunately, flaws in these devices and the broader networks they connect to continue to expose hospitals to devastating attacks.

Recent discoveries of vulnerabilities in Siemens and Advantech devices underscore the risks hospitals face. Siemens imaging and control systems were found to contain flaws that could let attackers bypass authentication or crash equipment. Advantech’s widely deployed industrial and IoT platforms had remote code execution vulnerabilities that researchers confirmed could be exploited. These are the same kinds of devices embedded in hospital environments, forming the backbone of patient monitoring, building management and medical imaging.

Vulnerabilities open the door to devastating ransomware attacks. During the DCH Health ransomware event, ambulances were diverted from critical care patients. The CommonSpirit incident delayed treatments and appointments for weeks across multiple states. In every case, the result was disruption to hospital operations that directly impacted patient safety and trust.

Increasing threats to healthcare

Healthcare is a top target for cyber criminals. Defensive testing, as outlined in the Picus Blue Report, shows that even when healthcare organizations deploy multiple layers of security controls, detection and prevention gaps persist. In particular, controls designed to monitor east-west traffic inside hospital networks often miss lateral movement, making it easier for attackers to pivot from compromised OT devices into electronic health record systems or administrative platforms.

Several factors converge to make healthcare uniquely exposed:

  • Legacy systems: Many OT devices run on outdated systems and software that can’t be patched without interrupting clinical use. This issue contributed to WannaCry’s impact on the NHS.
  • Long refresh cycles: High-value equipment such as MRI machines may remain operational for decades, well beyond typical IT lifecycles.
  • Flat networks: In many hospitals, clinical devices and corporate systems are interconnected, enabling attackers to pivot from compromised OT equipment to electronic health records or billing platforms.
  • Operational constraints: Unlike in other industries, taking a device offline for updates or testing can directly impact patient care.

These conditions create a perfect storm: an expanding attack surface that is difficult to manage with traditional approaches, easy to exploit and deeply intertwined with patient outcomes. Attackers also understand the high stakes. Threat groups deliberately target healthcare because they know hospitals are more likely to pay ransoms quickly to restore service. 

A new approach to healthcare security

Given these challenges, healthcare CISOs and their teams must rethink how they manage cyber risk. Traditional patch-everything strategies can’t keep pace. Instead, organizations need to modernize their cyber defenses to incorporate continuous validation and risk-based prioritization.

  • Validate continuously. Traditional vulnerability management often assumes that every high-severity CVE is dangerous. But as the Picus Exposure Validation research shows, less than 2% of vulnerabilities labeled high or critical are exploitable in a given environment. Security teams should simulate real-world attacks across OT and IT environments to understand which vulnerabilities can be exploited within their networks. By continuously testing security controls against real-world attack techniques, hospitals can see which vulnerabilities are neutralized and which require urgent attention, preventing wasted effort on issues already mitigated by existing controls.
  • Prioritize based on risk and context. Not every CVE deserves a crisis-level response. Hospitals should weigh asset criticality, exploitability and existing controls before deciding where to focus. A flaw on an isolated lab device may be less urgent than a vulnerability in patient monitoring software running on the main clinical network.
  • Shore up compensating controls. When patching is not feasible, security teams should apply alternative mitigations such as updated intrusion prevention rules or endpoint detection signatures. This buys time without exposing patients to unnecessary risk.
  • Test resilience continuously. Breach and attack simulation and red/blue team exercises help reveal blind spots that scanners and audits miss. By mapping attack paths across OT and IT networks, hospitals can identify and close potential pivot points before attackers exploit them.
  • Gain buy-in and alignment with stakeholders across the organization. CISOs should work closely with clinical and operational leaders to ensure basic security awareness and cyber hygiene are supported. Transparent reporting, including evidence-based exposure scores, can help foster understanding and alignment around investment and implementation of successful cyber defense strategies that support patient care rather than hinder it.

Cyber Defense that enables patient care

Healthcare security leaders face immense pressure: constrained budgets, complex regulatory requirements and what may seem like a never-ending barrage of cyberattacks. It’s important they focus on reducing real risk, restoring control and ensuring continuity of care. By moving to continuous validation, context-aware prioritization and layered defenses, healthcare organizations can reduce their exposure, reinforce patient safety and strengthen trust.

Every minute of downtime matters when patient lives are on the line. By modernizing vulnerability management and securing OT devices, hospitals can protect not only their systems and data but also the patients who depend on them.


About Sila Özeren

Sıla Özeren is an associate security research engineer at Picus Security. She holds an MSc in cryptography from the Institute of Applied Mathematics at METU, where she completed her thesis on the PQC algorithm called CRYSTALS-Kyber and its masked implementations.

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Insights

How eClinicalWorks is Harnessing AI and Telehealth to Support Rural Healthcare Organizations

Most-Read

GE HealthCare Acquires Intelerad for $2.3B to Create Cloud-First, AI-Enabled Imaging Ecosystem

GE HealthCare Acquires Intelerad for $2.3B to Create Cloud-First, AI-Enabled Imaging Ecosystem

Humana Partners with Sunrise to Expand Digital Sleep Apnea Diagnostics

Humana and Epic Launch Coverage Finder to Deliver Digital-First Medicare Advantage Check-In

Cleveland Clinic and Khosla Ventures Form Strategic Alliance to Accelerate Healthcare Innovation

Cleveland Clinic and Khosla Ventures Form Strategic Alliance to Accelerate Healthcare Innovation

Northwell Health Selects to Deploy Abridge’s Ambient AI Across 28 Hospitals

Northwell Health to Deploy Abridge’s Ambient AI Across 28 Hospitals

Omada Health Launches "Nutritional Intelligence" with AI Agent OmadaSpark

Omada Health Launches AI-Powered Meal Map to Transform Nutrition for Cardiometabolic Patients

From Overwhelmed to Optimized: How AI Agents Address Staffing Challenges and Burnout in Healthcare

From Overwhelmed to Optimized: How AI Agents Address Staffing Challenges and Burnout in Healthcare

Qualtrics Acquires Press Ganey Forsta for $6.75B to Create the Most Comprehensive AI Experience Platform

Qualtrics Acquires Press Ganey Forsta for $6.75B to Create the Most Comprehensive AI Experience Platform

Pfizer and Trump Administration Announce Landmark Agreement to Lower Drug Costs

Pfizer and Trump Administration Announce Landmark Agreement to Lower Drug Costs

KLAS Report: Epic's Native Ambient Speech Tool Reshapes Customer AI Strategies

KLAS Report: Epic’s Native Ambient Speech Tool Reshapes Customer AI Strategies

Epic Unveils MyChart Central and New APIs to Advance Interoperability at Open@Epic

Epic Outlines Roadmap for Next-Generation Data Sharing at Open@Epic

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Op-Ed Submission Guidelines
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |