Check Point Software Technologies has released a comprehensive report ahead of World Patient Safety Day 2025, underscoring the escalating cyber threats facing the healthcare sector.
The report reveals a 17% year-on-year increase in global cyberattacks on healthcare organizations, with an average of 2,465 weekly attacks per organization in 2025, far exceeding the global cross-industry average of 1,963.
Africa and Latin America Face Intense Cyber Pressure
Africa has emerged as a critical hotspot, with healthcare organizations facing an average of 3,575 weekly attacks in 2025, a 38% surge from the previous year.
Kingsley Oseghale, Check Point’s Country Manager for West Africa, attributes this spike to the rapid adoption of e-health systems and mobile patient services, which have outpaced security infrastructure and training. “Africa’s healthcare sector is under significant threat,” Oseghale said.
“As we strive to meet the needs of a growing population, protecting these systems is critical to ensuring safe care delivery.”
Latin America recorded the highest regional attack volume, with 4,539 weekly attacks per organization, a staggering 63% increase year-on-year, driven by rapid digitization and insufficient cybersecurity investment.
At the country level, the Netherlands faced the highest volume of attacks (3,216 per organization, +31% YoY), while the United States saw the sharpest rise (+40%), fueled by the high value of its healthcare data for extortion schemes.
From Data Breaches to Direct Patient Harm
The stakes in healthcare cybersecurity extend beyond data breaches to direct impacts on patient care. Check Point Research notes that cyberattacks have delayed surgeries, forced emergency diversions, and altered treatment plans.
The 2017 WannaCry ransomware attack, which disrupted 1,200 diagnostic devices across the UK’s NHS, serves as a stark reminder of how cybercrime can paralyze healthcare delivery, leading to canceled appointments and closed emergency departments.
Health-ISAC reports that 92% of healthcare organizations globally experienced at least one cyber incident in 2025, exposing over 276 million patient records. Medical identity theft, often repackaged into “identity kits” for fraud or extortion, costs victims an average of 210 hours and $2,500 to resolve, further eroding trust and straining hospital resources.
AI: A Double-Edged Sword
The rise of artificial intelligence (AI) is reshaping healthcare cybersecurity. Cybercriminals are leveraging AI to craft sophisticated phishing emails, develop malware, and create deepfakes of healthcare leaders, amplifying the scale and precision of attacks.
Conversely, AI is proving indispensable for defense, enabling real-time threat detection, automated ransomware blocking, and predictive vulnerability management.
According to IBM, AI-powered response platforms have reduced the average cost of a healthcare data breach from $9.7 million to $7.4 million in the past year. Check Point recently blocked over 7,000 phishing emails impersonating healthcare providers like Zocdoc across 300 organizations, highlighting the growing sophistication of AI-driven attacks.
Connected Devices Expand Vulnerabilities
The proliferation of Internet of Medical Things (IoMT) devices—such as infusion pumps and wireless heart monitors—has revolutionized care but introduced new risks. These devices, often inadequately secured, are prime targets for cyberattacks.
“Cybercrime can now directly harm patients, not just their records,” Oseghale warned, emphasizing the need for robust security standards for IoMT manufacturers.
A Call for Comprehensive CybersecurityCheck Point advocates a prevention-first, AI-powered approach to safeguard healthcare systems.
Key recommendations include:
- Continuous Staff Training: Regular education on phishing and social engineering.
- Asset Visibility: Mapping all cloud, IoT, and legacy systems to eliminate blind spots.
- Zero Trust & Segmentation: Limiting attacker movement within networks.
- AI-Powered Security: Proactive blocking of threats before execution.
- Platform Consolidation: Integrated architectures like Check Point Infinity for end-to-end protection.
