Close Menu
The Politics
    What's Hot

    AI-powered smart glasses blur the line between real and fake photos online

    March 20, 2026

    AI-powered hospital cyberattacks increasingly target healthcare workers

    March 20, 2026

    Car stolen with two-month-old baby inside

    March 20, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Politics
    • Buy Now
    Facebook X (Twitter) Instagram
    The Politics
    Subscribe
    Friday, March 20
    • Home
    • Breaking
    • World
      • Africa
      • Americas
      • Asia Pacific
      • Europe
    • Sports
    • Politics
    • Business
    • Entertainment
    • Health
    • Tech
    • Weather
    The Politics
    Home»Tech»AI-powered hospital cyberattacks increasingly target healthcare workers
    Tech

    AI-powered hospital cyberattacks increasingly target healthcare workers

    Justin M. LarsonBy Justin M. LarsonMarch 20, 2026No Comments8 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link


    NEWYou can now listen to Fox News articles!

    If you watched a recent episode of “The Pitt” on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.

    After a ransomware attack hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.

    When a hospital’s systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS

    Intensive care unit, equipment, ventilation, oxygen stock photo.

    A ransomware attack can lock hospital systems in seconds, disrupting access to critical medical records and patient care. (iStock)

    Why hospitals have become prime targets

    Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.

    “Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare.” He points to another major factor driving hospital cyberattacks. “Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets.”

    Healthcare systems also rely on vendors and service providers. One weak link can open the door. “In healthcare, you’re only as secure as the entire ecosystem around you,” Amper said.

    How AI-powered impersonation is changing the game

    Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. “What we’re seeing more and more is that attacks aren’t always about breaking into systems, they’re about tricking people,” Amper said.

    Artificial intelligence (AI) has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. “AI doesn’t replace social engineering, it supercharges it.”

    In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. “An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems,” Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.

    5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

    A view of patients at a hospital getting prepped before surgery.

    Healthcare workers operate in high pressure environments, which makes social engineering and impersonation attacks more effective. (Paul Bersebach/MediaNews Group/Orange County Register/Getty Images)

    Why hospitals are especially vulnerable to cyberattacks

    Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. “Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction,” Amper said.

    Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. “One misconception is thinking of cybersecurity as just an IT problem,” Amper said.

    Today’s hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. “Cybersecurity today is fundamentally about operational resilience. It’s about keeping the hospital running safely and continuously.”

    What happens to your data after a breach

    When a hospital is breached, the exposed data often goes beyond a credit card number. “Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data,” Amper said.

    That combination is powerful. Criminals can use it for identity fraud, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. “Stolen medical data can’t simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets.”

    The impact may not show up right away. “The impact isn’t always immediate; it can surface months or even years later.”

    people and doctors walking around a hospital

    When hospital networks are breached, sensitive medical histories, identity details and insurance data can be exposed for years. (iStock)

    How hospitals can strengthen defenses

    Identity now sits at the center of cybersecurity. “Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed,” Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.

    How to check if your information is on the dark web

    After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.

    What patients should do after a hospital breach

    If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. “First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered.”

    Then take practical steps right away:

    • Review insurance statements for unfamiliar claims
    • Check medical records for incorrect diagnoses or procedures
    • Monitor your credit reports
    • Consider placing a free credit freeze with the major credit bureaus if your Social Security number was exposed
    • Enable two-factor authentication (2FA) on email, financial and healthcare accounts wherever it is available
    • Be cautious of emails or calls referencing the breach
    • Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    “If something feels off, contact the hospital directly using official contact information. Don’t rely on links or numbers provided in unexpected messages.” He adds one final reminder. “Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert.”

    Protect your accounts from long-term damage

    Even if everything appears normal right now, take steps to secure your accounts. Credential leaks often surface weeks or months later.

    • Consider identity theft protection. Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
    • Stop reusing passwords immediately. If attackers gain access to one working login, they often test it across dozens of websites automatically.
    • Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password.
    • Consider using a password manager to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
    • Install strong antivirus software on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.

    Kurt’s key takeaways

    When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.

    And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.



    Source link

    Related

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Justin M. Larson
    • Website

    Related Posts

    Tech

    AI-powered smart glasses blur the line between real and fake photos online

    March 20, 2026
    Tech

    US suffers hottest March day ever recorded as heat dome drives up temperatures | US News

    March 20, 2026
    Tech

    NASA prepares Artemis II launch – with rocket back on site and crew in quarantine | Science, Climate & Tech News

    March 20, 2026
    Tech

    First lab-grown oesophagus successfully implanted in pigs | Science, Climate & Tech News

    March 20, 2026
    Tech

    Government to fund clear-up of illegal tips in north of England | UK News

    March 19, 2026
    Tech

    Wall-climbing robots swarm US Navy warships

    March 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    • Africa
    • Americas
    • Asia Pacific
    • Breaking
    • Business
    • Economy
    • Entertainment
    • Europe
    • Health
    • Politics
    • Politics
    • Sports
    • Tech
    • Top Featured
    • Trending Posts
    • Weather
    • World
    Economy News

    AI-powered smart glasses blur the line between real and fake photos online

    Justin M. LarsonMarch 20, 20260

    NEWYou can now listen to Fox News articles! Smart glasses are gaining new momentum thanks…

    AI-powered hospital cyberattacks increasingly target healthcare workers

    March 20, 2026

    Car stolen with two-month-old baby inside

    March 20, 2026
    Top Trending

    AI-powered smart glasses blur the line between real and fake photos online

    Justin M. LarsonMarch 20, 20260

    NEWYou can now listen to Fox News articles! Smart glasses are gaining…

    AI-powered hospital cyberattacks increasingly target healthcare workers

    Justin M. LarsonMarch 20, 20260

    NEWYou can now listen to Fox News articles! If you watched a…

    Car stolen with two-month-old baby inside

    Justin M. LarsonMarch 20, 20260

    The baby boy was rescued by police unharmed and reunited with his…

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo
    Editors Picks

    Review: Record Shares of Voters Turned Out for 2020 election

    January 11, 2021

    EU: ‘Addiction’ to Social Media Causing Conspiracy Theories

    January 11, 2021

    World’s Most Advanced Oil Rig Commissioned at ONGC Well

    January 11, 2021

    Melbourne: All Refugees Held in Hotel Detention to be Released

    January 11, 2021
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Editors Picks

    AI-powered smart glasses blur the line between real and fake photos online

    March 20, 2026

    AI-powered hospital cyberattacks increasingly target healthcare workers

    March 20, 2026

    Car stolen with two-month-old baby inside

    March 20, 2026

    Venezuelan leader replaces senior military commanders

    March 20, 2026
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    News

    • World
    • US Politics
    • EU Politics
    • Business
    • Opinions
    • Connections
    • Science

    Company

    • Information
    • Advertising
    • Classified Ads
    • Contact Info
    • Do Not Sell Data
    • GDPR Policy
    • Media Kits

    Services

    • Subscriptions
    • Customer Support
    • Bulk Packages
    • Newsletters
    • Sponsored News
    • Work With Us

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2026 The Politics Designed by The Politics.
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.