Ponemon Institute Survey of Over 500 Hospitals Reveals:

Healthcare IoT Risks Compromise Care

Cynerio’s latest report in collaboration with the Ponemon Institute shows that the cybersecurity industry isn’t doing enough to protect hospitals from attacks:


of hospitals have had their IoT/IoMT devices attacked in the past two years.


of hospital data breaches involve IoT devices.


of attacked hospitals pay the ransom when victimized by ransomware.


of hospitals had increased mortality rates after a cyberattack.

View the Survey Results

What Happens If Hospitals Don’t Address Healthcare IoT Risk?

An Inside Look at How Cynerio Stopped a Medical Device Zero-Day Vulnerability

JekyllBot:5 is a set of 5 critical vulnerabilities discovered by the Cynerio Live research team that enabled remote control of smart autonomous robots.

The vulnerabilities could have led to the disruption of patient medication delivery, shutdown of hospital elevators, and many other threats to patient care, safety, data, and health.

Learn More about JekyllBot:5
 Microsegmentation in Healthcare Whitepaper image


Microsegmentation in Healthcare

Among the most commonly recommended technical practices to prevent the impact of attacks is implementing a ZeroTrust architecture fueled by microsegmentation which has been shown to address 92% of device-level critical risks in healthcare environments.

This whitepaper covers healthcare-specific considerations and use cases to further illustrate the value of microsegmentation

Download the Whitepaper

Device Risks Enable Hospital Cyber Threats

Cynerio Research Shows Vulnerable Healthcare IoT Makes Hospitals an Attack Target

Network-connected medical devices have made patient care more streamlined and efficient but also expanded the attack surface.  As a result, the typical hospital environment is at greater risk of a data breach or having its infrastructure shut down by a ransomware attack:

Over 50% of healthcare IoT devices have a critical risk that would jeopardize patient health, safety or data if exploited.

Almost 75% of IV pumps have vulnerabilities that endanger patient safety.

More than 50% of oncology, pharmacology and lab devices run on versions of Windows that have reached end of life.

Move aside Urgent11 and Ripple20 – even in 2022, the most common healthcare IoT device risk is an insecure password!

Download the Full Report

Reducing Healthcare IoT Risk through Threat Detection and Remediation

MarinHealth Defeats IoMT Malware and Protects Medical Devices with Cynerio

MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too.

Read the Case Study

“Our partnership with Cynerio has been instrumental in securing our medical devices. This will improve both patient safety and the quality of patient care.”

Scott Christiansen,
Security and Systems Engineer, MarinHealth Medical Center

See What Customers Say about Us on KLAS

The analysts at KLAS Research shine a spotlight on the solution providers that go the extra mile to help healthcare delivery organizations deliver the best possible patient care. Hear directly from Cynerio customers anonymously interviewed by KLAS about how they are leveraging our healthcare IoT cybersecurity platform to keep their hospitals safe.

Cynerio KLAS overall Vendor Score

Don’t Just Identify Healthcare IoT Devices – Protect Them

Medical Device Safety is Patient Safety

Hundreds of hospitals, from the largest healthcare networks to the smallest community hospitals, trust Cynerio to:

Get the visibility to take inventory and measure the risk of every device – even unmanaged IT

Immediately detect and stop live attacks on healthcare IoT devices

Prioritize and address the most critical device risks for remediation

Segment medical devices to block attackers and enable secure healthcare

Learn More about the Cynerio Platform

Try Cynerio for Free

Active Attack Detection

A one-week, no-cost evaluation of your hospital’s IoT footprint. Live Healthcare IoT ransomware attacks detected in 80% of engagements.

Get Started Now

CMMS Risk Evaluation

Let Cynerio identify the devices in your hospital with known risks, no hardware deployment required. Just send us your CMMS data and we can tell you where to tighten up security.

Sign Up for a Free Evaluation

Cynerio On-Demand Webinars


Active Attacks on Healthcare Examples, Protections and Lessons Learned


Real-Time Medical Device Visibility and Security in Action


The Healthcare Cyberattack Landscape, H-ISAC Navigator

See all Webinars

Secure Your Healthcare IoT from Day One

Request a Demo

Real-time Medical Device Visibility and Security in Action

Wednesday, January 25th | 2:00 PM ET

Certification: Eligable for 1 Credit from the ACI