One often-overlooked risk? The disconnect between health technology management (HTM) teams and IT departments. Medical devices are frequently excluded from cybersecurity planning, leaving major gaps in a hospital’s digital defenses.
“An effective cybersecurity program needs to collaboratively address both aspects, starting with procurement over onboarding and maintenance to decommissioning,” Wirth says.
That requires close cooperation between HTM and IT. Both departments bring vital responsibilities to the table, and both must be aligned, he adds.

Ad Statistics
Times Displayed: 36394
Times Visited: 972 Stay up to date with the latest training to fix, troubleshoot, and maintain your critical care devices. GE HealthCare offers multiple training formats to empower teams and expand knowledge, saving you time and money
The human factor: Training, awareness, and accountability
Technology alone can’t stop phishing emails or accidental data leaks. That’s why security training, for everyone from clinical staff to administrators, is essential.
“All staff, whether technical, clinical, or administrative, need to receive cybersecurity training as appropriate for their role,” Wirth says. “Every user needs to understand that their behavior and their decisions are a key contributor to an organization’s cyber preparedness and cyber defense.”
Rethinking priorities in cybersecurity investment
Despite rising threats, many healthcare organizations continue to underinvest in cybersecurity. Part of the challenge lies in the sector’s complexity, and the immense pressure to stay online after an incident.
Throwing money at the problem isn’t enough, Wirth cautions. “Healthcare organizations need to build security programs that are driven by comprehensive governance and address the full range of exposed devices and networks and their respective security risks,” he says.
It’s not a matter of if a breach will happen, but when. Yet many hospitals still lack a robust response plan, Wirth explains.
Key elements of a strong response strategy include:
• A multidisciplinary team that regularly updates and tests the plan
• Technical safeguards like segmentation and redundancy
• Forensic readiness and post-incident reviews
• Offline access to critical contacts — including vendors and law enforcement
To help healthcare organizations prepare, the Health Sector Coordinating Council has published actionable resources on building incident response capabilities.
A changing threat landscape
The Central Maine attack wasn’t an outlier — it was a warning. As cybercriminals grow more sophisticated, traditional, compliance-based security approaches are falling short.
“Cyber-adversaries have shown that they will continue to innovate and find new ways to maximize their profits — if financially motivated — or reach their strategic objectives, if politically motivated,” Wirth says. Any cybersecurity program must be comprehensive and effective, but also adaptable, as attackers [continually refine their methods].”