{"id":376099,"date":"2025-08-26T22:55:11","date_gmt":"2025-08-26T22:55:11","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/376099\/"},"modified":"2025-08-26T22:55:11","modified_gmt":"2025-08-26T22:55:11","slug":"europes-hospital-it-leaders-in-germany-france-and-italy-warn-ehds-push-outpaces-cyber-defenses","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/376099\/","title":{"rendered":"Europe&#8217;s Hospital IT Leaders in Germany, France, and Italy Warn: EHDS Push Outpaces Cyber Defenses"},"content":{"rendered":"<p>    <strong class=\"date-line\"><br \/>\n        BRUSSELS, August 26, 2025 (Newswire.com)<br \/>\n        &#8211;<br \/>\n    <\/strong>Cybersecurity has overtaken other digital priorities as the most acute operational risk to European hospitals, according to a new Black Book\u2122 European survey of 352 hospital IT leaders in Germany (158), France (84), and Italy (110). Respondents describe a widening attack surface driven by ransomware pressure, middleware\/API weaknesses, and deferred EHR patching. just as the European Health Data Space (EHDS) enters its transition phase toward application and NIS2 obligations bite through national laws.<\/p>\n<p><strong>Key findings from the Black Book survey<\/strong><\/p>\n<p><strong>74%<\/strong> of hospitals reported at least one serious cyberattack attempt in the past 12 months; the most common entry points were compromised credentials and attacks on APIs used for data exchange (FHIR\/HL7).<\/p>\n<p><strong>83%<\/strong> identify interoperability vendors and middleware systems as their most exploitable layer, citing weak API credential management, inconsistent mutual-TLS (mTLS), and infrequent key\/token rotation.<\/p>\n<p><strong>60%<\/strong> acknowledge deferred EHR patching; in open-ended responses, executives most often referenced their own deployed EHR environments<\/p>\n<p><strong>69%<\/strong> of French and Italian CIOs say their posture is constrained by vendor patch responsiveness and complex upgrade dependencies across EHR, PACS, LIMS, and scheduling systems.<\/p>\n<p><strong>62%<\/strong> report no ring-fenced incident-response budget or in-house Security Operations Center (SOC) capacity.<\/p>\n<p><strong>89%<\/strong> believe EHDS connectivity will expand breach exposure before essential controls (strong identity, network segmentation, EDR\/XDR, tested immutable backups) are widely implemented.<\/p>\n<p>&#8220;Identity and the APIs between core systems are the weak links,&#8221; said Doug Brown, Founder &amp; President of Black Book Research. &#8220;Hospitals are working through backlogs of unresolved vulnerabilities while uncontrolled digital keys and dependency-bound patch cycles enlarge the attack surface. Without enforceable timelines for critical fixes, transparent disclosure, and clear software inventories, hospitals are fighting fast-moving threats with processes that can&#8217;t keep pace.&#8221;<\/p>\n<p>The EHDS Regulation (EU) 2025\/327 entered into force on March 26, 2025, initiating phased application and expanding cross-border data use on top of MyHealth@EU services like ePrescription and Patient Summaries.<\/p>\n<p><strong>Real-world incidents: a pattern of escalation<\/strong><\/p>\n<p><strong>Multi-country (Germany\/Austria\/Switzerland)<\/strong> &#8211; AMEOS Group disclosed a security breach disrupting operations across multiple countries in late July 2025.<\/p>\n<p><strong>Germany<\/strong> &#8211; University Hospital Frankfurt suffered a major cyberattack reported July 2025, severing internet access and triggering infrastructure rebuild; There were 324 health-sector incidents reported in 2023, the most of any critical sector.<\/p>\n<p><strong>United Kingdom<\/strong> &#8211; Ransomware on Synnovis pathology services forced London trusts to cancel procedures and revert to manual workarounds; NHS and press statements documented extensive disruption.<\/p>\n<p><strong>Germany <\/strong>&#8211; UKSH (L\u00fcbeck &amp; Kiel) canceled elective surgeries amid the global CrowdStrike IT outage-not a cyberattack, underscoring third-party resilience risk.<\/p>\n<p><strong>Belgium<\/strong> &#8211; CHU UCL Namur experienced a major IT outage that curtailed non-urgent admissions across three sites.<\/p>\n<p><strong>France <\/strong>&#8211; H\u00f4pital Simone-Veil (Cannes) faced a 2024 LockBit ransomware incident; non-urgent care was postponed and stolen data later published.<\/p>\n<p><strong>Ireland<\/strong> &#8211; Mater Misericordiae University Hospital (Dublin) reported EHR\/IT 2024 outages leading to cancellations and ED advisories.<\/p>\n<p><strong>EU-wide context:<\/strong> In January 2025, the European Commission launched an Action Plan to bolster hospital cybersecurity-standing up an ENISA Support Centre, an EU-wide early-warning service by 2026, and rapid-response capacity via the EU Cybersecurity Reserve.<\/p>\n<p><strong>Vendor ecosystem: foundational but fragile<\/strong><\/p>\n<p>Across the survey base, respondents report heavy reliance on a small set of dominant clinical platforms spanning EHR, interoperability, and imaging. While no single brand was singled out as uniquely responsible, hospitals emphasized shared risk characteristics across large platforms:<\/p>\n<ul>\n<li>\n<p><strong>Patch cadence and latency<\/strong> governed by maintenance windows and change-freeze cycles.<\/p>\n<\/li>\n<li>\n<p><strong>Clarity and timing of vulnerability advisories<\/strong>, often cited as insufficient to guide rapid action.<\/p>\n<\/li>\n<li>\n<p><strong>Complex upgrade dependencies<\/strong> across EHR, PACS, LIMS, and scheduling that slow remediation.<\/p>\n<\/li>\n<\/ul>\n<p>Cybersecurity providers most often recognized by respondents for highest satisfaction in healthcare-specific capabilities included Thales Group, Atos Eviden, Orange Cyberdefense, Secunet, Sopra Steria, and Almaviva\/Ingegneria Informatica, alongside global platforms such as Cisco, Palo Alto Networks, Check Point, and Fortinet. In this survey,<\/p>\n<p><strong>88%<\/strong> indicated a preference for EU-based providers due to GDPR alignment and data sovereignty.<\/p>\n<p><strong>What hospital leaders want from EHR &amp; HIT vendors (respondent priorities)<\/strong><\/p>\n<ul>\n<li>\n<p><strong>Patch SLAs tied to severity<\/strong> (e.g., critical fixes within defined hours\/days) &#8211; <strong>94%<\/strong>.<\/p>\n<\/li>\n<li>\n<p><strong>SBOM + VEX transparency<\/strong> to separate exploitable defects from background CVEs &#8211; <strong>88%<\/strong>.<\/p>\n<\/li>\n<li>\n<p><strong>Coordinated Vulnerability Disclosure (CVD)<\/strong> with time-boxed remediation and clear advisories &#8211; <strong>80%<\/strong>.<\/p>\n<\/li>\n<li>\n<p><strong>API security baselines<\/strong> (OAuth scope minimization, mTLS, scoped tokens, frequent rotation\/revocation, signed requests, automated secret hygiene) &#8211; <strong>66%<\/strong>.<\/p>\n<\/li>\n<li>\n<p><strong>Real-time advisories &amp; flexible maintenance windows<\/strong> to reduce clinical downtime &#8211; <strong>92%<\/strong>.<\/p>\n<\/li>\n<li>\n<p><strong>Third-party\/middleware risk controls<\/strong> such as API-gateway monitoring, token management, and supplier assurance &#8211; <strong>99%<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p><strong>The road ahead: aligning EHDS, NIS2 and product obligations<\/strong><\/p>\n<p>As EHDS scales cross-border exchange and MyHealth@EU services, hospitals and suppliers are also preparing for the Cyber Resilience Act (Regulation (EU) 2024\/2847) lifecycle security requirements for &#8220;products with digital elements,&#8221; with main obligations applying from December 11, 2027.<\/p>\n<p>Practical next steps include SBOM-backed software inventories, continuous API posture management, and severity-based patch SLAs aligned to clinical risk.<\/p>\n<p><strong>About the study<\/strong><\/p>\n<p>The 2025 European Cybersecurity Healthcare User Survey reflects self-reported conditions from 352 qualified hospital IT leaders in Germany (158), France (84), and Italy (110). Fielded March-August 2025. All figures reflect respondent experiences and perceptions within their environments. Black Book did not independently validate vendor-specific claims; results are reported as provided by respondents. Where priorities include multiple selections, percentages may exceed 100%.<\/p>\n<p><strong>About Black Book Research<\/strong><\/p>\n<p>Black Book Research delivers independent, vendor-agnostic intelligence on healthcare technology, cybersecurity, payer operations, and digital health adoption. Since 2011, Black Book has collected nearly 3.5 million stakeholder viewpoints worldwide-including more than 220,000 responses from European healthcare IT users-to benchmark satisfaction, readiness, and risk. Surveys are conducted with validated respondents using standardized instruments and confidence thresholds appropriate to each study design.<\/p>\n<p>Media Contact research@blackbookmarketresearch or 1 800 863 7590 Download gratis healthcare IT industry EHR, Cybersecurity and Population Health global reports for 110 countries worldwide at <a href=\"https:\/\/stats.nwe.io\/x\/html?final=aHR0cHM6Ly93d3cuYmxhY2tib29rbWFya2V0cmVzZWFyY2guY29tLw&amp;sig=_XeH-o3Xm-ZCGdUR09QB4L2vAKkD3fre3tG-rNtb1-TuW39OuqCU6Xzw3wiEfcb0fYYMU5h3s6fwLetlVtd5JQ&amp;hit%2Csum=WyI1MTA2bGoiLCI1MTA2bGsiLCI1MHptNTkiXQ\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.blackbookmarketresearch.com<\/a><\/p>\n<p class=\"text-alt\">Source: Black Book Research<\/p>\n","protected":false},"excerpt":{"rendered":"BRUSSELS, August 26, 2025 (Newswire.com) &#8211; Cybersecurity has overtaken other digital priorities as the most acute operational risk&hellip;\n","protected":false},"author":2,"featured_media":376100,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5310],"tags":[131336,131337,131338,131339,2000,299,131340,1824],"class_list":{"0":"post-376099","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-germany","8":"tag-black-book-research","9":"tag-blackbookmarketresearch-com","10":"tag-compugroup-medical","11":"tag-dedalus","12":"tag-eu","13":"tag-europe","14":"tag-europe-cybersecurity","15":"tag-germany"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115097536028698126","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/376099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=376099"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/376099\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/376100"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=376099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=376099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=376099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}