NIS2 in de zorg
25/03/2025

NIS2 compliance in healthcare: is your organization ready?

Cyberattacks in healthcare are on the rise, and NIS2 introduces stricter cybersecurity requirements. How can hospitals and healthcare providers prepare while ensuring compliance with this new directive?

 

The healthcare sector is increasingly targeted by cyberattacks. In 2024, Belgian healthcare organizations faced an average of 2,668 attacks per week. From ransomware incidents at hospitals to data breaches in medical records, the impact on patient safety and business continuity is severe.

 

In 2022, for example, hospitals within the Belgian healthcare group Vivalia were forced to cancel thousands of consultations due to a ransomware attack. And in 2024, the ransomware group Killsec published 50,000 stolen documents containing sensitive medical information of Belgian patients online.

 

With the introduction of the NIS2 Directive, healthcare providers and hospitals must significantly tighten their cybersecurity policies. But what does this really mean for the sector? And how can organizations prepare for this new regulation? In this blog, we take a closer look at the impact of NIS2 and provide a practical roadmap toward compliance.

 

NIS2 in healthcare: what's the impact?

 

The NIS2 Directive has been in force in Belgium since 18 October 2024. For healthcare organizations, this means:

 

  • Expanded scope: Hospitals, laboratories, and other healthcare providers now explicitly fall under the new rules.

  • CEO accountability: Management can be held personally liable in cases of negligence.

  • Mandatory reporting: Cyber incidents must be reported to the competent authorities within 24 hours.

  • Severe penalties for non-compliance: Healthcare organizations risk heavy fines if adequate measures are not in place.

  • Inspections and audits: National authorities will monitor compliance with cybersecurity obligations.

What does that mean in practice? Healthcare institutions must develop an active cybersecurity policy, with a focus on business continuity and risk management.

 

Cybersecurity challenges in healthcare 

 

Healthcare, and hospitals in particular, are becoming increasingly attractive targets for cybercriminals. Sensitive patient data is therefore a lucrative business for hackers who can sell this information on the dark web or use it for extortion.

 

Unfortunately, hospitals are vulnerable. Cybersecurity investments are not always sufficient, as limited budgets are primarily allocated to direct patient care, medical equipment, and staff. Digital security is thus treated as a "second priority," at least until an incident occurs.

 

These are the biggest cybersecurity pain points in healthcare:

 

  • Vulnerable IT infrastructure: Many hospitals operate with outdated IT systems that are not designed for modern cybersecurity threats. This increases the risk of data breaches and cyberattacks.
  • Staff as the weak link: Phishing and social engineering remain among the biggest threats. Employees unknowingly click on malicious links, which can lead to large-scale data breaches. Complexity of vendors and applications: Healthcare institutions work with various third-party vendors, such as EHR (Electronic Patient Record) and PACS (Picture Archiving and Communication System) vendors. Without clear security guidelines, these systems can become a gateway for cybercriminals.
  • Inadequate network security: Traditional perimeter security is no longer sufficient. Zero Trust Security is the new standard: every access to sensitive data must be continuously validated.

NIS2 in Healthcare: A Step-by-Step Guide to Compliance

 

To comply with NIS2, healthcare institutions should adopt a structured approach. This step-by-step plan will help organizations set the right priorities and get their cybersecurity policies in order on time.

Step 1: Identify your Crown Jewels

  • Which systems and data are the most critical? And what are the greatest risks?
  • Consider patient data, medical devices, and cloud services.
  • Use a Security Score Assessment to determine your current security status.

Step 2: Protect your organization with a strong security framework

  • Use recognized cybersecurity frameworks such as NIST, ISO27001, or the Belgian CyFun model.
  • Implement MFA (Multi-Factor Authentication), network segmentation, and strong password management procedures.

Step 3: Proactively detect threats

  • Use Security Information and Event Management (SIEM) to detect attacks early.
  • Perform regular penetration tests and a Cyber ​​Threat Assessment.
  • Strengthen your defenses with Identity & Access Management (IAM).
  • Identify hackers faster using honeypots (cybersecurity decoys).

Step 4: Train your employees

  • Organize cybersecurity awareness training to minimize human error.
  • Simulate phishing attacks to raise employee awareness of threats.
  • Develop a realistic Business Continuity Plan and test it annually.

Step 5: Track your suppliers and applications

  • Use a CMDB (Configuration Management Database) to map and track all your assets.
  • Evaluate your key third parties annually.
  • Lifecycle management and tracking CVEs (Common Vulnerabilities and Exposures) are essential to keeping your environment safe and sound.
  • Implement and validate strict security requirements for cloud and SaaS solution providers.

Cybersecurity: a continuous process

 

NIS2 isn't an IT problem, but an organization-wide security issue. Hospitals and healthcare institutions must take action now to become compliant. The key to success? Viewing security as a continuous process and collaborating with the right partners.

 

Want to know how your organization is doing? Have a security assessment performed and start your NIS2 strategy today.

 

Want to learn more about NIS2 and cybersecurity in healthcare? Contact an AXI expert and ensure your organization is ready for the future.