Skip to main content
Back to Blog
CybersecurityOctober 15, 2025 · 6 min read

Why Small Medical Practices Are Prime Targets for Ransomware

P

Paul Kearney

Expert IT Operations

Cybercriminals aren't just going after hospital networks. Small medical practices hold the same valuable patient data with a fraction of the security budget, making them the path of least resistance.

The Small Practice Bullseye

When most people think of healthcare cyberattacks, they picture massive hospital breaches making national news. But the reality we see every day at Expert IT Operations is different. Small medical practices with 5 to 50 employees are getting hit at an alarming rate, and most of them never make the headlines.

The reason is straightforward: these practices hold the same protected health information (PHI) that makes healthcare data so valuable on the black market, but they rarely have dedicated IT security staff, current endpoint protection, or tested backup strategies. To a ransomware operator, that combination is irresistible.

Why Healthcare Data Commands a Premium

A stolen credit card number sells for a few dollars. A complete medical record with Social Security number, insurance details, and health history can fetch $250 or more. That price reflects how hard medical identity theft is to detect and how long it takes to resolve. Patients may not realize their information has been misused until fraudulent claims appear months later.

For a practice with 5,000 patient records, the value of that data to criminals is staggering. And unlike a bank that can freeze an account, you can't change someone's date of birth or medical history.

Common Entry Points We See

In our 40+ years supporting medical offices across New Jersey, the attack vectors repeat themselves. Phishing emails disguised as insurance correspondence or EMR vendor notifications remain the top entry point. Staff click a link, enter credentials on a spoofed page, and attackers have a foothold within minutes.

Unpatched systems are the second most common issue. Many small practices run older operating systems because their EMR vendor hasn't certified a newer version. That leaves known vulnerabilities wide open. Remote Desktop Protocol (RDP) exposed directly to the internet, often set up years ago for "convenience," rounds out the top three.

The Real Cost Goes Beyond the Ransom

Paying the ransom, which averaged $197,000 for small healthcare organizations in 2024, is only the beginning. Downtime while systems are restored means cancelled appointments and lost revenue. HIPAA breach notification requirements mean legal costs and potential fines. And the reputational damage with patients is hard to quantify but very real.

We've seen practices lose weeks of productivity after an attack. One client came to us after paying a ransom and still not getting all their data back. The attackers provided a decryption key that only partially worked, and the practice had no viable backups to fall back on.

What You Can Do Today

Start with the basics: enforce multi-factor authentication on every account that touches patient data, keep systems patched on a documented schedule, and implement a real backup strategy with offsite copies that get tested regularly. Train your staff on phishing recognition, not once a year but quarterly.

If your practice doesn't have an incident response plan, create one. Know who you're calling, what systems get isolated, and how you'll communicate with patients before an attack happens. The practices that recover fastest are the ones that planned ahead.

P

Written by Paul Kearney

Paul Kearney is the founder of Expert IT Operations, bringing 40+ years of IT experience to small businesses across New Jersey. Specializing in healthcare IT, cybersecurity, and infrastructure for regulated industries.

Let's Talk About Your IT Needs

Ready to bring Fortune 500 technology solutions to your business? Contact us for an operational assessment.