EUROPEAN COMMISSION
Brussels, 15.1.2025
COM(2025) 10 final
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
European action plan on the cybersecurity of hospitals and healthcare providers
1.Introduction
The EU’s security environment is rapidly changing, with an escalation of hybrid attacks and cyberattacks that aim to destabilise our society, seeking division and disruption but also profits from cybercrime. Europe must therefore urgently strengthen its preparedness for and resilience against this new reality, across all sectors and in line with a ‘whole-of-society’ and ‘whole-of-government’ approach, as called for in the report by the Special Adviser to the President of the European Commission, Sauli Niinistö.
Secure and resilient healthcare systems are a cornerstone of the EU’s social model. However, hospitals and healthcare systems are facing mounting threats, particularly from ransomware gangs targeting them for financial gain, driven by the high value of patient data, including electronic health records. The health sector has indeed become the most attacked industry in the EU over the past four years, including during the COVID-19 pandemic when health infrastructure was increasingly targeted by cyberattacks. Cyberattacks on hospitals and healthcare providers are causing direct harm to people, delaying medical procedures, causing gridlocks in emergency rooms and could, in extreme cases, lead to the loss of life.
The stakes are even higher as the sector undergoes a vital digital transformation. Digital health and the use and reuse of health data can enable models of care better suited to people and patients’ needs and preferences, by preventing the onset of disease or enabling earlier treatment. The integration of digital tools and solutions in clinical processes as well as the use and reuse of health data can inform better clinical decisions, contribute to automation in health as well as to faster and better patient care. Digital tools, data usage, and medical devices – which are often connected to the internet and powered by artificial intelligence (AI) – are also key to address challenges such as the shortage of healthcare professionals.
At the same time, digital tools also expand the potential targets for cybercriminals. Moreover, certain state actors do not shy away from targeting healthcare facilities, as witnessed by Russia’s ongoing war of aggression against Ukraine. This makes the sector a potential target for cyberattacks as part of a wider hybrid campaign. Cyberattacks not only jeopardise patient safety but also erode public trust in health infrastructure and come with significant recovery costs. Beyond guarding against cyberattacks, a resilient and secure digital infrastructure is also essential for supporting the implementation and full deployment of the European Health Data Space (EHDS).
Therefore, it is time to level up and strengthen the cybersecurity and resilience of Europe’s hospitals and healthcare providers, as emphasised by President von der Leyen in her Political Guidelines for the 2024-2029 Commission. This action plan responds to the urgency of the situation and the unique threats facing the sector. There is no simple ‘silver bullet’ solution to the cybersecurity challenges in healthcare. Instead, the action plan calls for strengthened prevention, preparedness, and a more coordinated approach to solidarity while tapping into the expertise of the European cybersecurity industry. As such, the action plan reflects the EU approach to security that will be further developed and formalised in the upcoming European Internal Security Strategy, defining comprehensive response to face all internal security threats and focussing on the capacity to anticipate threats, to prevent harm and protect people, acting at all levels with a whole-of-society approach.
The health sector includes a broad number of entities and actors, comprising hospitals, clinics, care homes, rehabilitation centres and various healthcare providers, alongside the pharmaceutical, medical and biotechnology industry, medical devices manufacturers, and health research institutions. This action plan predominantly focuses on the cybersecurity of hospitals and healthcare providers, understood as any natural or legal person – or any other entity – legally providing healthcare on the territory of a Member State. Hospitals and healthcare providers are interdependent with other health entities, and they are closest to people. At the same time, measures to enhance the cybersecurity of hospitals and healthcare providers should also address risks affecting the broader supply chain and ecosystem, stemming for instance from entities that use health data for research and machine learning or that produce medical devices, in particular digitally enabled medical devices that connect to the internet or other devices (“internet of things”).
While securing health systems is primarily a national competence, health is also a critical sector under the Directive on measures for a high common level of cybersecurity across the EU (NIS2). Cybercriminals and other threat actors operate across borders, and the cybersecurity challenges faced by healthcare organisations are also similar across Member States. Cooperation at the European level is valuable for sharing and scaling up best EU-level and national practices. Therefore, the Action Plan proposes EU-level coordination and measures, whilst also calling on Member States to take action to make a difference for healthcare and the wider health ecosystem.
The focus of the Action Plan is on building the sector’s capacities to prevent cybersecurity incidents in the first place, because prevention is always better than the cure. Secondly, the Action Plan details actions to improve cybersecurity information-sharing and capability to detect cyber threats, allowing a faster reaction. Thirdly, it provides measures to better respond to incidents, and to recover from them. Finally, the Action Plan envisages ways to deter cyber threat actors from launching attacks against health systems in Europe.
The Action Plan will be implemented hand in hand with healthcare providers and the wider health ecosystem, Member States, and the cybersecurity community. A collaborative approach is key to further defining and refining the most impactful actions so that all of Europe’s critical healthcare providers can benefit from them. Therefore, this Communication will be accompanied by the launch of a comprehensive consultation with stakeholders, industry and Member States.International cooperation is important for cybersecurity due to the borderless and interconnected nature of cyberthreats. Comparable cybersecurity threats are present also in the enlargement and neighbourhood countries and other EU strategic partner countries. This can ultimately endanger the security of critical infrastructure in the EU. It will therefore be important to reflect the lessons learned from implementing the Action Plan also in the EU’s cooperation with both enlargement and other partner countries, in light of the threat levels to which they are respectively exposed.
2. Cybersecurity challenge of hospitals and healthcare providers
Cyber threats to the health sector
Cyberattacks are on the rise globally and within the EU, with an increasingly complex and dynamic threat landscape. Advancements in AI are equipping criminal and malicious actors with powerful tools to increase the precision and impact of their operations, while, at the same time, reshaping cyber defence possibilities by allowing automated and real-time action against attacks.
Ransomware remains a critical cybersecurity challenge in the EU and globally, with one report estimating a global annual cost of more than EUR 250 billion by 2031. When ransomware criminals strike, they not only encrypt victims' data for ransom but increasingly leak sensitive information to exert additional pressure. Another prominent challenge is vulnerabilities in software and hardware: according to the European Union Agency for Cybersecurity (ENISA), healthcare is the sector that declared the most security incidents related to such vulnerabilities. Other growing threats include distributed denial-of-service (DDoS) attacks, designed to overwhelm a targeted system with a flood of traffic, rendering it inaccessible to legitimate users.
The health sector faces similar cybersecurity threat trends, with a pronounced emphasis on ransomware attacks. According to the ENISA, ransomware accounted for 54% of analysed cybersecurity incidents in the health sector in 2021–2023. 83% of attacks were financially motivated, driven by the high value of healthcare data, while 10% of attacks had an ideological motivation. Similarly, a 2024 report by the Commission found that 71% of attacks with effects on patient care, such as delayed treatment, diagnosis and impaired access to emergency services, were of the ransomware type. Ransomware attacks can have a particularly disruptive effect on the provision of healthcare services, putting patient safety at risk. Moreover, ransomware attacks are often coupled with breaches of patient data, which often includes sensitive health-related data and violates people’s fundamental right to protection of personal data.
At the same time, with the increasing digitalisation of healthcare, the attack surface is growing. According to the Report on the State of the Digital Decade 2024, an average of 79% of EU citizens have online access to their electronic health records in primary care. Electronic health records, clinical information systems, hospital workflow systems, IT systems for handling reimbursement of treatments, medical imaging systems, and medical devices used for diagnostic purposes or for patient monitoring are all examples of digital tools that can play a major role in boosting the efficiency and performance of the health sector, but are also potential targets of a cybersecurity attack. Specific healthcare activities such as intensive care and radiological imaging, or medical fields such as oncology and cardiology, that are highly dependent on digitally enabled devices, are at a particular risk of cyberattacks. In addition, supply chain issues may lead to the procurement of devices with insufficient cyber security, exacerbating existing general risks.
For example, during the COVID-19 pandemic, a ransomware attack paralysed large parts of the Irish health care system, leading to cancellation of at least some services at 31 of the 54 acute hospitals on the morning of the incident. Health services had to revert to paper records, slowing down the efficiency of operations. The attack originated from a phishing email containing a malicious attachment. The incident demonstrated the potential of cyberattacks spreading across different systems, and consequently the importance of protecting the entirety of a healthcare organisation’s attack surface. It also underlined the importance of ensuring fundamental cyber hygiene and cybersecurity culture throughout organisations.
Cybersecurity maturity of hospitals and healthcare providers
The healthcare landscape in the EU is very diverse, with hospitals and other healthcare providers varying greatly in terms of ownership, structure and size across Member States. In some cases, healthcare governance can be based on a centralised approach at national level, in others at regional and local level; healthcare providers can be publicly or privately owned. Furthermore, differences can also exist within the same country, for example where there are significant socio-economic and territorial disparities across regions, leading to a complex picture. This complex healthcare landscape can be challenged by important health crises, due to communicable diseases, such as the COVID-19 pandemic, but also other health risks for instance related to climate change. Finally, there is significant variability and fragmentation in the level of digitalisation and adoption of technology by healthcare providers. An example of this complexity is that service unavailability caused by a cybersecurity incident can result in serious damage and harm to patients even in small-scale healthcare facilities, including clinics or emergency medical services which provide an essential service to a relatively low number of users.
According to the 2024 ENISA Report on the State of Cybersecurity in the Union, the EU health sector’s cybersecurity maturity is moderate and there are wide differences in the level of cybersecurity maturity between healthcare entities across Europe. Deficiencies can be observed in key areas such as sufficient human resources, organisations’ knowledge of their information and communications technology (ICT) supply chains, and installation of up-to-date security features in products. The sector struggles with basic cyber hygiene and fundamental security measures, as illustrated by the fact that nearly all health organisations surveyed face challenges when it comes to performing cybersecurity risk assessments, while almost half have never performed a risk analysis.
Another significant challenge for the cybersecurity of hospitals is the intersection of information technology (IT) and operational technology (OT), where different security priorities meet as regards confidentiality, availability and reliability, and where a breach in one area can affect the other. The 2024 ENISA Report on the State of Cybersecurity in the Union further stresses that the health sector is not performing adequately in ensuring the security of the ICT products and processes it uses, due to the large variety of health entities, devices and products.
This diversity, combined with varying levels of cyber awareness among hospital staff and management, creates a complex challenge for ensuring the cybersecurity of healthcare systems. For instance, according to the 2024 Eurobarometer on Cyberskills, only 25% of surveyed companies in the health, education and social care sector had provided training or awareness-raising about cybersecurity in the previous 12 months. Action is needed to foster a culture of cybersecurity awareness among frontline healthcare professionals. For example, staff rotations, use of shared workstations, poor authentication management and the use of removable media are additional sources of vulnerabilities affecting healthcare providers’ cybersecurity.
In many cases, IT and OT are at least partly outsourced. The 2024 Eurobarometer found that the share of companies outsourcing at least some aspects of their cybersecurity is the highest in the health, education and social care sector, with 57% of surveyed companies doing so. Similarly, there is a strong trend of migrating to cloud computing, driven by the need for scalable data storage and management, cost efficiency, improved collaboration, and support for advanced technologies like AI and the Internet of Medical Things. In 2022, 58% of health organisations used a cloud-based digital health platform. However, while this shift can bring significant efficiencies, it also entails risks that require informed decisions about procurement and secure configuration.
Overarching all of these challenges is the question of capacity building and funding. Funding for cybersecurity in the health sector has been limited and remains a universal challenge across the EU. Furthermore, these funding challenges arise against the background of an ageing population, which is expected to create widespread budgetary pressures on Europe’s health systems in the coming decades.
The continued use of obsolete tools and legacy systems, limited resources to prevent or react to incidents, and gaps in cybersecurity maturity often stem from funding shortfalls. Hospitals face a continuous challenge to balance an up-to-date secure and digital infrastructure with other necessary investments to improve patient care, such as hiring of doctors and other healthcare professionals, implementation of novel diagnostic and treatment methods, and acquisition of devices. According to ENISA, the health sector ranks only 7th of the 12 sectors studied when it comes to the proportion of information security spending out of the total IT spending, with 8.3% being the median in the health sector.
3. European Cybersecurity Support Centre for hospitals and healthcare providers
The EU’s cybersecurity framework offers a broad range of tools that should be leveraged to improve the security and resilience of hospitals and healthcare providers. To address the numerous challenges highlighted above, it is necessary to develop a unified, strategic approach at EU level, bringing together the necessary resources, expertise, and tools to effectively tackle cyber threats. A comprehensive overview, as well as better planning and coordination, are essential to help healthcare providers across the EU strengthen their defences. To achieve this, ENISA is best placed to establish, within its organisation, a dedicated European Cybersecurity Support Centre for hospitals and healthcare providers as part of its mandate to safeguard and support the EU’s critical infrastructure.
The Support Centre should progressively develop a comprehensive service catalogue catering to the needs of hospitals and healthcare providers, outlining the range of available services for preparedness, prevention, detection and response. Working with Member States’ authorities and drawing from the experiences of hospitals and healthcare providers, the Support Centre should develop a user-friendly, easy-access repository of all available instruments at European, national and regional levels. In conducting its activities, it should ensure proper coordination with Member States, and support prioritisation and delivery of actions as needed in real time.
As an important building block for the development of the service catalogue of the Support Centre, the Commission will propose to launch pilots across the EU to develop best practices for cyber hygiene and security risk assessment, as well as addressing the need for continuous cybersecurity monitoring, threat intelligence and incident response using state-of-the-art cybersecurity solutions. Outcomes of these pilots, which will be funded by the Digital Europe Programme, executed by the European Cybersecurity Competence Centre (ECCC), will inform further actions at the EU level including the work of the Support Centre.
Figure 1: Concepts for the Support Centre’s service catalogue for hospitals and healthcare providers
3.1. Preventing cybersecurity incidents
Simple actions that shift the odds
Basic cybersecurity measures, such as ensuring that systems are kept up to date, managing backups, and implementing multi-factor authentication can, according to one estimate, protect organisations from up to 98% of attacks. Many of the most impactful cyber hygiene and risk-management measures are relatively straightforward to adopt, making them a low-hanging fruit for improving cybersecurity. One of the key roles of the Support Centre should therefore be to develop clear, targeted guidance that highlights the most critical cybersecurity practices and aids healthcare providers in implementing them. This support must extend beyond large hospitals to include tailored advice for smaller entities, such as local General Practitioner’s offices and specialist clinics, which often lack the resources for dedicated cybersecurity teams but remain equally vulnerable to attacks. Furthermore, it is necessary to consider the regional importance of specific healthcare entities for ensuring patient care, for instance in sparsely populated areas. Health research institutes that handle large amounts of sensitive personal data could also benefit from receiving guidance on basic cybersecurity measures to enhance their resilience.
Healthcare organisations are also subject to a range of cybersecurity-related obligations stemming from EU legislation. While the obligations are crucial for ensuring a high common baseline for cyber and data security, it is essential to ensure that the regulatory landscape is not needlessly difficult and burdensome to navigate. A heavy focus on compliance should not run counter to the objective of fostering a strong cybersecurity culture. An easy-access regulatory mapping tool can help minimise the administrative burden for entities subject to multiple regulatory instruments. Along with developing guidance and toolkits, the Support Centre should work closely with the Commission and Member States to develop and disseminate such a tool as soon as possible. The Support Centre would therefore play an important role in making cybersecurity rules simple to understand and to implement, for instance by providing implementation guidance and where necessary promoting relevant standards.
The forthcoming European Digital Identity Wallets are another tool for facilitating simple implementation of good cyber hygiene practices. Reducing the reliance on weak identification mechanisms, such as passwords, is essential to mitigate the risks of unauthorised access to health data. A shift towards secure sign-on solutions based on reliable identification is critical. The EU Digital Identity Wallet offers a harmonised, EU-wide approach to electronic identification for healthcare professionals, providing a robust and unified solution as of end of 2026. All online health information systems required to implement strong user authentication will be obliged to accept the Wallet for identification purposes as of the end of 2027.
Preparedness and Targeted Support
Preparedness testing, involving actions such as penetration testing, is a cornerstone of effective cybersecurity, and the Commission has already allocated funding to ENISA for pilot preparedness initiatives, which revealed that the health sector is among the most in-demand areas for testing and further assessments to identify gaps in cybersecurity maturity. With the entry into force of the Cyber Solidarity Act, these efforts will expand significantly, with the ECCC taking the lead . To address this need, the Commission will propose, in consultation with the NIS Cooperation Group, EU-CyCLONe and ENISA, to identify health as a sector for which support can be given for coordinated preparedness testing under the Cyber Solidarity Act. Furthermore, the Support Centre should develop a tailored framework for cybersecurity maturity assessments specific to healthcare. Such maturity assessments would provide entities with actionable insights into their vulnerabilities while allowing them to demonstrate their cybersecurity readiness to patients and stakeholders, building trust in their services. At an aggregated level, the Support Centre should carry out an annual Health Cyber Maturity Assessment, which would establish a clear overview of the health sector’s cybersecurity at both national and EU levels.
The health sector relies heavily on external contractors for cybersecurity services, highlighting the need for targeted support to strengthen defences. Building on successful initiatives such as the EU Innovation Vouchers, the Member States should consider targeted measures like Cybersecurity Vouchers for micro, small, and medium-sized hospitals and healthcare providers. These vouchers would provide financial assistance to put in place specific cybersecurity measures. The prioritisation of the allocation of vouchers should be informed by the findings of preparedness testing and maturity assessments.
Local knowledge and context are crucial for the effective rollout of vouchers or other support programmes, ensuring relevance and accessibility. EU funds, such as the European Regional Development Fund, are already active in supporting cybersecurity and digital health initiatives, and could therefore serve as a vehicle to develop targeted cybersecurity voucher schemes for healthcare providers. To drive this effort, the Support Centre would collaborate with Member States and regional programme authorities to support the development of such regional voucher schemes, drawing on lessons from existing national projects as well as actions funded under Digital Europe Programme to ensure practical and impactful implementation.
Furthermore, since 2014, the Horizon programmes have been instrumental in funding a range of research initiatives focused on enhancing the resilience of healthcare institutions, such as hospitals, against cyber threats and mitigating the risks associated with the misuse of emerging technologies. The resulting deliverables include a suite of specialised tools, frameworks, and systems, such as risk assessment tools, privacy-preserving data-sharing platforms, cryptographic solutions, cybersecurity awareness training programmes, and real-time threat detection systems. Notably, these solutions have been rigorously validated through real-world pilot implementations in healthcare environments, ensuring their effectiveness and practical applicability in protecting against cyber threats.
Securing Healthcare Supply Chains
A key challenge for healthcare organisations is managing complex ICT supply chains, which involve a range of products such as connected medical devices, Electronic Health Records systems and office hardware. Hospitals and healthcare providers need reliable and secure ICT systems and services for their operations. To help address cybersecurity challenges in the health sector, the NIS Cooperation Group should perform a coordinated security risk assessment, assessing both technical and strategic risks related to medical devices supply chains and proposing mitigating measures. As appropriate, the NIS Cooperation Group should collaborate with the Medical Device Coordination Group.
The Cyber Resilience Act is a new, comprehensive framework that sets cybersecurity requirements for planning, design, development, as well as handling, patching, and reporting of actively exploited vulnerabilities regarding almost all hardware and software products, at each stage of the value chain. Medical devices are a type of product used in one of the most sensitive areas of our society. The cybersecurity requirements for these products stem from the pre-existing Medical Devices Regulation and the Regulation on in-vitro diagnostic medical devices. The ongoing evaluation of those regulations is examining the potential for greater coherence and synergies between these frameworks in order to guarantee simplification and state-of-the-art cybersecurity.
Furthermore, the findings of the risk assessment should support healthcare organisations in reviewing their supply chain cybersecurity practices as required under the NIS2 Directive, and could inform the development of new Procurement Guidelines. Developed by ENISA through its Support Centre, these guidelines should reflect recent trends, such as cloudification of patient data storage, including the need for secure migration of electronic health data to cloud environments. Moreover, the new Guidelines should offer practical tools for organisations to keep track of their supply chains, including managed security service providers (MSSPs), attestation reports or third-party risk assessments.
For cloud, further action is needed to address the unique challenges of managing sensitive healthcare data, including heightened security, privacy, and operational risks. To strengthen safeguards, experts recommend embedding "Security by Default and by Design" into cloud services. This approach prioritises secure infrastructure, proactive vulnerability management, and a mix of governmental and private cloud solutions. Continuous monitoring and vendor-specific attestations—such as security provider certifications and compliance audits with national and international standards—are also essential for ensuring robust security practices.
For services like Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS), security implementation often falls to the customer. However, many healthcare organisations lack the resources to meet these requirements independently. To address this, cloud service providers should be encouraged to implement baseline security measures as a standard feature. These measures would reduce the risk of misconfigurations, maintain consistent protection across customer-managed environments, and provide greater assurance to users. Establishing a default security baseline would aim to balance robust protection with practicality, ensuring usability for a wide range of healthcare organisations. This effort would involve close collaboration between cloud providers and the health sector, leveraging industry best practices to create effective and scalable solutions.
Training and skills development
Having a workforce with in-demand skills is important for long-term sustainable growth and competitiveness in Europe, as well as for high-quality services, including healthcare services. The shortage of qualified cybersecurity professionals is a significant challenge across Europe, with an estimated gap of 299,000 professionals to fill workforce needs in the EU. According to the 2024 Eurobarometer on Cyberskills, 81% of companies view difficulties in hiring cybersecurity staff as a key risk for potential cyberattacks. In the education, health, and social work sectors, 66% of cybersecurity roles are filled by employees transitioning from non-cybersecurity positions, highlighting the urgent need for reskilling and upskilling.
To address this challenge, the Support Centre should collaborate with the future cybersecurity skills European Digital Infrastructure Consortium (EDIC) foreseen in the Commission Communication on the Cybersecurity Skills Academy. The work should facilitate exchanges among cybersecurity professionals in the health sector, such as Chief Information Security Officers (CISOs). One potential action would be to create a European Health CISOs Network , starting with a pool of experts to share and develop best practices, talent retention strategies, and solutions for attracting cybersecurity professionals to the health sector. Furthermore, under the umbrella of the Cybersecurity Skills Academy, resources should be developed to enhance the cybersecurity workforce in the health sector with the support of industry and academia. In this regard, industry stakeholders should be encouraged to pledge support for enhancing cybersecurity training.
Human error continues to be a major contributor to cybersecurity incidents in healthcare, underscoring the critical need for comprehensive staff training and cyber awareness. Given the frequent use of digital tools by healthcare professionals, it is vital to equip them with the knowledge of secure practices. Targeted training and awareness campaigns can significantly reduce risks. To address this, the Support Centre should work with healthcare professionals and providers, and cooperate with education and training providers, industry, the cybersecurity skills EDIC as well as Member State authorities to create and disseminate extensive, easy-to-access online training modules and courses.
Incorporating digital competence and cybersecurity modules into educational curricula is crucial for building a strong cybersecurity foundation in healthcare. These modules should address sector-specific issues like patient-data protection and vulnerabilities in the security of medical devices. The development of these resources should take into account prior actions, such as the BeWell project funded under the Erasmus+ programme and the PANACEA project funded under Horizon 2020.
3.2.European capabilities for detecting cyber threats against the health sector
Effective cyber threat detection is essential for prompt response to incidents. Threat actors can leverage techniques to make intrusions difficult to detect, enabling extended periods of unpermitted access to a system. Therefore, better threat detection capabilities can help stop cyberattacks in their tracks. For example, in the ransomware attack against the Finnish psychotherapy service provider Vastaamo, during which the perpetrator extorted patients whose confidential patient records were stolen, the initial intrusion occurred in 2018, but only became known to the provider in 2020.
Efficient information sharing and collaboration are essential for enhancing threat detection and situational awareness throughout the EU. Computer Security Incident Response Teams (CSIRTs) play a vital role in receiving reports of incidents, near misses and potential threats, offering guidance on mitigation measures at the national level. However, Member States are strongly encouraged to also share all cyber incident notifications from hospitals and healthcare providers with ENISA’s Support Centre to allow for EU situational awareness. Ideally, this should be accompanied by a meaningful characterisation of various relevant incident dimensions, including known root vulnerabilities and effects on healthcare services and patient adverse events. Furthermore, manufacturers of medical and in vitro diagnostic devices are encouraged to voluntarily report, via the single reporting platform to be established and managed by ENISA within the framework of the Cyber Resilience Act, actively exploited vulnerabilities or severe cyber incidents having an impact on the security of these devices, as well as potentially other vulnerabilities, incidents, near misses or cyber threats that may affect the risk profile of these devices.
Where the information contained in the reports is no longer sensitive, the Support Centre could build up an ENISA-sponsored European known exploited vulnerabilities (KEV) catalogue for medical devices, electronic health record systems and providers of ICT equipment and software in health. To address significant challenges of threat detection, the Support Centre should introduce an EU-wide early warning subscription service for the health sector, delivering near-real-time alerts. This service would draw on processed data from CSIRTs, healthcare entities and manufacturers, Open-Source Intelligence (OSINT), and other relevant actors such as Cyber Hubs, Information Sharing and Analysis Centres (ISACs) and law enforcement authorities. Enhanced cooperation between ENISA and the European Union Agency for Law Enforcement Cooperation (Europol) – for example on patterns of cybercrime against the health sector – would further boost situational awareness.
ISACs serve as central resources for cyber threat intelligence, fostering two-way information sharing between the public and private sectors, and promoting trust-building. The Support Centre should step up support for the European Health ISAC with tools and information exchange, sectorial situational awareness reports, as well as fostering a trusted community for tactical and strategic collaboration. Member States should encourage the development of national health ISACs. The ISACs should also be encouraged to bring together healthcare providers with manufacturers to give rise to a joint understanding of cybersecurity threats, including in the supply chain, and facilitating a dialogue about secure design of products that truly take into account the deployment realities on the ground.
3.3.Rapid response and recovery
Given the high sensitivity of patient health data and the potentially devastating effects of cyberattacks on healthcare services, a swift and effective response to cybersecurity incidents is crucial to safeguarding patient safety. When a hospital or healthcare provider faces a cyberattack, the first point of contact is the relevant national CSIRT. The CSIRT is responsible for providing timely support, ideally within 24 hours, to help manage significant incidents. However, if an incident exceeds the CSIRT’s capacity, EU support should be available to ensure a swift and effective response.
The EU Cybersecurity Reserve, established under the Cyber Solidarity Act, provides incident response services from trusted managed security providers to assist with significant or large-scale cybersecurity incidents and initial recovery efforts. This reserve is designed to complement the efforts of Member States’ CSIRTs, enabling them to request additional support in cases involving critical sectors like health. To enhance this system, the Commission and ENISA should ensure that the Reserve includes a Rapid Response Service specifically for the health sector. In complementarity with other existing frameworks, this service would deploy experts to manage significant or large-scale cybersecurity incidents in healthcare without delay when national support is insufficient.
To improve response and recovery, the Support Centre, in collaboration with the NIS Cooperation Group, the CSIRTs Network and, where relevant, Europol, should develop cyber incident response playbooks tailored for healthcare. These playbooks would guide both CSIRTs and healthcare organisations in responding to specific cybersecurity threats, including ransomware. Given the importance of effective cooperation among CSIRTs and law enforcement authorities in responding to and investigating cybersecurity incidents of criminal nature, the playbooks should, among other aspects, provide clear guidance on the reporting of such incidents to law enforcement. Furthermore, the Support Centre could facilitate a wide roll-out of national cybersecurity exercises, building on experiences from exercises like ENISA's Cyber Europe 2022 exercise, to test the playbooks and strengthen incident response protocols.
To inform policies and assess the effectiveness of measures taken against ransomware attacks, it is necessary to collect further data. To this effect, Member States should request entities subject to the NIS2 Directive, including healthcare organisations, to report on any ransom payments made and on ransom payments they intend to make, alongside other information they provide when reporting on significant cybersecurity incidents. Such reporting supports the effective investigation of ransomware incidents, including the tracing of payments on cryptocurrency exchange platforms in order to identify the recipients.
Recovery speed is a critical factor in maintaining resilience and public trust, particularly in healthcare, where downtime can disrupt patient care. For effective recovery from ransomware attacks, healthcare providers must have secure, up-to-date, and isolated backups that can be quickly restored. As part of its service catalogue, the Support Centre could offer a ransomware recovery subscription service, helping hospitals and healthcare providers prepare recovery plans in advance. ENISA and Europol should collaborate to identify the most common ransomware strains targeting healthcare organisations and expand the repository of decryption tools available through the No More Ransom project. They should also develop and promote accessible guidance to help healthcare providers avoid paying ransoms by using decryption tools.
The International Counter Ransomware Initiative is a valuable arena for exchange on specific ransomware incidents, as well as for building the capacities of member countries to strengthen their cybersecurity frameworks and investigation capabilities against ransomware actors. The Commission, working together with the High Representative, will continue to advance cooperation in the Counter Ransomware Initiative, including against ransomware threats to the health sector. Moreover, the Commission will seek cooperation in the G7 Cybersecurity Working Group, to strengthen the cybersecurity of the health sector. In particular, the Working Group could consider possibilities to support the health sector against threats such as ransomware, building on reflections such as the Joint Statement on Ransomware Attacks Against Healthcare Facilities of 8 November 2024 presented in the context of the United Nations Security Council.
4.National Actions
The capacity of this Action Plan to improve cybersecurity in the health sector hinges on the active involvement and commitment of Member States. To successfully implement the Action Plan, Member States could designate National Cybersecurity Support Centres specifically for hospitals and healthcare providers. These centres would act as the primary points of contact for the health sector at national level, collaborating closely with the ENISA Support Centre. Where possible and relevant, Member States should designate existing bodies, such as national health CSIRTs or relevant authorities, as National Cybersecurity Support Centres.
Member States are also encouraged to create national action plans focused on cybersecurity in the health sector. These plans would outline the specific cybersecurity risks faced by healthcare systems and the national actions being taken to address them, while also ensuring that European-level resources and practices are effectively used. The ENISA Support Centre can assist in developing these plans, taking into account already existing national plans and coordinating efforts to ensure that the resources and strategies of individual Member States complement each other.
Another key focus for Member States is facilitating resource sharing among healthcare providers, which could be achieved through joint procurement or pooled resources at the national, regional, or even European level. This approach would reduce the financial burden on individual entities while increasing their bargaining power with cybersecurity service providers.
For example, the French CaRE programme has introduced a number of measures at national and regional level to address challenges in resourcing: a cyber catalogue provides an overview of cyber solutions and packages made available to hospitals through the national cybersecurity agency, the digital health agency, regional agencies, national purchasing organisations as well as commercial solutions. This is complemented by additional funding for regional agencies to offer shared resources.
Member States should also address the insufficient levels of investment in cybersecurity within the health sector. To ensure adequate funding, they should set non-binding benchmarks and monitor funding targets aimed specifically at cybersecurity, while ensuring that these investments do not detract from essential patient care. These funding targets should also aim to integrate security considerations into all digital investments in the sector. Member States can exchange best practices and advice on these targets through platforms such as the eHealth Network.
5.Public-Private Cooperation
Public-private cooperation and consultation with healthcare providers, other health sector entities, as well as relevant cybersecurity industry players, is essential for the successful implementation of the Action Plan. To further feed into the work of the Support Centre, the Commission, supported by ENISA, will set up a joint Health Cybersecurity Advisory Board with high-level representatives of both fields, healthcare and cybersecurity, which can advise the Commission and the Support Centre on impactful actions and discuss the further development of public-private partnerships in this field. The board will build on existing efforts for public-private partnerships, including the European Health ISAC.
Furthermore, the Commission will launch a call for action for cybersecurity companies, foundations, educational institutions, and industry stakeholders to pledge actions to address the challenges in the sector. Building on the experience of the Cybersecurity Skills Academy, such commitments could be for instance pledges under the Cybersecurity Skills Academy to include the provision of training courses and materials with a focus on health sector for cybersecurity professionals. Other commitments could also address awareness raising activities or the provision of managed security services to specifically vulnerable entities for free or at reduced cost in order to increase their preparedness and cybersecurity resilience. Moreover, the commitments could consist in sharing cyber threat intelligence with the ENISA Support Centre. The Support Centre should maintain an overview of pledges made under the call for action, with the goal of ensuring their coherence and complementarity.
6.Deterring cyber threat actors
The EU’s internal and external cybersecurity policies should support the goal of deterring cyber threat actors from attacking European healthcare systems. Cyberattacks against healthcare organisations are a particularly unacceptable type of malicious cyber activity, given their capability to threaten patient safety and human lives. Therefore, the full force of the EU’s deterrence capabilities in the field of cybersecurity and law enforcement should be used to undermine the overall business model of threat actors targeting the health sector, and to deprive them of easy profits. This would include fostering cross-border investigations through enhanced sharing of indicators of compromise and other relevant data, and an increased focus on high-value targets and key criminal facilitators such as bulletproof hosting or crypto-currency mixing services.
The Cyber Diplomacy Toolbox offers a framework to prevent, deter and respond to cyberattacks against the EU, Member States and partners. The High Representative will continue to use the existing cyber sanctions framework to respond to threats targeting health systems.
Holding criminal actors accountable for their actions is an important deterrent. Therefore, Member States should ensure that law enforcement is fully integrated into their national action plans. In particular, they should make full use of the provisions under the Directive on attacks against information systems and under the Council of Europe’s Budapest Convention on Cybercrime to deter attacks, bring criminals to justice and to dismantle criminal infrastructures facilitating attacks. Successful implementation of these tools should ensure that criminal and malicious actions against healthcare are punished.
7.Implementing and monitoring the Action Plan
Throughout this Action Plan, a number of tasks have been foreseen for a Support Centre to be established within ENISA. This ensures a holistic and coherent implementation of the Action Plan while avoiding the creation of new entities leading to potential overlaps and overhead costs. The Commission intends to ensure the appropriate resourcing of the Support Centre.
Once the Support Centre is operational, ENISA, in consultation with the Commission, should regularly provide updates of the Support Centre’s work to the ENISA Management Board as well as relevant networks of Member States, in particular the NIS Cooperation Group, CSIRTs Network, the eHealth Network and where relevant, the European Health Data Space Board. Furthermore, ENISA should continually exchange with the public-private Health Cybersecurity Advisory Board about the implementation of actions provided by the Support Centre.
ENISA’s regular reports, such as the Report on the State of Cybersecurity in the Union, which provides an aggregated assessment of the level of maturity of cybersecurity capabilities and resources across the EU, including in the health sector, should serve as occasions to publish relevant data, supporting the monitoring of the Action Plan. Furthermore, ENISA’s EU Cybersecurity Index can provide quantitative and qualitative data, serving as an evidence base for assessing the criticality and maturity of the health sector.
8.Next steps
This Communication has set out an ambitious agenda for a more cybersecure health sector in the EU. With the proposed development of the Cybersecurity Support Centre for Hospitals and Healthcare Providers at the heart of ENISA, the Action Plan sets out an avenue towards the creation of a coherent and shared European approach to the challenge of cybersecurity in the sector.
This Communication should be seen as the start of a process to improve cybersecurity in the health sector. Therefore, the adoption of the Action Plan will be accompanied by the launch of comprehensive stakeholder consultations and the continuation of exchanges with Member States and relevant networks to collect insights. Based on the results of the consultations, the Commission intends to come forward with recommendations in the fourth quarter of 2025 to further refine the Action Plan.
The Commission calls on Member States and all stakeholders to work together in delivering on the ambition of the Action Plan.
ANNEX – Overview of proposed actions
The Commission:
|
ENISA Cybersecurity Support Centre for Hospitals and Healthcare Providers
|
|
Ensure appropriate resources for the Cybersecurity Support Centre
Work with the ECCC to launch pilot projects to develop best practices for cyber hygiene and security risk assessment, and to address the need for continuous cybersecurity monitoring, threat intelligence and incident response using state-of- the art cybersecurity solutions, for the development of the European Cybersecurity Support Centre’s service catalogue
|
2025
|
|
Preventing cybersecurity incidents
|
|
In consultation with the NIS Cooperation Group, EU-CyCLONe and ENISA, explore identifying health as a sector for which support can be given for coordinated preparedness testing under the Cyber Solidarity Act
|
Q1 2025
|
|
Rapid Response and Recovery
|
|
Together with ENISA, ensure the EU Cybersecurity Reserve includes a Rapid Response Service specifically for the health sector
|
Q4 2025
|
|
Public-Private Cooperation
|
|
Supported by ENISA, set up a joint Health Cybersecurity Advisory Board
|
Q1 2025
|
|
Launch a call for action for cybersecurity companies, foundations, educational institutions, and industry stakeholders to pledge actions to address the challenges in the health sector
|
Q2 2025
|
|
Deterring cyber threat actors
|
|
Together with the High Representative, explore the use of Cyber Diplomacy Toolbox measures to prevent, discourage, deter and respond to malicious activities against health systems
|
2025
|
|
Advance international cooperation against ransomware actors, notably in the International Counter Ransomware Initiative, working together with the High Representative
|
2025-2026
|
|
Seek cooperation in the G7 Cybersecurity Working Group to strengthen the cybersecurity of the health sector
|
2025-2026
|
|
Next steps
|
|
Launch comprehensive stakeholder consultations
|
Q1 2025
|
|
Adopt recommendations to further refine the Action Plan
|
Q4 2025
|
ENISA:
|
EU Cybersecurity Support Centre for Hospitals and Healthcare Providers
|
|
Begin work to establish a European Cybersecurity Support Centre for hospitals and healthcare providers
|
Q2 2025
|
|
Develop a comprehensive service catalogue to be provided by the Cybersecurity Support Centre
|
From Q4 2025
|
|
Preventing cybersecurity incidents
|
|
Issue guidance that highlights the most critical cybersecurity practices and aid healthcare providers in implementing them
|
Q3 2025
|
|
In close collaboration with Commission and Member States, develop a regulatory mapping tool
|
Q1 2025
|
|
Develop a framework for cybersecurity maturity assessments specific to healthcare
|
Q3 2025
|
|
Carry out an annual Health Cyber Maturity Assessment
|
2025-2026
|
|
Collaborate with Member States and regional programme authorities to create Cybersecurity Voucher model programmes
|
2025-2026
|
|
Develop new procurement guidelines for cybersecurity of hospitals and healthcare providers
|
Q3 2025
|
|
Create a European Health CISOs Network
|
Q1 2026
|
|
Design and promote training modules and courses for healthcare professionals
|
Q1 2026
|
|
European capabilities for detecting cyber threats against the health sector
|
|
Build up a European KEV catalogue for medical devices, electronic health record systems and providers of ICT equipment and software in health
|
Q4 2025
|
|
Introduce an EU-wide early warning subscription service for the health sector
|
As of 2026
|
|
Support the European Health ISAC with tools and information exchange
|
2025-2026
|
|
Rapid Response and Recovery
|
|
Together with the Commission, ensure the EU Cybersecurity Reserve includes a Rapid Response Service specifically for the health sector
|
Q4 2025
|
|
In collaboration with the CSIRTs Network, develop cyber incident response playbooks tailored for healthcare
|
Q3 2025
|
|
Facilitate a large roll out of national cybersecurity exercises to test the playbooks and strengthen incident response protocols
|
As of Q4 2025
|
|
Provide a ransomware recovery subscription service
|
As of 2026
|
|
Together with Europol, identify the most common ransomware strains targeting healthcare organisations and expand the repository of decryption tools through the No More Ransom project.
|
Q4 2025
|
|
Together with Europol, develop accessible guidance to help healthcare providers avoid paying ransoms
|
Q3 2025
|
|
National Actions
|
|
Assist Member States in developing national action plans
|
2025
|
|
Coordinate efforts to ensure that resources and strategies of individual Member States complement each other
|
2025-2026
|
|
Implementing and monitoring the Action Plan
|
|
In consultation with the Commission, regularly provide updates of the work of the Cybersecurity Support Centre to relevant networks of Member States
|
2025-2026
|
|
Continually exchange with the Health Cybersecurity Advisory Board
|
2025-2026
|
Member States:
|
European capabilities for detecting cyber threats against the health sector
|
|
Share incident notifications from hospitals and healthcare providers under NIS2 with the European Cybersecurity Support Centre
|
As of Q4 2025
|
|
Encourage the development of national health ISACs
|
2025-2026
|
|
Preventing cybersecurity incidents
|
|
Within the NIS Cooperation Group, perform a coordinated security risk assessment, assessing both technical and strategic risks related to medical devices supply chains
|
Q4 2025
|
|
Rapid Response and Recovery
|
|
Roll out national cybersecurity exercises to test the playbooks and strengthen incident response protocols
|
As of 2026
|
|
National Actions
|
|
Designate National Cybersecurity Support Centres for hospitals and healthcare providers
|
Q2 2025
|
|
Create national action plans focused on cybersecurity in the health sector
|
Q4 2025
|
|
Facilitate resource sharing among healthcare providers
|
2025-2026
|
|
Set non-binding benchmarks and monitor funding targets aimed specifically at cybersecurity
|
Q4 2025
|
|
Request healthcare organisations and other entities subject to the NIS2 Directive to report their intentions to pay ransoms
|
Q4 2025
|