ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Microsoft 365 Still Weakest Link as Healthcare Email Breaches Continue on Pace With 2024, New Paubox Report Warns

New analysis reveals cybercriminals increasingly exploiting world's most popular business email platform, with 107 healthcare incidents in seven months

Cybercriminals are increasingly targeting Microsoft 365 environments, with the world's most widely-used business email platform now accounting for 52% of all healthcare email breaches—a dramatic surge from 43% just one year ago.

The alarming trend is detailed in Paubox's newly released report, “2025 mid-year email breach data reveals there’s no slowing down”, which analyzed 107 email-related healthcare data breaches that occurred in the first half of 2025. The findings reveal that healthcare organizations using Microsoft 365 face mounting security challenges as attackers refine their tactics to exploit the platform's widespread adoption.

More than 1.6 million patient records were compromised across all incidents, with the average breach exposing nearly 16,000 individual records. The largest single breach—affecting United Seating and Mobility—exposed over half a million records, while the financial impact has reached unprecedented levels, with healthcare breaches now costing an average of $11 million per incident according to IBM's latest research.

"Healthcare IT leaders are confident in their systems, until a breach happens," said Rick Kuwahara, Chief Compliance Officer at Paubox. "What we're seeing is a perfect storm of limited resources, expanding attack surfaces, and security strategies that rely too heavily on human vigilance."

Microsoft 365 incidents increase dramatically

The sharp rise in Microsoft 365 breaches represents a 21% increase year-over-year, suggesting that cybercriminals are becoming more sophisticated in their approach to the platform that serves hundreds of millions of users worldwide. This trend is particularly concerning given Microsoft's dominant position in healthcare IT infrastructure.

Even some premium email security solutions aren't preventing breaches, the report notes, citing incidents involving Mimecast (8%), Proofpoint (6%), and Barracuda (5%) customers. "The inclusion of these platforms suggests that setup, maintenance, and enforcement are more important than the brand name you buy."

Call for fundamental change

Traditional approaches to email security are failing. With 79% of breached organizations having ineffective DMARC protection—up dramatically from 65% in 2024—it's clear that many healthcare organizations are still not implementing basic email authentication measures.

"You don't need to choose between security and usability," Kuwahara emphasized. "A thorough risk analysis and proactive security updates cost a lot less than a breach."

The data shows that 41% of healthcare organizations are now classified as high-risk, compared to just 31% last year—a troubling trend that suggests the problem is getting worse, not better.

As healthcare organizations grapple with these mounting challenges, the report stresses that email security can no longer be treated as a checkbox exercise. With cyberattacks now cited as the leading cause of critical workflow disruptions by 50% of organizations, the cost of inaction has never been clearer.

Human factor remains the biggest gap

The report reveals that 81% of healthcare email breaches were classified as hacking or IT incidents, with credential compromise and phishing attacks dominating the threat landscape. Alarmingly, IT leaders estimate that only 5% of known phishing attacks are actually reported by employees to security teams.

Staff frustration with security protocols is creating dangerous workarounds. A recent survey found that 41% of healthcare providers admitted their teams had bypassed secure messaging at least once in the past year, prioritizing productivity over security—a decision that can have catastrophic consequences.

The financial stakes have never been higher. According to IBM's 2025 Cost of a Data Breach Report, healthcare breaches now cost an average of $11 million per incident, making it the most expensive industry for data breaches for the 14th consecutive year.

Third-party vendors create invisible risk

Business associates—including billing vendors, imaging firms, and outsourced IT providers—were involved in 17 of the 107 email-related breaches, representing 16% of all incidents. These third-party relationships often create blind spots that organizations don't discover until it's too late.

The Episource breach, which affected 5.4 million individuals after the company was acquired by Optum (a UnitedHealth Group subsidiary), exemplifies how deeply embedded business associates can be. Many healthcare providers may not have even realized their patient data was connected to Episource through the broader UnitedHealth network, illustrating how invisible these third-party relationships can remain until a breach occurs.

Download the complete report at https://hubs.la/Q03GBH5R0

Healthcare IT leaders are confident in their systems, until a breach happens. What we're seeing is a perfect storm of limited resources, expanding attack surfaces, and security strategies that rely too heavily on human vigilance.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.