Legacy Systems and Cybersecurity: What Rural Hospitals Need to Do
- Rajesh Kanungo
- Sep 9
- 2 min read
In today’s rapidly evolving healthcare landscape, legacy systems in rural healthcare systems are still common. A 2021 Healthcare Information and Management Systems Society (HIMSS) survey reported that 73% of healthcare providers still used legacy systems, mainly due to budgetary constraints.
In this post, we outline the cybersecurity risks associated with legacy systems and devices and provide guidance on how to minimize those risks. Additionally, we include a breach case study to illustrate the risks in action.
Legacy systems include
Unsupported operating systems (e.g., Windows 7, XP)
Medical devices or equipment with no upgrade path
Systems that cannot run modern security tools
Systems that use software with outdated protocols or hard-coded credentials.
Legacy systems introduce cybersecurity risks
Owing to a lack of patches, known vulnerabilities remain open
Weak access control or outdated authentication methods
Incompatibility with modern encryption or security logging
Easier lateral movement of malware if compromised
Can serve as hidden backdoors into otherwise secure networks
Ransomware attacks propagated through old Windows systems
Compliance Risks
Hospitals relying on legacy systems face a heightened risk of falling out of compliance with data protection regulations like HIPAA and PCI.
Minimizing risks from legacy systems and devices
Some of the steps you can take to reduce cybersecurity risks are:
Segment legacy systems on isolated networks
Implement strict access controls and MFA
Use compensating controls like monitoring and intrusion detection
Inventory and classify all legacy assets
Apply virtual patching or external protections
Disable unused services and ports
Plan and budget for phased decommissioning
Restrict internet access for unsupported devices
Enforce logging and centralized monitoring
Harden legacy endpoints
Secure medical devices through vendor collaboration
Back up critical systems and data frequently
Pay special attention to EHR systems
Here are a few ways to help reduce cybersecurity risks from legacy EHR systems:
Isolate legacy EHR components from public or open networks
Ensure data encryption at rest and in transit
Limit database access via least-privilege controls
Apply logging and centralized monitoring around the EHR environment
Enforce timeout and auto-logout settings for all EHR sessions
Use secure middleware for third-party integrations
Conduct regular access reviews and audit trails
Work with the EHR vendor on update or migration planning
Protect EHR access points (e.g., workstations, kiosks)
Example of a rural health system that suffered a data breach
Aspire Rural Health, a Michigan-based healthcare provider, suffered a cyberattack in which the BianLian ransomware group infiltrated its systems between November 4, 2024, and January 6, 2025, compromising the data of nearly 140,000 patients, and posted Aspire’s data onto its dark web leak site.
Exposed information included SSNs, medical records, insurance, biometrics, and credentials. Aspire began notifications in August and is offering 12 months of Experian credit monitoring. Multiple law firms, including Morgan & Morgan, are investigating potential class-action lawsuits.