There is a moment that healthcare IT leaders and clinical informatics teams dread above almost any other: the moment when an electronic health record system goes offline during an active cyber incident.
It is not an abstract risk. In 2025, the FBI confirmed that healthcare was the top target for ransomware and cyber attacks across all industries 447 documented events in the sector in a single year. The attacks targeting hospital systems are not random. They are deliberately targeted at the most time-sensitive, most critical-care-dependent environments precisely because the pressure to restore systems quickly creates the conditions under which ransom payments become the path of least resistance.
When an EHR system goes down, clinicians cannot access patient medication histories. Emergency departments cannot pull prior imaging. Care teams cannot see allergy records, active diagnoses, or treatment protocols for patients who cannot provide that information themselves. The cyber incident stops being an IT problem and becomes a patient safety problem within hours and in some documented cases, within minutes.
As healthcare organizations strengthen cyber resilience strategies for hybrid clinical environments, operational preparedness is becoming just as critical as infrastructure protection itself. The latest Supply Chain AI Readiness Report explores how operational discipline, data visibility, and resilient workflows are shaping enterprise readiness for AI-driven environments across critical industries. Download the Supply Chain AI Readiness Report to understand how organizations are preparing operational systems for the next phase of enterprise AI adoption.
Rubrik and MEDITECH just announced a strategic collaboration that addresses this specific vulnerability with the specificity the problem requires. Rubrik Security Cloud is now certified for integration with MEDITECH Expanse the EHR platform used by hundreds of healthcare organizations across the country delivering native cyber resilience for both self-hosted cloud and on-premises deployments without requiring healthcare organizations to choose between infrastructure flexibility and data protection capability.
Healthcare Recovery Complexity Has Grown Beyond What Legacy Approaches Can Handle
The infrastructure environment that most healthcare organizations are managing today is the product of a decade of incremental decisions that made sense individually and created a recovery problem collectively.
Large health systems have pursued cloud migration on different timelines across different functions. Clinical applications have moved at different speeds than administrative systems. Acquired hospitals and physician practices have brought their own infrastructure assumptions, their own EHR configurations, and their own backup and recovery architectures into the parent organization’s environment. The result is a hybrid infrastructure landscape some systems in cloud, some on-premises, some in transition that is both a clinical necessity and a recovery complexity multiplier.
When a ransomware attack hits a health system with this kind of hybrid infrastructure, the recovery challenge is not simply restoring individual systems. It is coordinating recovery across environments that were not designed to be recovered together, through tools that were not built for the specific characteristics of healthcare data, under clinical pressure that does not accommodate the weeks-long recovery timelines that inadequate cyber resilience produces.
Josh Howell, Rubrik’s Healthcare Chief Technology Officer, put the timeline stakes directly: the goal has always been recovering critical applications from a cyber event within days instead of weeks. That distinction days versus weeks is not a performance specification. It is a patient care specification. A hospital that cannot access its EHR for three weeks is not a functioning hospital in any meaningful clinical sense. A hospital that recovers its critical systems within days can maintain continuity of care through an incident that would have been operationally catastrophic under legacy recovery approaches.
The installed base of on-premises MEDITECH systems that this collaboration specifically addresses represents a significant portion of the healthcare provider market that has not yet migrated fully to cloud infrastructure and may not migrate fully for years, given the clinical validation, regulatory approval, and change management requirements that EHR transitions involve. These organizations are not behind on cloud adoption because they lack sophistication. They are managing the legitimate complexity of healthcare infrastructure in environments where clinical continuity requirements constrain the pace of technology change.
Rubrik’s collaboration with MEDITECH brings cyber resilience to those organizations in their current infrastructure state rather than requiring them to complete a cloud migration before accessing adequate data protection capability.
Unified Resilience Architecture Closes the Fragmentation Gap
The technical architecture of the Rubrik Security Cloud integration with MEDITECH Expanse reflects a deliberate response to the infrastructure fragmentation problem that makes healthcare recovery so difficult.
The integration is managed through a unified Rubrik Security Cloud control plane a single management layer that enforces consistent policy, monitors threats, and coordinates recovery across the complete MEDITECH estate regardless of whether individual components are running in self-hosted cloud or on-premises environments. That architectural unity addresses the specific failure mode that fragmented resilience creates: different backup and recovery tools managing different parts of the infrastructure on different schedules, with different recovery point objectives, and without the coordinated visibility needed to execute a coherent recovery response when an incident spans multiple systems simultaneously.
Healthcare organizations running MEDITECH Expanse through the Rubrik integration get four specific capabilities that together constitute a complete resilience architecture rather than a collection of point solutions.
Immutable protection ensures that patient data cannot be encrypted, deleted, or altered even when an adversary has obtained elevated access to the environment. The immutability guarantee matters specifically for the ransomware threat model because ransomware attacks typically begin by compromising backup systems and deleting or encrypting recovery points before deploying the encryption payload against production data. If the backup is gone, the hospital has no choice but to pay. Immutable backups that adversaries cannot reach or alter eliminate that leverage.
Native threat detection provides continuous monitoring and investigation capability that identifies threats in the data environment and locates the last known clean copy of data before recovery begins. The last-known-clean-copy identification is a critical capability that distinguishes genuine cyber recovery from data restoration. Restoring from a backup that contains dormant malware or compromised data states does not resolve the incident it restores the compromised environment and begins the attack cycle again. Finding the genuinely clean recovery point before restoring is what makes recovery durable rather than temporary.
Data recovery with containment goes beyond simple restoration to include threat containment quarantining malware and restricting user access during the recovery process to prevent reinfection or lateral movement during the recovery window. Recovery windows are periods of elevated vulnerability. Systems that are being brought back online are in transitional states where security controls are not fully active. Containment capabilities that address that vulnerability during the recovery process itself are a meaningful improvement over recovery approaches that restore systems and then attempt to re-secure them separately.
Data archival through cloud storage provides the long-term retention layer that healthcare compliance requirements mandate ensuring that the data protection infrastructure serves both the immediate cyber resilience requirement and the regulatory retention obligations that healthcare organizations carry across patient records, clinical documentation, and administrative data.
The consistency that this unified architecture delivers across hybrid environments is what Meredith-equivalent framing applies in this context: what the collaboration responds to is customer interest in technical capabilities and established presence in the data security space. That is not a generic endorsement. It is the specific observation that healthcare organizations evaluating cyber resilience have been looking for a solution that works coherently across their actual infrastructure rather than optimally in one environment and inadequately in others.
Cyber Recovery Is Now a Patient-Continuity Governance Issue
The third structural shift that this collaboration reflects is one that hospital boards, health system executives, and healthcare regulators are all arriving at simultaneously from different directions: cyber recovery capability is no longer an IT infrastructure question. It is a patient care governance question.
The regulatory environment is moving to formalize that framing explicitly. The HHS Health Sector Cybersecurity Coordination Center has issued guidance connecting cyber incident response capability directly to patient safety obligations. State health department regulations in multiple jurisdictions have begun incorporating cyber resilience requirements into healthcare facility licensing frameworks. The Joint Commission’s standards increasingly reflect the expectation that healthcare organizations can demonstrate credible incident response and recovery capability rather than simply documenting that policies exist.
The financial dimension reinforces the governance imperative. The average cost of a healthcare data breach reached $9.77 million in 2024 the highest of any industry for the fourteenth consecutive year, according to IBM’s Cost of a Data Breach Report. That figure reflects direct recovery costs, regulatory penalties, litigation exposure, and the revenue impact of downtime but it does not capture the full liability exposure that inadequate cyber recovery capability creates when patient harm is traceable to delayed clinical access during a cyber incident.
Health system boards and audit committees that are asking whether their organization’s cyber resilience posture is adequate are asking a question with direct liability implications that extend beyond IT budget conversations. The certification of Rubrik Security Cloud for MEDITECH Expanse gives healthcare executives a specific, validated answer to that question a named integration from a recognized data security provider that has been formally certified by the EHR vendor whose platform their clinical operations depend on.
Sean Benton, MEDITECH’s Director of Computer Scientists, framed the certification directly: it gives customers more choice and flexibility when securing critical data, and it responds directly to customer interest in Rubrik’s technical capabilities. That customer interest is not abstract. It reflects the specific experience of healthcare IT leaders who have watched peer organizations struggle through ransomware recovery on inadequate resilience infrastructure and have decided they need a better answer before they face the same scenario.
What the Healthcare Provider Market Actually Needs From This
The population of healthcare organizations that benefits most immediately from this collaboration spans a wider range than the enterprise health system framing might suggest.
Large academic medical centers and integrated delivery networks have the IT resources to evaluate and implement sophisticated cyber resilience architectures and the Rubrik Security Cloud integration gives those organizations a validated path to consistent protection across their hybrid MEDITECH environments without requiring custom integration work.
Community hospitals and regional health systems which represent a substantial portion of the MEDITECH Expanse installed base often have smaller IT teams managing the same hybrid infrastructure complexity with fewer specialist resources available for security and recovery architecture. Native integration that delivers enterprise-grade resilience without requiring extensive implementation expertise to configure and maintain is a meaningful capability advancement for organizations that cannot staff a dedicated cyber resilience function.
Critical access hospitals and rural health facilities face the most acute version of the problem. These organizations are frequently targeted precisely because their security and recovery infrastructure is known to be less mature than larger health systems making them easier targets and faster payers under ransom pressure. A Rubrik Security Cloud integration available through their MEDITECH relationship, without the implementation complexity that has historically made enterprise data security tools inaccessible to smaller healthcare organizations, changes the protection calculus for exactly the organizations that are most frequently victimized.
The cloud adoption acceleration dimension of the collaboration addresses a specific segment of this market: MEDITECH customers that want to move toward cloud infrastructure but have deferred migration because of uncertainty about data protection and recovery capability in cloud environments. Rubrik’s ability to provide the same resilience guarantees in self-hosted cloud as in on-premises environments removes one of the most significant hesitations around cloud migration for healthcare organizations that have been watching the threat environment and wondering whether cloud is a more or less defensible posture for their clinical data.
The Stakes That Make This More Than a Technology Partnership
Step back from the technical specifics and the stakes of what Rubrik and MEDITECH are addressing together become clear in a way that matters beyond the product announcement.
Healthcare is the most targeted industry for ransomware in the United States by a significant margin. The systems being targeted are not generic enterprise applications. They are the clinical information systems that clinicians depend on to make treatment decisions, prescribe medications, coordinate care across teams, and maintain the continuity of patient management that defines safe healthcare delivery.
The organizations responsible for those systems are operating in a threat environment that has been specifically calibrated to exploit the time pressure and clinical stakes that hospital environments create. Every week that a healthcare organization operates without adequate cyber resilience is a week in which a ransomware attack could force clinicians to operate on paper, from memory, or without access to the patient information that safe care requires.
The Rubrik and MEDITECH collaboration does not eliminate the threat. The adversaries targeting healthcare infrastructure are not going to stop. But it changes the recovery position of the healthcare organizations that implement it from an environment where a successful ransomware attack means weeks of clinical disruption and potential patient harm to one where critical systems can be recovered within days and patient care continuity can be maintained through an incident that would previously have been a prolonged crisis.
That is not a small difference. In healthcare, where the system being recovered is the system that clinicians use to keep patients safe, the difference between days and weeks of recovery time is measured in the quality and safety of care that patients receive during the incident. Making that recovery faster, more reliable, and more consistent across the hybrid infrastructure environments that most healthcare organizations actually operate is the work that this collaboration was built to do.
Research and Intelligence Sources: Rubrik
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading
