Back to Intelligence

Health IT Adoption Failures: The Shadow IT Security Risk in Healthcare Operations

SA
Security Arsenal Team
April 23, 2026
6 min read

Introduction

Recent commentary from Steven Travers, Vice President and CIO at Broward Health, highlights a critical disconnect in healthcare cybersecurity: the gap between technology deployment and actual user adoption. As noted in Healthcare IT News, even the most robust electronic health records (EHR) systems are useless if clinical and operations staff refuse to use them.

For security practitioners, this is not merely an operational inefficiency; it is a severe defensive failure. When authorized security controls are bypassed due to poor usability or lack of training, clinicians inevitably create "shadow IT" workarounds. These unauthorized channels—often personal messaging apps, unencrypted email, or portable storage—bypass Data Loss Prevention (DLP) controls, audit logging, and access governance, rendering the organization's security investment moot.

Technical Analysis

While this issue is operational, it manifests as a technical vulnerability in the organization's attack surface. We can analyze this as a "Usability Exploit" against security controls.

Affected Platforms & Components

  • Electronic Health Records (EHR): Core systems where user friction drives non-compliance.
  • Clinical Communication & Collaboration (CC&C): Secure messaging platforms that are often ignored in favor of consumer-grade apps (e.g., iMessage, WhatsApp).
  • Authentication Mechanisms: Complex MFA or password policies that lead to credential sharing or sticky-note breaches when usability is ignored.

The "Shadow IT" Attack Chain

  1. Initial Vector: High friction in authorized clinical tools (e.g., slow UI, complex login) leads to "Adoption Failure."
  2. Bypass: Clinical staff utilize unauthorized, high-productivity tools (personal devices, unapproved web chat) to transmit Patient Health Information (PHI).
  3. Exfiltration/Loss: Data moves outside the monitored perimeter (hospital network to public cloud/telecom).
  4. Impact: Complete loss of custody chain, lack of forensic artifacts (logs), and potential HIPAA violations.

Severity Assessment

  • Risk Level: High. This bypasses perimeter defenses entirely.
  • Compliance Impact: Direct violation of HIPAA Security Rule (§164.312(a)(1) - Access Control) and NIST CSF Function "Protect" (PR.AT - Awareness and Training).

Executive Takeaways

Since this news item focuses on operational culture rather than a specific CVE, standard detection rules (Sigma/KQL) for malware are not applicable. Instead, defenders must focus on detecting the behaviors associated with low adoption and shadow IT.

Organizational Recommendations for CISOs

  1. Integrate Security into Clinical Workflow Audits: Do not measure adoption merely by login counts. Correlate EHR usage logs with network egress logs. If EHR activity drops but internet traffic rises, you have a workflow bypass occurring.
  2. Implement "Friction Feedback" Loops: Establish a formal channel for clinicians to report security controls that hinder patient care. If a security measure is ignored, it is not a control; it is negligence. Treat ignored controls as broken configuration.
  3. Shadow IT Discovery Hunts: Use Network Traffic Analysis (NTA) to identify unauthorized communication protocols used during peak clinical hours. Look for TLS traffic to known consumer messaging domains originating from workstations on the clinical floor.
  4. User-Centric Security Training: Move beyond compliance phishing tests. Train staff on why using personal devices for PHI creates legal liability for them personally, not just the hospital.

Detection Logic (Shadow IT / Unapproved Communications)

To defend against the risks of low adoption, we must hunt for the indicators of workaround usage. Below are detection mechanisms to identify when staff may be bypassing authorized clinical systems.

SIGMA Rules

YAML
---
title: Potential Clinical Workflow Bypass - Consumer Messaging Apps
id: 88c9d4a1-5a6b-4c7d-9e0f-1a2b3c4d5e6f
status: experimental
description: Detects network connections to known consumer messaging domains often used as EHR workarounds, excluding authorized mobile device management traffic.
references:
  - https://attack.mitre.org/techniques/T1213/
author: Security Arsenal
date: 2024/05/23
tags:
  - attack.exfiltration
  - attack.t1567.002
logsource:
  category: network_connection
  product: windows
detection:
  selection:
    DestinationHostname|contains:
      - 'web.whatsapp.com'
      - 'messenger.com'
      - 'telegram.org'
      - 'discord.com'
  filter:
    InitiatingProcess|contains:
      - 'chrome.exe'
      - 'firefox.exe'
      - 'msedge.exe'
  condition: selection and filter
falsepositives:
  - Authorized personal use on breaks (tune for time of day/repeat offenders)
level: medium
---
title: High Volume Clipboard Activity - Potential Data Exfiltration
id: 99e0e5b2-6b7c-5d8e-0f1a-2b3c4d5e6f7a
status: experimental
description: Detects processes with high-frequency clipboard access which may indicate manual copying of data from secure EHR to unapproved apps.
references:
  - https://attack.mitre.org/techniques/T1115/
author: Security Arsenal
date: 2024/05/23
tags:
  - attack.collection
  - attack.t1115
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith:
      - '\notepad.exe'
      - '\wordpad.exe'
      - '\chrome.exe'
      - '\msedge.exe'
  timeframe: 1m
  condition: selection | count() > 10
falsepositives:
  - Administrative tasks
  - Legitimate document editing
level: low


**KQL (Microsoft Sentinel)**
KQL — Microsoft Sentinel / Defender
// Hunt for unauthorized web app usage during clinical shifts (07:00 - 19:00)
let TimeRange = 1h;
let ConsumerDomains = dynamic(["web.whatsapp.com", "messenger.com", "telegram.org", "discord.com", "gmail.com"]);
DeviceNetworkEvents
| where Timestamp > ago(TimeRange)
| where Timestamp between(datetime(2024-01-01T07:00:00)..datetime(2024-01-01T19:00:00)) // Adjust to dynamic shift times
| where RemoteUrl has_any (ConsumerDomains)
| where ActionType in ("ConnectionSuccess", "ConnectionAllowed")
| summarize Count = count() by DeviceName, InitiatingProcessAccountName, RemoteUrl
| where Count > 5 // Threshold for casual vs. workflow usage
| project DeviceName, UserAccount = InitiatingProcessAccountName, RiskDomain = RemoteUrl, ConnectionCount = Count
| extend Recommendation = "Investigate potential EHR workaround usage."


**Velociraptor VQL**
VQL — Velociraptor
-- Hunt for clipboard monitoring artifacts or large text dumps indicating manual data migration
SELECT FullPath, Mtime, Size
FROM glob(globs="\\Users\\*\\AppData\\Local\\Temp\\*.txt")
WHERE Mtime > now() - 2h
  AND Size < 102400 // Files smaller than 100KB
  AND FullPath =~ "Clipboard"
ORDER BY Mtime DESC

Remediation

Remediating the risk of low adoption requires a shift from technical enforcement to cultural integration. No patch can fix a user who refuses to log in.

  1. Conduct Usability Audits: Before purchasing or deploying new security tech (e.g., 2FA tokens, secure chat), involve a "Clinical Security Council" of doctors and nurses to test the friction. If they reject it, the project fails.
  2. Streamline Authentication: Implement passwordless authentication (FIDO2) or Single Sign-On (SSO) to reduce the login burden. Reducing the cognitive load of logging in is the single most effective patch for "adoption vulnerabilities."
  3. Network Segmentation for Guest/Clinical Divides: If clinical staff must use personal devices, ensure they are on a strictly isolated Guest VLAN that cannot access internal PHI servers, forcing them to use authorized terminals for sensitive work.
  4. Policy Enforcement with Empathy: Automated DLP blocking should trigger a "Help" popup, not a generic "Access Denied" error. The popup should offer a one-click "Call IT" or "Open Ticket" to resolve the workflow block immediately.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcare-cybersecurityhipaa-compliancehealthcare-ransomwareehr-securitymedical-data-breachhealth-itshadow-ituser-adoption

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.

Health IT Adoption Failures: The Shadow IT Security Risk in Healthcare Operations | Security Arsenal | Security Arsenal