From The Pitt to Mississippi: Why Ransomware Is Testing the Digital Foundation of Healthcare

An episode of HBO’s The Pitt shows a hospital going offline to avoid a cyber-attack, creating a narrative designed to heighten tension. Simultaneously in reality, the University of Mississippi Medical Center shut down systems statewide following a ransomware attack. Once again, fiction becomes a headline.
In both scenarios, clinicians revert to manual processes; electronic boards disappeared, digital workflows stalled, and AI tools became inaccessible. Patient care continues, but under strain.
The lesson is not that healthcare should slow innovation. The lesson is that digital transformation without identity visibility creates systemic fragility.
Healthcare’s Expanding Identity Surface: Human and Non-Human Identities Across Hospitals
Today’s hospital environment includes a complex mix of human and non-human identities, spanning human clinicians and staff, contractors and rotating residents, and telehealth providers, alongside a growing ecosystem of technology such as EHR platforms, AI documentation tools, diagnostic systems, medical devices, APIs and integration layers, and cloud analytics engines.
Each element introduces identities. Not just usernames and passwords, but service accounts, machine credentials, tokens, and automation workflows. In many hospitals, these identities are siloed across directories, cloud environments, legacy systems, and SaaS platforms. Attackers do not see silos. They see pathways.
Ransomware as an Exposure Multiplier: How Identity Weaknesses Are Exploited
Ransomware actors exploit a range of identity and access weaknesses, including over-privileged service accounts, unmonitored non-human identities, dormant accounts, opportunities for lateral movement, and weak segmentation across environments.
In highly connected hospital environments, a single compromised identity can cascade across systems. When UMMC shut down its network, it was acting to contain risk. But containment after compromise is expensive, disruptive, and operationally painful. The more sustainable strategy is preemptive visibility. AI adds capability, but it also adds identity complexity.
Beneath this complexity lies a quieter risk: Every AI integration expands the identity attack surface.
AI tools require broad data access, deep system integration, elevated permissions, and persistent connectivity to function effectively. Without unified observability across those identities, hospitals may lack visibility into which systems are interconnected, which machine accounts hold privileged access, where excessive permissions exist, and how far a compromise could spread.
Identity as the Foundation of Clinical Resilience
Resilience in healthcare is not simply about backups or downtime procedures. It requires unified visibility across all human and non-human identities, continuous monitoring of access risk, a contextual understanding of identity relationships, and proactive remediation of toxic combinations and privilege sprawl. Hospitals cannot treat identity as an IAM checkbox; it is operational infrastructure.
When ransomware hits, it is not just a cybersecurity event. It is a patient safety event.
The Real Question for Healthcare Leaders
The question is not whether to deploy AI, it is whether you understand the identity ecosystem that supports it.
Healthcare leaders should be asking:
- Do we have a single, accurate view of all identities across our environment?
- Can we map which machine accounts are connected to critical systems?
- Do we know our identity blast radius?
- Can we isolate compromise without shutting down the entire network?
Innovation without identity intelligence is risk accumulation. The Pitt ends with a simple truth: when technology fails, human judgment remains. In cybersecurity, when visibility fails, uncertainty remains. Hospitals will continue to innovate, but as ransomware increasingly targets healthcare, resilience will depend less on the newest tool and more on the strength of the identity foundation beneath it.
When the screen goes dark, architecture determines the outcome.
To learn how your healthcare organization can achieve identity clarity for patient safety, Zero Trust and operational resilience, head to healthcareidentity.com.

