What Recent Medical Device Breaches Reveal About Security Gaps in the Cloud

Cybersecurity incidents are often framed as enterprise problems: contained within corporate systems, isolated to IT teams, and addressed through technical remediation. In reality, their impact is far broader.
When a medical device manufacturer is breached, the consequences extend beyond internal disruption. Orders are delayed. Supply chains are affected. Patient care timelines can shift. Sensitive health data may be exposed. What begins as a security incident at the organizational level ultimately reaches hospitals, providers, and patients.
Recent breaches across the medical device manufacturing sector reinforce this point. While the organizations differ in size and scope, the underlying theme is consistent: attackers are finding ways in through gaps that are often operational, not purely technical.
Three Incidents, One Pattern
In recent months, multiple medical device manufacturers reported cybersecurity incidents that disrupted operations and raised concerns around data exposure.
TriMed, an orthopedic implant manufacturer, disclosed a data breach tied to suspicious activity detected within its systems. An internal investigation confirmed that certain files were accessed without authorization over a period in September 2025. While many of the affected files were operational (such as order forms and invoices) some contained sensitive data, including names, dates of birth, and medical record numbers. The breach highlights how even routine business data can carry regulatory and privacy risk when exposed.
At UFP Technologies, the impact was more immediate and operational. A ransomware attack detected in February affected a significant portion of the company’s IT network, disrupting billing systems and label-making capabilities for shipments. While contingency plans and backups allowed operations to continue, the incident led to delays and raised the possibility of data being stolen or destroyed. Even without long-term financial impact, the short-term disruption to delivery workflows is a reminder of how tightly coupled cybersecurity and operational continuity have become.
The third incident, involving Stryker, illustrates a different but equally important dimension. Threat actors used a malicious file to execute commands while masking their activity within the environment. From there, they gained access to the company’s Microsoft Intune management console—an entry point into identity and device management infrastructure. While the incident was contained and no evidence of downstream impact on customers or partners was found, the method is significant. This was not a broad ransomware event, but a targeted intrusion leveraging identity infrastructure.
Across all three cases, the entry points and techniques vary. But the pattern is clear: attackers are not relying on a single vector. They are exploiting wherever controls are weakest—whether in endpoint activity, IT systems, or identity and access layers.
The Expanding Role of Cloud and SaaS
While not every incident is purely cloud-driven, it is increasingly difficult to separate modern breaches from cloud and SaaS environments.
Applications like Microsoft Intune, CRM platforms, collaboration tools, and cloud-based ERP systems are now deeply embedded in operational workflows. They manage identities, control access, and store critical data. As a result, they are becoming high-value targets.
The Stryker incident is a clear example. Gaining access to an identity management platform is not just about a single system. It creates the potential to move laterally, escalate privileges, and maintain persistence. Similarly, in ransomware scenarios like UFP Technologies, SaaS applications often remain connected to affected systems, creating additional exposure pathways.
Even in cases like TriMed, where the breach appears to be contained within internal systems, the data involved often originates from or flows into SaaS platforms—whether for customer management, order processing, or analytics.
The implication is straightforward: cloud and SaaS environments are no longer peripheral to security strategy. They are central to it.
Where Security Often Falls Short
Despite increased investment in cybersecurity, these incidents point to a persistent challenge. Security controls are often implemented, but not continuously validated.
Organizations may deploy endpoint protection, identity controls, and network monitoring. They may follow best practices at a point in time. But environments evolve. Configurations change. Integrations are added. Access permissions expand.
Over time, this creates gaps.
In cloud and SaaS environments, these gaps are particularly difficult to detect. Access is governed through layers of configurations: roles, permissions, APIs, and integrations. A single misconfiguration or over-permissioned account can introduce unintended exposure. This is not always visible through traditional security tools.
For example:
- An identity platform may have excessive administrative privileges assigned to certain accounts
- A SaaS application may expose data through APIs that are no longer actively monitored
- Integrations between systems may retain access long after they are needed
These are not vulnerabilities in the traditional sense. They are configuration risks, and they are increasingly where attackers are focusing their efforts.
From Incidents to Insight
What these medical device breaches illustrate is not just the diversity of attack methods, but the consistency of underlying weaknesses. Security is no longer just about preventing unauthorized access. It is about ensuring that authorized access is correctly defined, continuously monitored, and tightly controlled. This requires a shift in approach.
Periodic audits and reactive investigations are no longer sufficient. By the time an issue is detected, the exposure may already have occurred. What is needed is continuous visibility into how systems are configured and accessed.
Strengthening Cloud and SaaS Security with Continuous Oversight
This is where Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) play a critical role.
These solutions focus on identifying and managing configuration risks across environments. They provide ongoing insight into access controls, permissions, and integrations—areas that are often overlooked but highly impactful.
In the context of incidents like those seen at TriMed, UFP Technologies, and Stryker, they enable organizations to:
- Detect over-permissioned accounts and access paths
- Identify misconfigurations that could expose sensitive data
- Monitor changes in configuration over time
- Ensure that integrations and APIs are aligned with security policies
CheckRed brings this capability into focus by helping organizations continuously assess and improve their security posture. Rather than relying on point-in-time reviews, it enables ongoing validation of configurations, reducing the likelihood that gaps go unnoticed.
As the medical device industry—and others—continue to digitize operations, the attack surface will only expand. The question is no longer whether systems are secured at a moment in time, but whether they remain secure as they evolve.
The recent breaches are a reminder that security gaps do not stay contained. They extend outward into operations, supply chains, and ultimately, real-world impact. Closing those gaps requires visibility, consistency, and continuous control, especially across the cloud and SaaS environments that now sit at the center of modern enterprise infrastructure.


