
On March 11, 2026, Stryker Corporation identified a cybersecurity incident that caused a global disruption to its Microsoft environment.
According to the company’s official disclosure and filings with the U.S. Securities and Exchange Commission, the breach was detected and triggered Stryker’s cybersecurity response plan. The company launched an internal investigation with the support of external cybersecurity experts and advisors.
At this stage, Stryker reports that there is no indication of ransomware or malware and believes the incident has been contained within its internal Microsoft environment.
The attack has led to ongoing disruptions and limited access to certain information systems and business applications, impacting aspects of order processing, manufacturing and shipping. However, Stryker’s patient-related services and connected products, such as LIFEPAK devices and the Mako System, remain unaffected and are safe to use.
The company has not yet determined the full scope, nature or operational and financial impacts of the incident. Stryker is still investigating whether any personally identifiable information (PII), protected health information (PHI) or other sensitive data was exposed or compromised.
In response to the breach, Stryker activated its incident response and business continuity plans to support customers and partners. The company is working diligently to restore affected systems and is providing regular updates through its newsroom and direct communications.
Stryker has emphasized that its connected products, including LIFEPAK and Mako devices, are secure and continue to function normally. The company has also implemented additional security measures for its systems and is monitoring for any suspicious activity.
For those affected, Stryker recommends maintaining normal communication with company representatives via email and phone, as these channels remain secure.
Customers are encouraged to reach out with any concerns or questions, especially if they experience issues with electronic ordering or device connectivity.
If individuals suspect their information may have been impacted or encounter suspicious activity, they should contact Stryker directly or use the company’s ethics hotline.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)