What to do After a Healthcare Data Breach - Wiss

What to do After a Healthcare Data Breach

February 23, 2026


read-banner

190 million records. That’s not a typo.

The Change Healthcare data breach didn’t just break records—it shattered them. When ransomware actors infiltrated Change Healthcare’s systems in February 2024, they accessed protected health information belonging to more than half the U.S. population. For healthcare CIOs, the question isn’t whether your organization could be next. It’s what you’re doing right now to make sure it isn’t.

Here’s what the data shows: healthcare organizations reported 742 breaches involving 500+ records in 2024, affecting 276 million individuals. That’s 758,288 records compromised every single day. And 79.7% of those breaches? Hacking incidents.

Key Takeaways

  • Change Healthcare breach affected 190M individuals: Largest healthcare data breach in history, exposing systemic vulnerabilities in healthcare IT infrastructure
  • Hacking accounts for 79.7% of all healthcare breaches: Ransomware and cyber attacks are now the dominant threat, not lost laptops or improper disposal
  • Business associate breaches exposed 93M records in 2023: Third-party vendor risk is now greater than internal security failures
  • Bottom Line: Healthcare CIOs must shift from reactive breach response to proactive vendor risk management and real-time threat detection.

What Made Change Healthcare Different

Change Healthcare wasn’t just big—it was systemic. As a critical infrastructure provider that processes prescription claims, medical billing, and payments for thousands of healthcare organizations, the breach cascaded across the entire industry.

The attackers used ransomware, but the damage went beyond encrypted files. They exfiltrated data. Protected health information, payment details, and clinical records—all accessible to threat actors who then demanded ransom payments to prevent public disclosure.

The business impact was immediate: Pharmacies couldn’t process prescriptions. Providers couldn’t submit claims. Revenue cycles froze. Some organizations reported losses exceeding $100 million in delayed reimbursements.

For CIOs, the lesson is brutal: Your vendors’ security failures become your operational crisis.

Why Healthcare Remains the Primary Target

Healthcare data is worth more on the black market than credit card numbers. A stolen medical record sells for $250. A credit card? $5.

The math makes sense for attackers. Healthcare fraud takes months to detect. Stolen credentials stay valid longer. And healthcare organizations—already operating on thin margins—often pay ransoms faster than other industries because downtime directly impacts patient care.

The statistics confirm it. Between 2009 and 2024, 6,759 healthcare breaches of 500+ records were reported to OCR. Those breaches exposed 846 million records—2.6 times the U.S. population.

But here’s what changed: In 2019, hacking accounted for 49% of breaches. By 2023, that jumped to 79.7%. The threat isn’t lost laptops anymore. It’s organized criminal enterprises running sophisticated operations.

Where Most Healthcare Organizations Fail

The Office for Civil Rights doesn’t publish data on every security gap, but their enforcement patterns reveal where organizations consistently fail:

HIPAA risk analysis failures top the list. OCR launched a dedicated enforcement initiative in 2024 targeting organizations that skip or phone in their security risk assessments. The logic is simple: If you don’t identify risks, you can’t mitigate them.

Business associate oversight comes next. In 2023, business associate breaches exposed 93 million records compared to 34.9 million at healthcare providers. Yet many organizations still rely on “good faith assurances” instead of actually auditing vendor security controls.

Lack of encryption remains inexplicable. Encrypted data doesn’t count as a breach under HIPAA. Yet organizations continue transmitting unencrypted PHI, turning minor incidents into reportable disasters.

Incident response gaps turn containable events into catastrophic breaches. The median time to detect a breach in healthcare is 236 days. Attackers are in your systems for eight months before you notice.

What Actually Works: Three Non-Negotiable Controls

Healthcare CIOs dealing with legacy systems, interoperability requirements, and budget constraints don’t need theoretical frameworks. They need controls that actually reduce breach risk.

  • Multi-factor authentication on all privileged accounts

Credential theft drives most successful attacks. MFA blocks 99% of automated credential stuffing attempts. There’s no excuse for administrator accounts with password-only access.

  • Real-time monitoring with automated threat detection

Manual log review doesn’t scale. Security information and event management (SIEM) platforms flag anomalous access patterns, unusual data exfiltration, and lateral movement before attackers establish persistence.

  • Vendor security assessments that go beyond questionnaires

Third-party risk is now your primary exposure. Annual attestations don’t cut it. You need continuous monitoring, regular penetration testing results, and breach notification SLAs in every vendor contract.

The Regulatory Response You Need to Prepare For

OCR imposed 22 financial penalties in 2024, continuing an enforcement trend that shows no signs of slowing. The agency is explicitly focused on organizations that fail basic security controls—especially risk analysis and business associate management.

State attorneys general are also getting aggressive. New York, California, and multistate coalitions imposed $62 million in penalties in 2024 alone for breaches involving inadequate security measures.

Here’s what triggers enforcement attention:

  • Breaches affecting 10,000+ individuals automatically trigger investigations
  • Failure to conduct regular risk assessments
  • No encryption on mobile devices or transmitted PHI
  • Inadequate business associate agreements or vendor oversight
  • Delayed breach notifications beyond the 60-day requirement

The penalties aren’t trivial. OCR settlements in 2024 ranged from $5,000 to $4.75 million, with the average hovering around $450,000. For organizations already operating on 2-3% margins, these fines are existential threats.

What to Do Monday Morning

Healthcare CIOs reading breach statistics often feel paralyzed by the scale of the problem. Start here:

Audit your current business associate agreements

Identify vendors with access to PHI who haven’t undergone security assessments in the past 12 months. Prioritize those handling the highest volume of records or most sensitive data.

Run a tabletop exercise simulating a ransomware attack

Test whether your incident response plan actually works when clinical systems go offline. Identify gaps in communication protocols, backup restoration procedures, and breach notification timelines.

Review your encryption status

Any PHI transmitted electronically should be encrypted. Any portable devices containing PHI should use full-disk encryption. This single control eliminates most reportable breach scenarios.

Implement privileged access management

Administrator credentials are the keys to your kingdom. If you can’t answer “who has admin access and what are they doing with it,” you have a critical gap.

The Cost of Waiting

The average cost of a healthcare data breach reached $10.93 million in 2024—the highest of any industry. That includes incident response, regulatory fines, legal costs, and business disruption.

But the real cost is harder to quantify. Patient trust erosion. Staff burnout managing crisis response. Board-level scrutiny of IT leadership. Competitive disadvantage when breach disclosures hit the news.

Change Healthcare demonstrated that vendor breaches create systemic risk across entire ecosystems. Your organization’s security is only as strong as your weakest third-party connection.

Shore Up Healthcare Data

If the Change Healthcare breach taught healthcare CIOs anything, it’s that reactive security doesn’t work in an environment where attackers operate 24/7 with industrial-scale resources.

Wiss Technology Solutions helps healthcare organizations implement proactive cybersecurity frameworks. Our team conducts vendor risk assessments, security gap analysis, and incident response planning designed specifically for healthcare’s unique constraints.

Contact Wiss today to schedule a cybersecurity assessment and identify your highest-risk exposures before they become your next breach notification.


Questions?

Reach out to a Wiss team member for more information or assistance.

Contact Us

Share

    LinkedInFacebookTwitter