HIPAA Pulse by Patient Protect logo

HIPAA Pulse by Patient Protect

Archives
April 15, 2026

HIPAA Pulse | April 15th

HIPAA Pulse — April 15, 2026
20 breaches. 12 million individuals affected. One company drove most of it — and that's the real warning. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌
Patient Protect
HIPAA Pulse

HIPAA PULSE

April 15, 2026  ·  Bi-Weekly Briefing

Breach Shockwaves, Concentrated Risk & What to Fix Before the Next One

One big pattern, a few key signals, and concrete action you can take today.

Welcome to HIPAA Pulse — a briefing from Patient Protect for anyone carrying responsibility for HIPAA compliance or patient-data risk. Independent practices, health systems, MSPs, vendors, and security leaders who know the landscape is shifting.

This issue covers the most recent full reporting period. The headline number is 12 million individuals affected across 20 breaches. But the more important story is how concentrated that damage is — and what it means for practices that aren't OpenLoop Health.

View the live Breach Dashboard →

Stat of the Issue

70%

of all reported healthcare breaches this period were Hacking/IT Incidents. That share hasn't meaningfully shifted in two years. The threat vector is not changing — defenses are just not keeping pace.

Risk Barometer  ·  Most Recent Full Reporting Period

Total Breaches

20

reported this period

Individuals Affected

12M+

12,081,111 total

Top Breach Type

Hacking /
IT Incident

70% of all reported breaches

Largest Single Breach

OpenLoop
Health

disproportionate individual impact

Breach of Note

OpenLoop Health

Telehealth network  ·  Hacking / IT Incident  ·  Millions affected

OpenLoop Health, a telehealth and virtual care network, represents this period's most significant single-entity breach by individual impact. The incident is consistent with the dominant pattern in healthcare right now: a networked organization with broad patient reach becomes a single point of failure across every practice it serves.

The structural risk here is not unique to OpenLoop. Any platform that aggregates patient data across multiple practices — telehealth networks, clearinghouses, shared billing services — creates a concentration point that attackers are explicitly targeting. When the platform is breached, every organization connected to it is exposed.

The question for your practice: which platforms aggregate your patient data, and what is your exposure if one of them is compromised?

Three Signals That Matter Right Now

Hacking/IT Incidents Are Still Dominant — And More Coordinated

This category continues to lead, but the nature is evolving. These are no longer isolated attacks — they are credential-based intrusions, vendor pathway exploits, API and integration abuse, and multi-step access escalations. What looks like a single breach is often a chain of failures across systems.

That number has not meaningfully shifted in two years. Frequency is stable; severity is increasing.

Large-Scale Exposure Is Becoming the Expected Outcome

Events impacting millions of individuals are no longer statistical outliers — they are the expected edge cases for organizations above a certain scale. OpenLoop, QualDerm, Navia, and Change Healthcare each represent concentrated exposure where a single breakdown exposes records at a scale that was once considered catastrophic. Your worst-case scenario is no longer theoretical.

Controls must now be designed around maximum exposure potential — not the average case.

Third-Party Vendors Remain the Hidden Attack Surface

The presence of entities like CareCloud and Stryker in this period's breach data is not incidental. Supply chain vulnerabilities and business associate failures are a structural problem. When a vendor is compromised, every client organization they serve becomes exposed — often without warning and sometimes without a properly executed BAA in place.

These are foundational failures — and they remain unresolved at scale across the industry.

30-Minute System Check — Run This Today

If you do nothing else this week, do this. Each item below is a known attack vector in the breach data above.

1

Audit user access — remove unnecessary privileges immediately. If someone left the practice, their credentials are live until you revoke them.

2

Enforce MFA everywhere — email, EHR, vendor portals, billing systems. No exceptions. Every unguarded authentication point is a credential-based intrusion in waiting.

3

Review vendor access paths — which vendors touch your PHI right now? Is each one covered by a current, signed BAA? Pull the list and verify.

4

Check email forwarding rules — a commonly overlooked silent exfiltration vector. Rules set by a compromised account forward PHI out indefinitely without triggering alerts.

5

Validate your logging visibility — can you actually detect abnormal access behavior in your systems right now, or are you flying blind between reviews?

If any of these require "we think so" as an answer, you have measurable exposure. A current risk assessment will tell you exactly where. Run the free assessment →

What This Points To

HIPAA risk is no longer a checklist problem. It's a live system problem. Data is moving across vendors, messaging platforms, APIs, mobile devices, and external tools — and most organizations cannot see that movement clearly. That's where risk is accumulating.

The breaches this period are not anomalies. They are the predictable output of systems that were documented but not enforced, audited annually but not monitored continuously. The practices that avoided incidents this period weren't lucky — they had visibility.

Worth Reading

  HHS OCR Breach Portal →

The primary public record of reported healthcare breaches. The data in this issue is drawn directly from here. Worth bookmarking.

  HHS HIPAA Security Rule Guidance →

The canonical source for Security Rule implementation guidance. If you haven't reviewed it recently, the section on risk analysis is worth rereading in light of current enforcement trends.

  CISA Healthcare Cybersecurity Resources →

CISA's healthcare-specific threat intelligence and security guidance. Their advisories on healthcare-targeted ransomware are particularly relevant given this period's data.

Closing Note

Compliance isn't the only goal — confidence in security is what we're building toward. HIPAA Pulse is your ongoing source for the context, signals, and clarity that make that confidence possible.

Next issue drops April 29. We'll be watching OCR enforcement activity and the trajectory of vendor-pathway attacks as Q2 breach data comes in.

Patient Protect is a HIPAA compliance platform built for independent practices. If this briefing is useful, the platform is what we built to act on it. Learn more →

Patient Protect

Chicago, IL  ·  patient-protect.com  ·  HIPAA Pulse archive

Instagram LinkedIn X

Breach data reflects publicly reported incidents. Patient Protect monitors news announcements and models breaches before formal HHS documentation.

You're receiving HIPAA Pulse because you subscribed at patient-protect.com. Unsubscribe  ·  Privacy Policy

© 2026 Patient Protect LLC. All rights reserved.

Don't miss what's next. Subscribe to HIPAA Pulse by Patient Protect:
www.instagram.com
Twitter
LinkedIn