13% of AI Models Were Breached in 2025 (But in Healthcare, the Crisis Looks a Lot Worse.)

TL;DR: Why Healthcare Data Breaches Still Dominate

Healthcare once again topped the list for the most expensive data breaches in 2025, averaging a staggering $7.42M per incident. That’s 12 straight years at the top, and the reasons haven’t changed: outdated tech stacks, slow breach response, and lack of CISO governance.

If you’re building or scaling a health tech company, especially at the growth stage, the threat is a loss of trust. Deals stall. Reputation erodes. Investors hesitate. Let’s break down what’s happening behind the scenes and what smart health tech leaders can do about it.

AI Breaches Are Rising, But Healthcare Has Its Own Crisis

According to the IBM Cost of a Data Breach Report 2025: The AI Oversight Gap, 13% of AI models were breached, and 97% of those incidents were linked to poor access controls.

These stats apply across all industries but the implications for healthcare are uniquely high-risk.

AI is deeply embedded in health tech stacks from SaaS tools to patient-facing apps.

But here’s the twist: Shadow AI, or unauthorized AI deployment, accounted for 20% of breaches and had the highest average cost of all AI-related incidents.

In healthcare, the challenge is even more foundational:

  • The average breach lifecycle is 279 days; that's 5 weeks longer than the global average

  • This signal SIEM tools are either misconfigured or missing entirely

  • Security ops are underpowered, often without the expertise and executive-level ownership

“While AI breaches are rising across sectors, healthcare's struggle lies in governance, delayed response, and infrastructure misalignment.”

Vendor Access: Healthcare’s Silent Exposure Risk

Vendor related breaches took 267 days to detect and contain, making them the second longest lifecycle by breach type.

And in healthcare, vendors are everywhere from third-party labs to cloud storage providers and EHR integrations.

Most health tech startups rely on trusted vendor tools often without the scrutiny those relationships deserve.

Security by proxy is no longer enough.

→ Request the Health Tech Vendor Security Checklist to evaluate your third-party risks before it jeopardize your trust, data, and customers.

HIPAA Isn’t Enough Anymore (Without Strategic Cybersecurity)

Most vendors treat HIPAA like a checkbox.

But as breach costs rise, regulators and buyers are demanding proof of governance, not just your policies.

Ask yourself:

  • Do you have a CISO or does security sit under IT?

  • Is your AI prompt interactions monitored and risks assessed?

  • Can your organization contain a breach in under 200 days?

If not, HIPAA won’t save you...In fact, they will fine you.

→ Request the Strategic Guide for Health Tech Leaders to uncover security blind spots before your customers or regulators do.

Final Thought

You don’t need more tools.

You need strategy, trust, and visibility.

AI has changed the threat surface for health tech.

But the fundamentals haven’t changed.

Secure your vendors.

Shorten your breach lifecycle...(or avoid them.)

Build compliant products and grow.

FAQs

🟢 Is the $7.42M average breach cost specific to healthcare? Yes. Healthcare had the highest average breach cost in 2025 at $7.42 million, topping all other sectors for the 12th consecutive year.

🟢 What is shadow AI in healthcare? Shadow AI refers to unauthorized or unmanaged AI tools or models deployed without oversight. In 2025, it accounted for 20% of breaches and was the most costly AI-related threat.

🟢 Do HIPAA policies cover AI use in health tech? HIPAA doesn’t directly regulate AI or any other specific technologies, but using AI without the proper security and privacy controls specified violates the HIPAA rules.

🟢 How can I assess my vendor security risk? Use the Vendor Security Checklist to score vendors across 10 risk domains, including PHI handling, incident response, and IAM.

🟢 Who should own security in a growth-stage health tech startup? Ideally, a dedicated CISO or vCISO not engineers or developers. Security leadership is essential to HIPAA compliance and breach readiness.

L Trotter II

As Founder and CEO of Inherent Security, Larry Trotter II is responsible for defining the mission and vision of the company, ensuring execution aligns with the business purpose. Larry has transformed Inherent Security from a consultancy to a cybersecurity company through partnerships and expert acquisitions. Today the company leverages its healthcare and government expertise to accelerate compliance operation for clients.

Larry has provided services for 12 years across the private industry developing security strategies and managing security operations for Fortune 500 companies and healthcare organizations. He is influential business leader who can demonstrate the value proposition of security and its direct link to customers.

Larry graduated from Old Dominion University with a bachelor’s degree in Business Administration with a focus on IT and Networking. Larry has accumulated certifications such as the CISM, ISO27001 Lead Implementer, GCIA and others. He serves on the Board of Directors for the MIT Enterprise Forum DC and Baltimore.

https://www.inherentsecurity.com
Next
Next

Health Tech 2026: 9 Bold Predictions Shaping the Future