Double The Exposure
TL;DR
Patient portals and health apps are exploding. 78% of patients who were offered online access to their medical record used it in 2024, and 65% of those did so through a smartphone health app. That’s huge for digital health, but it also increases your HIPAA and cybersecurity risks. In this post, I break down what’s fueling this surge, the blind spots I see inside scaling health tech companies, and how to close the gaps before regulators or hackers find them first.
The Problem with Scaling
I’ve worked with health tech teams who have airtight security for EHR integrations.
Access controls, encryption, and breach notification all squared away.
Then they rolled out a new solution such as a patient portal and things started slipping.
The patient portal was built using a separate API stack.
It was managed by a different engineering team.
Their were no vendor security reviews.
Their was no risk assessment.
No new business associate agreements (BAAs) signed with app developers.
(Yes, your contractors that manage systems with PHI need to sign BAAs.)
In short, they were scaling fast with a few missteps.
How Patient Portals & Health Apps Escalate Your Risk
Patient portal use has nearly doubled over the last decade according to the Office of the Assistant Secretary for Technology Policy.
Mobile health app use is booming too.
Nearly 60% of patients now use a health app to manage care.
That’s great for outcomes.
But bad for risk.
PHI isn’t just in one place anymore.
It’s flying across systems, APIs, vendors, and devices.
And that’s where HIPAA compliance breaks.
Most health tech teams build compliance around their core product.
The patient portal.
The telehealth platform.
The first EHR integration.
But as the company grows, PHI doesn’t stay there.
It spreads.
It flows through mobile apps, billing platforms, analytics, and IoT.
If your HIPAA program wasn’t built to protect all of that, you’re exposed.
Even if your flagship product is air tight.
This is exactly why I push teams to run the HIPAA Exposure Audit.
It shows you if your compliance posture actually matches the way your data moves today.
👉 Grab the self-guide here
What This Looks Like on the Inside
Here’s what I’ve seen inside fast-growing health tech companies:
❌ BAAs missing for new vendors receiving PHI.
❌ No dual auth on the patient portal side.
❌ Logs aren't stored long enough.
❌ No risk assessment completed to identify risks from mobile or FHIR integrations.
And when hackers hit.
OCR won’t only investigate the new app.
They’ll comb through everything, including your flagship product.
Scaling Patient Engagement Without Sacrificing Security
So how should a health tech leader address this?
✅ Extend Security Oversight
Get your vCISO or compliance lead in the room before patient-facing code gets green-lit.
✅ Lock Down Third-Parties
Update your vendor list, ensure BAAs are current, and validate security controls.
(Yes, even for that new patient SMS tool or analytics dashboard.)
✅ Conduct a Risk Assessments
HIPAA requires regular assessments and new products reset the clock.
✅ Centralize Monitoring & Logging
If you can’t see app activity across all platforms, you can’t protect it.
The HIPAA Exposure Guide
Most teams I work with fail at HIPAA because compliance never scaled beyond their first product.
That’s why I put together the free HIPAA Compliance Exposure Guide.
It's built for growth-stage digital health companies ready to uncover these blind spots.
It goes beyond the generic checklists to show you:
✅ Where you might be missing BAAs.
✅ How well your access controls really protect new PHI streams.
✅ If your incident response plan is ready for a multi-product breach.
👉 Download it here
Let’s Open This Up
What’s your biggest worry as health care goes digital?
Is it having your PHI stored in the cloud?
Vendors you’ve never heard of handling your data?
Or all the breach headlines making you wonder who you can trust?
Drop a comment.