Inside NYBCe, US HealthConnect & MedicSolution Breaches: Key Lessons for Health Tech Founders
TL;DR
Three major health tech breaches in 2025 NYBCe, US HealthConnect, and MedicSolution exposed serious vulnerabilities in operational readiness, third-party risk, and PHI security. If you're a growth-stage health tech startup, the time to audit your HIPAA compliance posture is now. This article breaks down the breaches and what you must do next.
The NYBCe Breach: Operational Fallout From Ransomware
In late January 2025, New York Blood Center Enterprises (NYBCe) detected suspicious activity on its network. What followed was confirmed ransomware, stolen data, and a delayed notification window that extended until early September.
What was exposed
Names, health info, test results
Social Security numbers, driver’s license data
Financial account information (for some staff)
Why it matters to you
NYBCe’s breach disrupted blood drives and operations reminding us that security is also an operations issue.
If your organization doesn’t have a incident response plan that includes comms, legal, ops, and leadership, you're vulnerable far beyond the data loss.
✅ Insight
You can outsource IT but you can’t outsource response. Make sure your incident playbook is real, battle-tested, and aligned with your RTOs.
Data Exposed
Personally identifiable information (PII)
Social Security numbers
Potentially Protected Health Information (PHI)
US HealthConnect’s core business is marketing and education. And yet they hold sensitive data. Sound familiar? Your CRM, web analytics tools, or lead forms might be handling PHI without safeguards or a valid BAA.
✅ Insight
Evaluate your martech stack. If PHI touches your pixels, you likely fall under HIPAA, even if you think you’re not. Tracking Technologies have special requirements under the law.
The MedicSolution Breach: A Supply Chain Time Bomb
Brazil-based MedicSolution, a healthcare software vendor used by hospitals and clinics, became the victim of a KillSec ransomware attack in September 2025. Threat actors claimed to exfiltrate sensitive records and publicly posted extortion demands.
What’s different here?
The attack didn’t hit a provider directly.
The risk came from the software vendor that hospitals and clinics relied on.
Root cause pointed to misconfigured cloud storage (S3 bucket).
Takeaway for CIOs
If you’re a vendor or you use one, you’re part of someone else’s risk equation. Third-parties accounted for 41.2% of healthcare breaches in 2024.
✅ Insight
When was the last time you conducted a HIPAA Assessment? Do you have Business Associate Agreements for every vendor touching PHI that you manage? Have you validated their controls in the past 12 months?
What Growth Stage Health Tech Orgs Must Do Now
If you’re growing fast and touching patient data (directly or indirectly), here’s your action plan:
Conduct HIPAA Risk Assessments: Look for technical, administrative, and physical risks as changes occur in your infrastructure
Conduct a HIPAA Gap Assessment: Know where you stand today to figure out where you need to go. This should be done annually
Map Vendors Touching PHI: Require signed BAAs and annual control validation. Dig deeper than compliance reports (e.g., SOC 2)
Test Incident Response Plans: Include comms, leadership, ops, and legal, not just IT
Train Your Workforce: Simulate phishing campaigns, provide security awareness training, breach report channels, and ENFORCE it. Training should be throughout the year.
Secure Patient Data: Develop retention policies, access controls, and deletion protocols
Audit Tracking Technologies: Evaluate your ads, web trackers, analytics tools for PHI
✅ Insight
Don’t just “comply.” Align your security posture with your business mission. That’s what regulators and partners want to see, and what enterprise health systems will expect.
Health Tech Isn’t Immune, They’re Targets
These breaches are a wake-up call. Ransomware, cloud misconfigurations, and third-party risks are reoccurring mishaps for scaling health tech organizations. Don’t wait until you have to make that awkward call to your customer about a breach you're a part of.
✅ Get Started Now
Discover the advanced security controls that help prevent the breaches above. Download the HIPAA EXP Audit Guide
If you prefer to invest in vCISO advice you can trust, Book a Call
Frequently Asked Questions (FAQs)
What makes health tech companies a big target for breaches?
Lack of dedicated security teams, fast growth, and increasing data exposure make them vulnerable to exploitation.
Are marketing tools covered by HIPAA?
Yes, if those tools collect or process PHI (even indirectly), you’re responsible for ensuring HIPAA compliance.
What’s the first thing I should do to be HIPAA-ready?
Start with a HIPAA Compliance Gap Assessment. It helps uncover blind spots and gives you a roadmap.
If a vendor causes a breach, am I still liable?
Yes. HIPAA requires covered entities and business associates to ensure downstream compliance. No BAA? You’re on the hook.