Lessons from Recent Healthcare Breaches 2025

TL;DR

Episource, Illinois Department of Healthcare & Family Services, and others recently disclosed data breaches. Each reveals a different kind of vulnerability from third-party mistakes to insufficient internal controls. Plus, menstrual tracking apps are under fire for privacy violations, raising big questions about how we treat sensitive data in digital health. In this issue, I unpack what went wrong, what’s at stake, and what you should be doing differently right now.

Recent Healthcare Breaches A Quick Overview

The recent weeks have been particularly rough for healthcare.

Here are four incidents you must know about:

Episource LLC

What Happened: Episource, a healthcare SaaS provider and business associate of Sharp HealthCare and Sharp Community Medical Group, recently confirmed a ransomware incident affecting its network. Sharp was among the customers impacted by the breach, which exposed sensitive patient data managed by Episource on their behalf.

Impact: Unauthorized individuals gained access to highly sensitive Protected Health Information (PHI), diagnosis information, treatment information, prescriptions, test results, medical images, medical record numbers, and doctors’ names.

Scale: Over 5 million patients were affected.

Reference

Illinois Department of Healthcare & Family Services

What Happened: Unauthorized access breached sensitive patient records due to inadequate internal controls and weak access governance.

Impact: Customer names, social security numbers, driver's license or state identification card numbers, financial information related to child support, child support or Medicaid identification and case numbers, and date of birth.

Scale: 933 individuals.

Reference

Gateway Community Services

What Happened: Unauthorized network access crippled behavioral health and addiction treatment service provider Gateway Community Service.

Impact: Names, SSNs, addresses. DOB, driver’s license numbers, medical or treatment information, health insurance information

Scale: Approximately 34,500 individuals.

Reference

Menstrual Tracking Apps

What Happened: Recent investigations found menstrual and fertility tracking apps exposed sensitive personal and medical data to third parties, raising severe privacy concerns.

Impact: Extremely sensitive data, including menstrual cycles, fertility information, and other intimate health details were shared without adequate consent or protection, posing serious privacy risks and potential misuse of personal health data.

Scale: Global users are affected.

Reference

Immediate, Actionable Lessons from These Breaches

✅ Vendor Risk is Your Risk

Remember that third-party vendors significantly expand your risk exposure.

Action: Audit vendor security practices and BAAs at defined frequencies, but don't stop here. Conduct thorough third-party risk assessments and periodically perform check-ins to ensure they are meeting your requirements.

✅ Unauthorized Access Must Be Managed Aggressively

Access controls and monitoring are important. Hackers maintain access to networks for long periods of time because monitoring is not in place and access controls are weak.

Action: Ensure you use MFA, encryption, etc. Monitor access logs and your infrastructure 24/7. Apply the separation of duties strategy to production code pushes and other critical services.

✅ Prepare Now for Ransomware

Ransomware attacks show how quickly patient care can be disrupted.

Action: Back up critical data, spin up mirrored critical services in separate geographic locations, perform incident response simulations, and train your workforce.

✅ Compliance Isn’t Security

Compliance is the beginning, cybersecurity is the end.

Action: Create a security steering committee and embed security into leadership conversations. Look for improvements year over year, and trust me their is always room for it.

✅ Protect Privacy at Every Step

Privacy reinforces the importance of protecting sensitive data and ensuring transparent consent mechanisms.

Action: Perform regular privacy impact assessments, monitor app permissions and third-party data sharing practices, and clearly communicate privacy standards to your users.

How the HIPAA Exposure Guide Can Help

These recent breaches are exactly why I built the HIPAA Exposure Guide.

It’s a straightforward, executive-level self-audit tool tailored specifically for health tech companies scaling fast.

Quickly assess critical security gaps, vendor oversight issues, and tracking technology to ensure your security scales effectively with your business.

👉 Download your free HIPAA Exposure Guide

Don’t Become Tomorrow’s Headline

Cybersecurity breaches are critical warnings and timely wake-up calls.

Your next step is preparation.

Strengthen your security strategy today using the actions above.

Prevent becoming tomorrow’s news.

Let’s Open This Up!

Let’s make this a leadership conversation.

Do you think healthcare has too many breaches to care anymore?

L Trotter II

As Founder and CEO of Inherent Security, Larry Trotter II is responsible for defining the mission and vision of the company, ensuring execution aligns with the business purpose. Larry has transformed Inherent Security from a consultancy to a cybersecurity company through partnerships and expert acquisitions. Today the company leverages its healthcare and government expertise to accelerate compliance operation for clients.

Larry has provided services for 12 years across the private industry developing security strategies and managing security operations for Fortune 500 companies and healthcare organizations. He is influential business leader who can demonstrate the value proposition of security and its direct link to customers.

Larry graduated from Old Dominion University with a bachelor’s degree in Business Administration with a focus on IT and Networking. Larry has accumulated certifications such as the CISM, ISO27001 Lead Implementer, GCIA and others. He serves on the Board of Directors for the MIT Enterprise Forum DC and Baltimore.

https://www.inherentsecurity.com
Next
Next

What Health Tech Leaders Miss When Developing New Products