Two-Thirds of Healthcare’s Largest Data Breaches Involved Third-Party Vendors

Disclosure: Content in the HostScore.net News section may include paid PR submissions from third parties. Views expressed are solely those of the respective companies. Learn more about our PR submissions here.
Two-Thirds of Healthcare’s Largest Data Breaches Involved Third-Party Vendors

Two-thirds of the largest healthcare data breaches in U.S. history originated from third-party vendors rather than hospitals, according to federal records and independent breach analyses.

These vendor-related incidents have collectively exposed hundreds of millions of patient records, including the 192.7 million-record breach at Change Healthcare in 2024 — the largest ever recorded.

The HIPAA Journal’s September 2025 report shows an apparent slowdown in new breach disclosures. Only 26 incidents affecting 1.29 million individuals were logged on the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) portal.

However, this decline does not indicate a genuine drop in breaches. Due to the federal government shutdown, OCR stopped updating its public portal on September 24, delaying multiple pending reports.

September 2025: Lowest Monthly Breach Count Since 2018

As of late October, OCR’s database lists 26 large incidents, a 56% decrease from August’s 64. The largest were network-server attacks at Goshen Medical Center (456,385 affected) and Medical Associates of Brevard (246,711 affected). Only one event, involving La Perouse LLC in Nevada, was attributed to a business associate.

Even with incomplete data, the year-to-date total stands at 469 large healthcare breaches, compared with 554 during the same period in 2024. This signals a temporary reporting lag rather than improved security posture.

Historical Data: Vendors Behind Two-Thirds of Major Breaches

While September’s sample leans toward healthcare providers, long-term data reveals that vendors are responsible for most large-scale breaches. Of the 20 largest healthcare breaches on record, 13 originated from vendors such as business associates, billing processors, and analytics firms.

Notable cases include Welltok, PJ&A, Maximus, and HealthEC, all compromised through MOVEit file-transfer exploits in 2023. The 2024 Change Healthcare ransomware attack, which exposed nearly 200 million patient records, further illustrates the systemic risk of vendor dependencies.

A single compromised vendor can disrupt claims processing across multiple hospitals and insurers and trigger multi-client, nationwide exposure within days.

Largest U.S. Healthcare Data Breaches of All Time

YearEntityStateEntity TypeIndividuals Affected
2024Change Healthcare, Inc.MNBusiness Associate192,700,000
2015Anthem Inc.INHealth Plan78,800,000
2023Welltok, Inc.COBusiness Associate14,782,887
2024Kaiser Foundation Health Plan, Inc.CAHealth Plan13,400,000
2019Optum360, LLCMNBusiness Associate11,500,000
2023HCA HealthcareTNBusiness Associate11,270,000
2015Premera Blue CrossWAHealth Plan11,000,000
2019Laboratory Corp. of America (LabCorp)NCProvider10,251,784
2015Excellus Health Plan, Inc.NYHealth Plan9,358,891
2023PJ&A (Perry Johnson & Associates)NVBusiness Associate9,302,588
2023Maximus, Inc.VABusiness Associate9,179,390
2023Managed Care of North AmericaGABusiness Associate8,627,242
2014Community Health SystemsTNProvider6,121,158
2023PharMerica CorporationKYProvider5,815,591
2025Yale New Haven Health SystemCTProvider5,556,702
2024Ascension HealthMOProvider5,466,931
2025Episource, LLCCABusiness Associate5,418,866
2011SAICVABusiness Associate4,900,000
2023HealthEC LLCNJBusiness Associate4,786,241
2025Blue Shield of CaliforniaCABusiness Associate4,700,000

Source: U.S. HHS OCR Breach Portal, compiled by HIPAA Journal and independent HostScore analysis.

Why Vendors Remain the Weak Link?

Business associates, including billing processors, data-hosting providers, and analytics vendors, remain the most vulnerable tier in the healthcare data ecosystem. They typically operate outside the direct oversight of the hospitals and health plans they serve, which weakens compliance enforcement and incident visibility.

Common risk factors include shared cloud infrastructures, misconfigured servers, delayed software patching, and limited monitoring of subcontractor networks. Each creates an entry point that attackers can exploit at scale.

According to the Identity Theft Resource Center (ITRC), third-party and supply-chain compromises rank among the top three breach causes across all U.S. industries. Ransomware operators increasingly favor vendor ecosystems, as a single intrusion can cascade through multiple healthcare clients, exposing millions of patient records in one coordinated strike.

HIPAA-Compliant Hosting as a First Line of Defense

The surge in vendor-driven breaches confirms that security must begin at the hosting layer, not at the application level. When healthcare vendors deploy workloads on shared or poorly segmented cloud environments, a single misconfiguration or weak credential can expose vast amounts of protected health information (PHI). A compliance-aligned hosting foundation protects sensitive data before any application or user interaction occurs.

For example, Atlantic.Net’s HIPAA-Compliant Hosting illustrates how secure infrastructure can reduce breach exposure and simplify compliance for healthcare vendors. The platform is SOC 2 and SOC 3 certified, HIPAA and HITECH audited, and purpose-built to safeguard electronic protected health information (ePHI).

Its architecture combines:

  • Dedicated firewalls that block unauthorized access and external threats.
  • Encrypted data storage and transmission to prevent interception or tampering.
  • Isolated compute environments that contain workloads and restrict lateral movement.
  • Continuous monitoring that detects anomalies in real time.

By embedding these security and compliance controls at the infrastructure level, HIPAA-compliant hosting enables healthcare vendors to meet federal privacy mandates without relying solely on software defenses. Yet HostScore’s platform analyses reveal that most vendors still operate on generic cloud stacks lacking verified certifications, encryption attestation, or documented audit trails.

In an interconnected healthcare ecosystem, the hosting environment has effectively become the new security perimeter. Platforms engineered for HIPAA compliance remain one of the most effective first lines of defense against large-scale data breaches.

Key Takeaway

The apparent decline in 2025 breach figures reflects delayed federal reporting rather than improved security. Over ten years of records confirm that two-thirds of major healthcare data breaches originated from third-party vendors.

As healthcare networks become increasingly interconnected, vendor infrastructure and compliance verification have become essential. True data protection begins at the hosting layer, where audited and HIPAA-aligned providers establish measurable standards for safeguarding patient information and maintaining regulatory compliance.

Sources:


/ Two-Thirds of Healthcare’s Largest Data Breaches Involved Third-Party Vendors

More from HostScore

Submit Your Company News

Looking for publicity opportunities at HostScore.net?

Share your company’s latest achievements, product announcements, and company milestones with our readers. Use this self-service submission form and payment gateway to start instantly.

Submit News (Self-Service)

Explore Our Website

HostScore was established to offer those seeking web hosting solutions the opportunity to learn everything they need to know about hosts – before spending a cent on them