HEALTHCARE · April 28, 2026

Healthcare Provider x Post Data Breach


By Javien Bigbee

The first 90 days after discovery compress governance, law, clinical continuity, evidence, patient communication, insurance, and public record into one operating window. The board wants exposure contained. Privacy wants the notification chain right. Operations wants EHR, billing, email, scheduling, and phones back under command. Clinical leadership wants patient care moving without creating a second incident through improvised workflows. The compression is the same in a solo practice and a health system. The difference is posture, not pressure.

The Floor

A healthcare provider operating as a HIPAA covered entity is not in a normal vendor-selection moment after a breach. The floor is already set. The HIPAA Privacy Rule governs permitted uses and disclosures of PHI under 45 CFR Part 160 and Subparts A and E of Part 164 (HHS OCR, Privacy Rule Introduction, November 2015). The HIPAA Security Rule governs administrative, physical, and technical safeguards for ePHI under 45 CFR Part 160 and Subparts A and C of Part 164 (HHS OCR, Summary of the HIPAA Security Rule, December 2024). The Breach Notification Rule runs under 45 CFR §§ 164.400–414, with covered entity notice to affected individuals, HHS, and in certain cases media (HHS OCR, Breach Notification Rule, July 2013). The 2013 Omnibus Rule finalized HITECH breach changes at 78 FR 5566. It replaced the interim breach notification rule and makes the current breach analysis the live frame for this moment (Federal Register, HIPAA Privacy, Security, Enforcement, and Breach Notification Rules, January 2013).

That floor is not abstract. HITECH section 13402, codified at 42 U.S.C. § 17932, requires notice without unreasonable delay and no later than 60 calendar days after breach discovery. It also puts the notification burden on the covered entity even where a business associate is involved (Legal Information Institute, 42 U.S.C. § 17932, February 2009). OCR's Cyber Attack Checklist says the entity must execute response and mitigation procedures, contingency plans, law enforcement coordination where appropriate, and breach reporting where required (HHS OCR, Cyber Attack Checklist, June 2017). NIST SP 800-66 Rev. 2 converts the Security Rule into a risk-assessment and risk-management resource for covered entities of different sizes (NIST, SP 800-66 Rev. 2, February 2024). NIST SP 800-61 Rev. 3 frames incident response as a risk-management function across govern, identify, protect, detect, respond, and recover (NIST, SP 800-61 Rev. 3, April 2025).

State law is the overlay that gets missed when providers behave like this is only a HIPAA matter. Texas, for example, requires attorney general notice as soon as practicable and no later than 30 days for breaches involving at least 250 Texas residents after S.B. 768 took effect in September 2023 (Texas Legislature, S.B. 768, September 2023). That is a different clock from HIPAA's outer 60-day frame. SaaS vendors can often centralize their notification strategy around customer contracts and general state breach laws. Covered entities carry patient trust, clinical continuity, business associate dependency, HHS reporting, state attorney general exposure, and sometimes media notice in the same window.

The Inertia Problem

Post-breach recovery rarely fails because healthcare providers hired bad vendors. It fails because the first call goes to whoever was in the room. The MSP knows the network. The longtime HIPAA consultant knows the policies. The cyber insurance carrier has a panel. Each may be useful. None of that means each should command the sequence.

The evidence points to sequencing, not vendor volume. IBM's 2024 study of 604 real-world breaches from March 2023 through February 2024 found healthcare had the highest average breach cost for the fourteenth consecutive year. The figure was USD 9.77 million (IBM, Cost of a Data Breach Report, July 2024). The same study found 70% of breached organizations reported significant or very significant operational disruption. Most of the limited group that fully recovered took more than 100 days (IBM, Cost of a Data Breach Report, July 2024). A JAMA study using California data from 2014 to 2020 found attacked hospitals had emergency department visits fall 8.10% in the first week and 16.21% in the second week after disruptive ransomware attacks. Nearby unattacked hospitals saw ED visits rise up to 7.10% by week three (JAMA, Ransomware Attacks, ED Visits and Inpatient Admissions in Targeted and Nearby Hospitals, May 2024). This is not a back-office incident.

OCR's 2023 breach data shows the recurring control story. In calendar year 2023, OCR received 732 reports of breaches affecting 500 or more individuals, affecting approximately 113,173,613 individuals. Hacking and IT incidents made up 81% of reports and 96% of affected individuals (HHS OCR, Annual Report to Congress on Breaches of Unsecured PHI for Calendar Year 2023). Health care providers accounted for 63% of those large-breach reports in OCR's 2023 data (HHS OCR, Annual Report to Congress on Breaches of Unsecured PHI for Calendar Year 2023). OCR identified risk analysis, risk management, information system activity review, audit controls, response and reporting, and authentication as areas needing improvement in 2023 investigations (HHS OCR, Annual Report to Congress on Breaches of Unsecured PHI for Calendar Year 2023). Those are proof-of-control gaps. They are not solved by a familiar logo.

The 2024 Ponemon and Proofpoint healthcare survey found that 92% of surveyed U.S. healthcare organizations experienced at least one cyber attack in the prior 12 months. It also found 69% reported patient-care disruption from cyber attacks (Proofpoint and Ponemon Institute, Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2024, October 2024). The same survey of 648 healthcare IT and security practitioners found 68% had experienced supply chain attacks in the prior two years. Of those, 82% said patient care was disrupted (Proofpoint and Ponemon Institute, Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2024, October 2024). That is why vendor inertia is the second-order problem. The breach is the signal. The first routing decision determines whether the provider gets facts, containment, privilege alignment, notification discipline, and proof. Wrong sequence turns recovery into theater.

Four Traps

The MSP-as-forensics-firm trap is the cleanest separation-of-duties failure. The existing IT vendor is asked to investigate the incident, remediate the systems, restore operations, and validate its own work. That may feel fast. It puts evidence, containment, and accountability under one conflicted command path. The right use of the MSP is environment access, restoration knowledge, and implementation capacity. The wrong use is independent fact finding.

The compliance-consultant-as-incident-responder trap looks safer because the consultant knows HIPAA. HIPAA knowledge is not incident response capability. The provider needs legal privilege coordination, forensic scope, containment logic, malware or BEC investigation, system restoration sequence, breach risk assessment, and notification planning. Documentation before facts are stable creates false control. It gives OCR a file, not evidence.

The panel-firm-as-generalist trap is subtler. Insurance panel forensics can be the right first move when speed, privilege, and carrier alignment fit the incident. It can also become wrong sequence when the panel scope is narrow, the clinical systems are complex, the business associate chain is unclear, or the operational restoration needs outpace the carrier workflow. Carrier process has value. It does not automatically equal provider-fit command.

The role-based trap turns each leader's exposure into a buying error. Boards hire reputation before command structure. Privacy hires documentation before the facts are stable. Operations buys tools before containment is verified. Clinical leadership defers to IT when the actual question is patient communication and workflow safety. Each move is understandable. Each can be wrong.

Operating Postures

Provider count is a poor routing tool. Daily operating reality is better.

A practice-administrator-led posture is the small independent practice where one or two people carry privacy, security, operations, vendor coordination, patient communication, and cash continuity at the same time. IT is usually outsourced to an MSP. There may be no tested incident playbook. The rough range is solo through about 15 providers, but the signal is not headcount. The signal is whether the same person is calling the MSP, drafting patient notices, tracking appointments, and asking whether the insurer has been notified.

A designated-officer posture has a formal Privacy Officer and often a Compliance Officer. There may be internal IT or a strong MSP relationship. Governance is forming. Documentation exists but may be partial. The rough range runs through mid-sized groups and around 150 providers. The risk is believing designated titles equal incident command. They do not. This posture needs sequencing discipline so privacy, operations, forensics, counsel, insurance, and clinical communication do not run on parallel clocks.

A health-system posture has a formal compliance department, separated Privacy and Security Officers, a CIO or CISO, committees, insurance relationships, outside counsel access, and vendor panels. The issue is load and coordination, not absence. The system may have every role named and still fail control because clinical, legal, payer, business associate, public relations, and restoration decisions outrun a single command structure.

First-90-Day Matrix

RoleDays 0–15: stabilizeDays 16–45: prove controlDays 46–90: re-enter
Board member or practice ownerRefuse reputation-first buying. Name incident command, counsel path, insurance path, and who can approve clinical-risk tradeoffs.Require a control memo showing containment status, evidence preservation status, notification clock status, and cash-continuity exposure.Approve re-entry only after independent retest, risk-management plan, patient communication record, and board reporting cadence exist.
Privacy Officer or Compliance leadRefuse final breach conclusions until forensic facts, PHI exposure theory, and business associate chain are stable.Own the notification map across individuals, HHS, media if required, state attorney general triggers, and delegated business associate notices.Convert the incident file into OCR-ready evidence: risk analysis, sanctions, training, BAA refresh, and notification proof.
Practice Administrator or COORefuse tool purchases before containment. Preserve logs, route MSP access through the forensic plan, and track clinical-workflow outages daily.Prove restored operations are controlled, not merely online. Validate EHR, billing, phones, email, scheduling, backups, and vendor access.Re-enter with downtime procedures tested, vendor contacts updated, payer disruption logged, and patient-facing communication corrected.
Medical Director or clinical leadRefuse "IT will handle it" posture. Identify patient-safety dependencies, manual workflow risks, and communication constraints.Validate that clinical communication matches what is known, not what operations wishes were true. Control workarounds that create new PHI exposure.Require clinical debrief, updated downtime workflows, escalation paths, and readiness for CMS, Joint Commission, or internal quality review where applicable.

Predictable Scenarios

1. Clinical restoration pressure conflicts with evidence preservation

This is predictable because care delivery cannot pause for a perfect forensic timeline. CMS emergency preparedness guidance says Medicare-participating facilities use an all-hazards approach that includes interruptions in communications and cyber attacks. It links cyber controls to continuity of critical treatment and care (CMS, Homeland Security Threats Emergency Preparedness Guidance, December 2024). The right sequence is preserve evidence, contain active threat, define safe restoration lanes, then restore clinical systems in a documented order. The wrong move is letting the MSP rebuild or wipe systems because "patients are waiting" before forensic capture and containment are verified.

2. Multi-jurisdictional notification convergence

This happens when HHS, affected individuals, state attorneys general, media, credit monitoring, payers, and business associates all sit on different clocks. It is predictable because healthcare providers hold PHI across resident populations, vendor systems, portals, billing files, and email accounts. The right sequence is notification mapping before public messaging: affected population, data elements, residency, business associate role, state triggers, media threshold, and law enforcement delay analysis. The wrong move is sending a patient notice that satisfies one clock while creating conflict with another.

3. OCR investigation while a cyber insurance panel firm is in place

This is not unusual. It becomes dangerous when scope, privilege, carrier reporting, and regulator evidence are treated as the same file. OCR's Change Healthcare FAQ reminds covered entities that they remain responsible for timely notices to HHS, affected individuals, and media where applicable. That remains true even if notice tasks are delegated to a business associate (HHS OCR, Change Healthcare Cybersecurity Incident FAQ, August 2025). The right sequence is counsel-controlled scope, forensic independence, carrier coordination, then OCR-ready evidence. The wrong move is assuming the panel workflow alone proves HIPAA control.

Re-Entry

Re-entry is not the day systems come back online. It is the day the provider can prove control. The artifacts matter because OCR and state reviewers do not grade relief. They grade evidence.

The re-entry file should include an independent retest and updated risk analysis under 45 CFR § 164.308(a)(1)(ii)(A). It should also include a risk management plan under 45 CFR § 164.308(a)(1)(ii)(B), revised activity review, audit controls, access decisions, authentication decisions, and a documented security-incident record. OCR's Green Ridge Behavioral Health ransomware settlement in February 2024 tied a ransomware breach involving more than 14,000 patients to alleged failures in risk analysis, risk management, and information system activity review. Those alleged failures sat under the Security Rule (HHS OCR, Green Ridge Behavioral Health Resolution Agreement and Corrective Action Plan, February 2024). That is the proof point. Remediation without documented control is not re-entry.

The file should include a BAA refresh, patient communication record, HHS submission record, state attorney general record, media notice record, sanctions and training updates, and board reporting cadence. Health-system posture also needs Joint Commission or CMS readiness where applicable. A March 2024 AHA survey representing 960 hospitals found 74% reported direct patient-care impact from the Change Healthcare cyberattack. The same survey found 94% reported financial impact (American Hospital Association, AHA Survey: Change Healthcare Cyberattack Having Significant Disruptions to Patient Care, Hospitals' Finances, March 2024). That is why re-entry has to include operational and clinical proof, not only privacy documentation.

The Routing

If the read here is closer to your situation than your current vendor plan is, the next step is a short email to javien@byyourpresence.com. Include days since discovery, what has been notified, what clinical systems are status, what operational systems are status, who is already in the room, and where command is unclear. The response is a routing read, not a pitch. What to engage first. What to sequence next. What to keep. What to replace. Not a fit also gets said plainly. If this framing is not your situation, the email is not the right step. That is a real answer.


By Your Presence is a quiet introductions practice. If this Field Note describes something you're navigating, you can write in directly: javien@byyourpresence.com.