Skip to main content

Centralized Risk Is a National Liability in Healthcare Data Security

December 1, 2025
Image: [image credit]
Photo 124522923 | Health Data © Spettacolare | Dreamstime.com

Mark Hait
Mark Hait, Contributing Editor

The largest data breach in history, an April 2024 compromise of 2.9 billion records from the U.S.-based data broker National Public Data, did not merely set a new record for exposure. It exposed a systemic blind spot in how healthcare and affiliated sectors assess risk. This was not an isolated cybersecurity lapse. It was the predictable outcome of unchecked aggregation, opaque data markets, and insufficient oversight of non-provider entities that now sit at the center of the healthcare data economy.

As federal regulators, enterprise risk teams, and C-suite executives recalibrate breach response strategies heading into 2026, this incident must not be framed solely as a tech failure. It is a governance failure, and one that demands a far broader policy and procurement reckoning across the healthcare continuum.

The Threat Is No Longer Volume. It’s Concentration.

While the number of reported U.S. data compromises fell slightly in 2024, victim notifications surged 211%, driven by just five events that each exposed over 100 million records. This shift reflects a structural change in breach dynamics: scale is no longer achieved through distributed attack surfaces but through single points of failure at data clearinghouses, brokers, and cloud-based intermediaries. The National Public Data breach alone accounted for more victim notices than the next four largest breaches combined.

This trend was not limited to one sector. A Surfshark analysis found that global breach-exposed accounts jumped from 730 million in 2023 to over 5.5 billion in 2024. In the U.S. healthcare space, over 276 million individuals had their protected health information (PHI) exposed, more than double the 133 million affected in 2023.

These aren’t abstract numbers. They represent clinical histories, financial records, and identifiers that tie back to real patients and providers—many of whom had no direct relationship with the breached entities. That decoupling between patient trust and data stewardship is a regulatory fault line no longer confined to the margins.

Data Brokers Operate Outside Traditional Healthcare Oversight

Perhaps the most alarming dimension of the National Public Data breach is that it occurred at an entity not bound by HIPAA. Data brokers, unlike covered entities and business associates, often sit beyond the reach of sector-specific regulation. Yet they frequently aggregate data sets sourced from healthcare transactions, financial records, public registries, and commercial sources—blurring lines between regulated and unregulated data at scale.

This regulatory gray zone has been a known issue. In 2023, the Federal Trade Commission issued multiple enforcement actions against data brokers for deceptive data handling, including the unauthorized sale of sensitive location and health-related information. However, enforcement has not kept pace with ecosystem expansion. Today, data brokers remain some of the most data-rich and least regulated actors in the healthcare-adjacent economy.

The result is asymmetric accountability. While health systems invest millions in EHR security, multi-factor authentication, and compliance audits, a single unregulated aggregator can erase those investments through exposure of mirrored or linked datasets that were acquired without provider control.

Financial Impact Will Outpace Technical Response

The average cost of a data breach rose to $4.88 million in 2024, according to the IBM Ponemon Institute. For financial services firms, the figure exceeded $6 million. While healthcare-specific breach cost data was not disaggregated in the latest report, historical precedent suggests a similar or higher range due to regulatory reporting requirements and class action litigation risk.

What this means operationally is that post-breach financial planning must now extend beyond perimeter hardening and incident containment. Payers, providers, and their vendors must account for long-term reputational drag, credit monitoring obligations, third-party exposure litigation, and, increasingly, consumer mistrust that hampers digital health engagement.

Moreover, the cascading nature of mega-breaches complicates attribution. When a patient’s information is leaked through a third-party data broker with indirect ties to healthcare service delivery, questions of liability, notification, and redress become difficult to resolve. These are obstacles to maintaining operational integrity.

Healthcare Cannot Outsource Data Responsibility

The 2024 breach map also reinforced a brutal truth: regulated status is no longer a proxy for data risk maturity. The Change Healthcare breach, which exposed 190 million records, came from within the traditional healthcare ecosystem. So did prior breaches at large EHR vendors and pharmacy benefit managers. But it is the non-traditional actors, cloud processors, analytics partners, and data consolidators, that increasingly serve as critical infrastructure while operating outside core compliance frameworks.

To mitigate exposure, health systems must reevaluate vendor management programs. Risk assessment checklists and business associate agreements are insufficient when data is being piped through multiple intermediaries, some of whom are not formally classified under HIPAA. Procurement processes must now consider not only a vendor’s direct safeguards but their data-sharing lineage, retention policies, and secondary monetization practices.

Policymakers, too, have a role. The current regulatory schema does not adequately address data flow across sectors. Proposed federal privacy legislation has repeatedly stalled, leaving a patchwork of state-level rules and enforcement actions that cannot contend with nationally scaled breaches.

Absent federal intervention, healthcare leaders must treat data broker exposure as a first-order risk, not a tangential one.

The 2024 Breach Era Redefines Leadership Accountability

What does leadership accountability look like in a breach environment where most data exposure now occurs upstream or off-premises?

For CIOs and CISOs, it means asserting control over data maps that extend beyond internal systems. For compliance officers, it means demanding documentation on all downstream data recipients, not just primary vendors. For CFOs, it means embedding breach cost assumptions into budget forecasts and M&A due diligence.

Most importantly, for boards and executive teams, it means recognizing that risk centralization is not a technical inevitability. It is a strategic choice, one that requires structural counterweights, policy advocacy, and a willingness to disqualify vendors whose data practices fall outside healthcare’s ethical and operational standards.

The mega-breach era is not a future threat. It is now a defining feature of the health IT landscape. Avoiding repeat exposure will depend not on how well systems respond to compromise, but how aggressively they reassert ownership over where, how, and by whom patient-linked data is handled.