Skip to main content

Breach Remediation Is Not Security

February 16, 2026
Image: [image credit]
ID 187020383 © Josepalbert13 | Dreamstime.com

Roger Baits, Contributing Editor

A $2.8 million class action settlement can look like accountability. In practice, it often functions more like a pricing mechanism which is an attempt to put a predictable dollar value on a breach that delivered unpredictable harm. The proposed settlement tied to a July 2024 incident involving Gryphon Healthcare follows a now-familiar pattern: modest cash payments for many claimants, higher reimbursement for documented losses, and a bundle of identity and medical monitoring services offered as a standardized remedy, as laid out in the case administrator’s settlement FAQ.

That formula keeps showing up because it is convenient for litigants, legible to courts, and straightforward for administrators. It is also misaligned with how healthcare data exposure actually plays out. Financial fraud is only one pathway. Medical identity misuse can lead to corrupted records, misdirected bills, and delays in care. Privacy harm can change patient behavior in ways that never show up as a reimbursable “loss,” but still raises clinical and operational risk.

The hard truth is that healthcare has developed a breach settlement economy. In that economy, trust and clinical friction are externalities, and remediation becomes a product category.

Vendor breaches are not side events

Billing companies sit close to the arteries of clinical operations. They touch patient demographics, dates of service, diagnosis codes, insurance identifiers, and medical record numbers. When a billing vendor is breached, the incident rarely stays contained to one provider brand; it radiates across multiple organizations that share that partner.

In Gryphon’s own October 11, 2024 incident notice, the company stated it became aware on August 13, 2024 of a security incident involving a partner, completed a review on September 3, 2024, and mailed notices to impacted individuals on October 11, 2024. The notice also lists the categories of information that may have been affected, including Social Security numbers, dates of service, diagnosis and treatment information, and medical record numbers. That is the practical reason billing vendors draw attackers: the data is broad enough to support multiple forms of downstream misuse.

Public reporting has framed the scale as “almost 400,000” individuals, underscoring how a single vendor compromise can produce a population-level blast radius. A contemporaneous summary from the HIPAA Journal breach reporting included Gryphon in a list of major October 2024 healthcare breaches at 393,358 affected individuals.

The compliance framework recognizes the chain, but the market often ignores it

The U.S. Department of Health and Human Services has been explicit that covered entities can only allow business associates to handle electronic protected health information with “satisfactory assurances,” and that business associates must safeguard ePHI and flow security obligations down to subcontractors under the HIPAA Security Rule. The HIPAA Breach Notification Rule similarly establishes duties after breaches of unsecured PHI, with risk assessment expectations that are far more demanding in today’s threat landscape.

The architecture exists. The problem is incentives. Many health systems still evaluate vendors primarily on pricing, integration speed, and revenue cycle performance. Security due diligence is frequently reduced to a questionnaire and a contract clause which can be important, but not sufficient. The result is a market signal that encourages paper compliance even as real-world attackers pressure actual control environments.

Why $100 checks and monitoring plans keep winning

The settlement framework offers two kinds of monetary relief: reimbursement for documented out-of-pocket losses up to $5,000, or an alternative cash payment estimated at $100 for those without documented losses, as described in the settlement benefits section. It also offers two years of identity theft protection and medical data monitoring through CyEx, with the FAQ describing enrollment in CyEx’s “Medical Shield Complete” and associated features such as medical data monitoring and insurance coverage. The structure is easy to administer and familiar to courts.

But it also shifts the burden of proof in a way that systematically undercounts harm. “Documented loss” is a narrow category: it captures certain financial impacts, fees, and replacement costs. It often misses hours spent disputing claims, the long tail of risk created by durable identifiers, and the clinical consequences of misinformation and mistrust.

Medical monitoring is not meaningless. It can support earlier detection and provide navigation when something goes wrong. CyEx describes its medical monitoring offering as tracking medical and healthcare data to identify potential exposure and suspicious activity. The limitation is not the service itself; it is the way monitoring has become a default substitute for prevention, as if post-incident subscriptions are an adequate answer to systemic vendor risk.

Clinical consequences are easy to undercount and hard to unwind

Healthcare data breaches are often framed as privacy events. They are also patient safety events, particularly when medical identity theft is involved. Fraudulent claims can distort utilization histories and eligibility records. Incorrect diagnoses or treatments can infiltrate charts. Patients can face billing confusion that delays follow-up care. Even without confirmed misuse, exposure can change care-seeking behavior for sensitive services.

Those outcomes rarely fit cleanly into reimbursement categories or settlement claim forms. That makes them easy to minimize in financial remediation models and easy to exclude from leadership dashboards that prioritize measurable, short-term loss categories. The harm still exists, distributed across call centers, front desks, patient portals, payer interactions, and clinician time spent correcting avoidable confusion.

Frameworks are shifting from controls to governance

Healthcare does not need another checklist. It needs governance that treats vendors as part of the operational perimeter. The National Institute of Standards and Technology reinforced that direction in its Cybersecurity Framework 2.0, elevating “Govern” as a core function alongside Identify, Protect, Detect, Respond, and Recover. That shift is directly relevant to healthcare vendor ecosystems, where accountability often breaks down at contracting boundaries.

For sector-specific guidance, the HHS 405(d) Program provides consensus-based resources, including the Health Industry Cybersecurity Practices, designed to help organizations prioritize practical safeguards tied to patient safety and operational resilience.

Regulatory expectations are also moving. The Federal Register published a proposed update to the HIPAA Security Rule in January 2025, with the NPRM emphasizing more prescriptive requirements around risk analysis, operational changes, and safeguarding ePHI in a heightened threat environment, as detailed in the proposed rule text. HHS’s Office for Civil Rights also summarized the intent and direction of the proposal in a public factsheet, reinforcing that business associate security posture is not a peripheral issue.

Regardless of how that rulemaking evolves, the signal is clear: “reasonable and appropriate” is being interpreted against a far more demanding baseline than the one that shaped earlier norms.

A vendor security agenda that goes beyond questionnaires

The most effective health systems are shifting from one-time vendor reviews to continuous assurance. That approach is feasible without demanding perfection.

Contract for evidence, not promises. Security clauses that rely on vague “commercially reasonable” language do not match modern breach realities. Strong agreements require demonstrable controls, defined timelines for incident notification, and explicit responsibility for subcontractor oversight.

Narrow the blast radius by design. Billing vendors often retain more data than necessary because retention is cheap and extraction is hard. Data minimization, scoped access, and segmentation reduce what an attacker can exfiltrate and what must be remediated after an incident.

Make identity central. Multi-factor authentication, privileged access management, and rapid deprovisioning are not IT preferences. They are the controls that limit attacker persistence and lateral movement—especially in environments where a single compromised account can open broad data stores.

Test response with the vendor, not around the vendor. Incident response plans that assume a vendor will “handle it” are not plans. Joint tabletop exercises, shared escalation paths, and defined decision rights reduce confusion when minutes matter.

Treat monitoring as a backstop, not a strategy. Post-incident services can help, but the economics remain consistent: prevention is cheaper than remediation once legal costs, operational disruption, and patient trust costs are included.

The settlement model is a signal, but not the solution

The Gryphon settlement process has a clear administrative structure, including opt-out and objection deadlines, a claims deadline, and a scheduled final approval hearing, all posted on the official settlement case website. That transparency is useful. It also highlights the limits of the model.

A settlement fund can compensate and provide services. It cannot restore privacy. It cannot easily repair patient confidence. And it rarely changes the structure that allowed a breach at one vendor to create cascading exposure across many provider relationships.

The next phase of healthcare cybersecurity maturity will not be measured by the number of monitoring enrollments funded after an incident. It will be measured by whether vendor relationships are governed like critical infrastructure partnerships, where security is a prerequisite for doing business, not an after-action purchase.