When Healthcare Breaches Happen, Cyber Attacks Pay the Highest Price: Insights from Two Years of HHS OCR Data

Over the last two years, large healthcare data breaches reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) have revealed a consistent pattern: almost all of the risk and almost all of the cost sit in one place - server aggregated data.

Hacking and IT intrusions are no longer just one breach vector among many—they are the dominant cause of reportable incidents and by far the most expensive to remediate. Theft, loss, and improper disposal still occur, but they have become statistical noise next to the scale and impact of cyberattacks.

This blog summarizes key findings from a deeper quantitative analysis of the OCR breach portal (last 24 months) and highlights the business and regulatory implications for healthcare leaders. For a complete breakdown of the data, methods, and cost model, see the full whitepaper: “The Real Cost of Healthcare Data Breaches: An Analysis of HHS OCR Data (2024–2025)”.

Download the full whitepaper: “The Real Cost of Healthcare Data Breaches (2024–2025)


1. What the OCR Breach Data Shows

The OCR breach portal tracks “large” breaches (500+ individuals affected) reported by covered entities and business associates. Looking across the last two years of entries:

  • Hacking/IT incidents account for roughly 80% of all reported breaches.

  • Unauthorized access or disclosure accounts for roughly 15–16%.

  • Theft, loss, and improper disposal together make up only a few percent of cases.

In other words, four out of five reportable healthcare breaches are now driven by malicious cyber activity—network intrusions, ransomware, compromised credentials, or related IT incidents.

The pattern is equally stark when looking at the number of records:

  • Hacking incidents routinely involve very large data sets (hundreds of thousands to millions of records).

  • Insider or misdirected disclosures typically affect thousands or tens of thousands of records.

  • Loss/theft/disposal incidents are usually limited to thousands of records at most.

From a pure frequency standpoint, the modern healthcare breach is overwhelmingly a cyber event, not a lost laptop or a box of paper charts in a dumpster.


2. The Economics of a Healthcare Breach

Each reported breach triggers a predictable set of cost drivers, regardless of vector:

  1. Technical investigation and forensics
    Identifying how the breach occurred, stopping it, and ensuring attackers are not still present. This includes log analysis, endpoint and network forensics, and sometimes rebuilding systems.

  2. Notification and credit monitoring
    Notifying affected individuals, regulators, and sometimes the media; setting up call centers; and often providing credit monitoring or identity protection. Costs scale almost linearly with the number of individuals affected.

  3. Regulatory penalties and corrective action
    OCR enforcement can include civil monetary penalties, corrective action plans, and independent monitoring. For serious violations, HIPAA fines can reach into the millions of dollars per incident.

  4. Legal costs and settlements
    Class actions and state investigations now commonly follow large healthcare breaches. Defense costs, settlements, and fee awards for plaintiffs’ counsel significantly increase the total impact.

  5. Remediation and security upgrades
    Implementing new security controls, replacing or re-architecting systems, and investing in tooling and expertise that should have been present before the incident.

  6. Reputational damage and lost business
    Patient churn, reduced referrals, contract terminations, and lost future business. This component is difficult to measure but often the largest in the long term.

These cost drivers exist across all breach vectors, but the scale and regulatory posture differ sharply between a major cyber incident and a small internal mistake.


3. Why Hacking/IT Incidents Dominate Total Cost

3.1. Scale: More People, More Notifications, More Lawsuits

Hacking incidents consistently affect the largest populations. A single network intrusion can expose millions of records across multiple facilities, business lines, or covered entities. Notification and call-center operations for a multi-million-person breach can alone cost millions of dollars.

By contrast:

  • A typical unauthorized disclosure incident might involve a misdirected email, an employee misusing access to view a few hundred or a few thousand records, or a partner misconfiguration affecting a narrower population.

  • Loss/theft/disposal incidents often involve a small number of devices or boxes of records, constraining their scope.

When notification costs, legal exposure, and reputational impact are all proportional to the number of affected individuals, the largest category by scale will almost always dominate the economic impact.

3.2. Regulatory Risk: Perceived Preventability and Systemic Failure

HHS OCR treats large hacking incidents as clear indications of systemic security failures: inadequate risk analysis, missing safeguards, poor patching and monitoring, or excessive privileges.

As a result:

  • Cyber events frequently lead to multi-year corrective action plans and multi-million-dollar settlements or penalties, particularly when encryption, MFA, segmentation, or basic logging were missing.

  • Theft and loss cases still draw fines (especially for unencrypted laptops or unprotected backup media), but they are now relatively rare and more often involve mid-six-figure rather than eight-figure resolutions.

  • Unauthorized access/disclosure cases often result in targeted corrective measures (training, policy updates, revised access controls); fines tend to be more modest unless the incident is large or persistent.

Regulators increasingly view large hacking incidents as both foreseeable and preventable, which raises the enforcement baseline.

3.3. Operational Disruption and Patient Safety

Ransomware and destructive attacks carry a cost category that theft/loss incidents generally do not: extended downtime.

When a major hospital or health system loses electronic health record (EHR) access, e-prescribing, imaging systems, or revenue-cycle systems for days or weeks, the consequences are severe:

  • Deferred or canceled procedures and visits

  • Manual workarounds that reduce throughput and increase error risk

  • Delayed billing, claims, and revenue recognition

  • Potential patient harm, which may itself result in litigation

A single large ransomware event can cost tens of millions purely in lost revenue and recovery efforts, even before considering notification, legal, and regulatory costs.


4. How Other Vectors Compare

Although hacking/IT incidents dominate the aggregate picture, the remaining vectors still matter at the entity level.

4.1. Unauthorized Access/Disclosure

These cases typically involve:

  • Employees snooping on records without a legitimate need

  • Misaddressed emails or faxes

  • Partners mishandling or misconfiguring shared data

They are generally smaller in scale, and technical remediation is less complex. However:

  • OCR can and does fine organizations for repeated insider snooping or for failing to implement and enforce role-based access controls.

  • Some large “unauthorized disclosure” events (e.g., misuse of web tracking pixels) have affected millions of individuals and led to multi-million-dollar settlements.

For many organizations, this category represents manageable but persistent “background noise” risk that still adds up in legal, compliance, and operational terms.

4.2. Theft, Loss, and Improper Disposal

These vectors have become rare, largely due to:

  • Device encryption

  • Better media-handling procedures

  • Increased awareness of physical security

When they do occur, they tend to share several characteristics:

  • Scope in the hundreds or low thousands of records

  • Straightforward notification and remediation

  • Fines concentrated around clear policy failures (e.g., unencrypted laptop, discarded paper records)

Individually, these breaches can be painful—especially for smaller organizations—but collectively, across the entire sector, they represent a small fraction of the total cost burden compared to cyberattacks.


5. Estimated Cost by Vector (Two-Year View)

Using conservative industry-average cost-per-breach estimates and the observed frequency of each vector over the last two years, a high-level picture emerges:

  • Hacking/IT incidents

    • Roughly four out of five breaches

    • Typical total cost per incident in the mid- to high-single-digit millions; many at eight figures

    • Aggregate cost across the sector over two years likely in the low tens of billions of dollars

  • Unauthorized access/disclosure

    • Approximately one in six breaches

    • Costs usually in the low- to mid-single-digit millions, with outliers higher

    • Aggregate cost in the hundreds of millions

  • Theft, loss, improper disposal

    • Only a few dozen incidents across the entire country over two years

    • Costs often in the hundreds of thousands or low millions per incident

    • Aggregate cost in the tens of millions

From a portfolio perspective, hacking/IT incidents are responsible for the overwhelming majority of economic loss, both in direct expenditures and in long-term business impact.


6. Strategic Implications for Healthcare Leaders

For boards, CEOs, CIOs, CISOs, and compliance officers, the implications of this analysis are clear:

  1. Prioritize controls and investments that directly reduce exposure to cyber intrusion.
    Traditional safeguards around device encryption and paper records are still necessary, but marginal dollars should increasingly flow to controls that reduce the likelihood and impact of large hacking incidents: strong identity and access management, continuous monitoring, vulnerability management, network segmentation, and hardened third-party connectivity.

  2. Design architectures that limit “blast radius” by default.
    The economic story of the OCR data is fundamentally a story about blast radius: large, centrally accessible datasets drive catastrophic cost when breached. Architectures that shard sensitive data, enforce strict access boundaries, and keep servers blind to full-context plaintext can materially change the risk curve.

  3. Recognize that business and regulatory costs compound.
    It is no longer sufficient to think in terms of “IT cleanup costs” alone. Large cyber events trigger layers of cost—technical, legal, regulatory, reputational—that interact and compound over years. When modeling ROI for security and architectural transformation, these multi-year, multi-layer costs should be explicitly quantified.

  4. Treat third-party and ecosystem risk as first-class.
    Several of the most impactful recent incidents originated not in a hospital or health system, but in a shared technology or service provider. Vendor security posture, contractual controls, and technical isolation are now as important as internal controls.


7. What the Full Whitepaper Covers

This blog provides a high-level narrative of the findings. The full whitepaper, “The Real Cost of Healthcare Data Breaches: An Analysis of HHS OCR Data (2024–2025)”, goes significantly deeper, including:

  • A detailed breakdown of breach counts and records affected by vector and year

  • A cost model that maps OCR portal data to per-incident and aggregate financial impact

  • Case studies of high-impact outlier events (including major ransomware and third-party breaches)

  • A decomposition of costs into technical, regulatory, legal, and business components

  • Strategic recommendations for reducing both likelihood and blast radius, including architectural patterns that keep servers from ever holding full-context plaintext

Download the full whitepaper: “The Real Cost of Healthcare Data Breaches (2024–2025)

 

For organizations that manage large volumes of PHI, these findings support a simple conclusion: the greatest financial risk lies not in rare edge cases, but in the routine structure of how data is stored, accessed, and processed today. Changing that structure—especially for data in use—is where the next meaningful reductions in breach impact will be found.