Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect

Defense · Breach Simulator

Find your weakest point. Before someone else does.

Run real attack scenarios against your real configuration. The simulator shows where a phishing event, ransomware, or insider threat would land — given your actual controls and gaps.

Patient Protect — Breach Simulator
Patient Protect Breach Simulator showing attack scenario walking through compromise path against actual office controls, with weakest-link identification

HIPAA mapping

What this satisfies in the Security Rule.

3 citations, each with the specific Breach Simulator behavior that satisfies it. The mapping is the receipt — what you can show an auditor without assembling anything new.

§164.308(a)(1)(ii)(A)

Risk analysis

Identifies potential risks and vulnerabilities to ePHI confidentiality, integrity, and availability — using your actual configuration rather than generic threat models.

§164.308(a)(1)(ii)(B)

Risk management

Implements security measures sufficient to reduce risks. The simulator's output is a prioritized list of those measures, ranked by attack-scenario impact.

§164.308(a)(8)

Evaluation

Tests safeguards against realistic scenarios. Each simulator run produces evaluation documentation.

What it does

Real scenarios. Real configuration. Real weakest links.

Generic breach training shows attack patterns against generic companies. Useful for awareness; useless for prioritization. Your practice has specific vendors, specific workforce, specific devices, specific ePHI flows. The attack that lands at a typical hospital is not the attack that would land at your independent behavioral health office.

The Breach Simulator runs scenarios against your actual configuration. It reads your workforce roster, your device inventory, your BAA portfolio, your PHI flow map, and your training completion patterns. It then walks through specific attack scenarios — phishing campaign, lost device, ransomware event, insider misuse — and shows you where the attack would succeed and where it would be stopped.

The output is the weakest link. Where in the sequence would the attack succeed? Which control, if hardened, would have stopped it? The simulator turns abstract risk analysis into specific remediation. “Train workforce” becomes “train these specific 4 workforce members on phishing” because the simulation showed exactly which members the attack would target and which lack current training.

How it works

6 mechanisms keep Breach Simulator working.

01

Scenario library tuned for independent practices.

The library covers attacks documented in OCR enforcement actions and HHS breach reports — phishing campaigns, BEC, ransomware via compromised vendors, lost-device events, insider threats during workforce transitions, social engineering targeting clinical staff. Scenarios are updated as threat patterns evolve.

02

Step-by-step traversal of your configuration.

Each scenario has steps; each step queries platform state. A phishing scenario step asks: “Workforce member receives phishing email. Do they recognize and report it?” The platform checks training completion for the workforce member, prior phishing-test performance, and active alerting. Step succeeds or fails based on actual data.

03

Weakest-link identification.

The simulation traces to the first failed defensive step. That step is your weakest link for that scenario. Multiple scenarios typically converge on a small set of weakest links — the remediation list is finite and prioritized.

04

Per-scenario impact modeling.

Each scenario has an estimated impact if successful — record count compromised, regulatory penalty range, notification obligations, recovery time. Impact estimates use industry data calibrated for practice size and sector.

05

Output integration with the platform.

Simulation outputs feed directly into Compliance Advice and the Autonomous Compliance Engine. “Weakest link: phishing training for these 4 workforce members” becomes a concrete task in the queue, not a finding lost in a PDF.

06

Re-runs as your configuration changes.

Run the same scenario before and after remediation to verify the weakest link has moved. The simulator confirms the work actually closed the gap.

Who this is for

Built for the practices that need it most.

Practices that want their training to be specific.

Generic phishing training reaches everyone equally and produces generic results. Simulation-targeted training reaches the specific workforce members an actual attack would target.

Practices that have done a checklist SRA but want more.

A checklist SRA produces a list of administrative gaps. Scenario simulation produces a list of operational gaps that actually lead to compromise — different list, more actionable.

Practices preparing for board or insurance reviews.

Boards and insurance underwriters increasingly ask “have you tested your controls?” Generic training records satisfy this weakly. Scenario simulation produces specific evidence — “these scenarios were run on these dates with these outcomes” — that lands well with both audiences.

Practices in sectors with sector-specific threats.

Behavioral health attacks differ from optometry attacks differ from primary care attacks. Sector-specific scenarios in the library calibrate the simulation to the realistic threats for your sector.

What you get

6outcomes you'll feel in week one.

Specific weakest links.

Not “phishing risk exists” — “these 4 workforce members are the weakest link in the phishing scenario.”

Prioritized remediation.

Multiple scenarios converge on a finite list of high-impact gaps.

Sector-specific scenarios.

Your sector's actual threat patterns, not industry-generic.

Audit-defensible evaluation.

Documented simulation runs satisfy §164.308(a)(8) directly.

Training that matters.

Trains the specific people the specific attacks would target.

Re-run verification.

Confirm remediation actually closed the gap.

FAQ

What people ask first.

6 questions cover most first-time evaluations. See all FAQs →

Is this an actual attack against our systems?
No. The simulator runs against your platform configuration data — it doesn't send phishing emails or attempt actual exploits. It models what would happen if a real attack hit your current configuration.
Can we add custom scenarios?
The base library covers most independent-practice scenarios. Custom scenario authoring is on the roadmap for Pro plan practices with sector-specific threat concerns.
How often should we run scenarios?
Quarterly is the typical cadence. Practices in higher-risk contexts (recent acquisition, post-incident, specialty sectors) run more frequently. Running before audit and after material configuration changes is the practical pattern.
Are the scenarios based on real attacks?
Yes. The library is calibrated against OCR enforcement actions, HHS breach reports, and sector-specific incident patterns. New scenarios are added as new patterns emerge in the threat landscape.
What does scenario impact actually mean?
Estimated record count compromised, regulatory penalty range (low / mid / high based on OCR enforcement patterns), notification obligations, recovery time. Estimates are calibrated by practice size and sector.
Is this Pro-only?
Yes. The Breach Simulator is included in the Pro plan. Core plans access the underlying risk analysis; scenario simulation specifically requires Pro.

Next step

Find what would actually land. Fix it before it does.

Most practices run their first scenario inside week one. The weakest links surface fast — and so does the remediation list.

No contracts. No consultants. Starting at $99/mo.