NYSDFS Secures $2.25 Million Cybersecurity Settlement with Delta Dental
What Happened
Delta Dental reached a $2.25 million settlement with the New York State Department of Financial Services (NYSDFS) following a 2023 breach involving MOVEit software. The incident stemmed from the Clop ransomware group exploiting a zero-day vulnerability in the MOVEit file transfer platform. More than 7 million patients had their data exposed across Delta Dental's customer base when attackers compromised the widely-used file transfer tool.
This settlement highlights how regulators are holding covered entities accountable not just for direct security failures, but for risks introduced through third-party software platforms. The MOVEit incident affected hundreds of organizations nationwide, but NYSDFS enforcement demonstrates that each entity remains individually responsible for protecting patient data regardless of whether the vulnerability originated with a vendor.
Data Exposed
While the summary doesn't specify exact data types compromised in this incident, MOVEit breaches typically involve sensitive information stored in file transfer systems, which for dental insurers often includes patient demographics, insurance policy numbers, treatment records, and payment information.
Response & Remediation
The $2.25 million penalty represents one of the larger NYSDFS cybersecurity settlements and signals the department's intensified focus on third-party risk management. Settlements of this magnitude typically include requirements beyond financial penalties—organizations often must implement enhanced security controls, conduct third-party risk assessments, and provide detailed remediation reports to regulators.
Why It Matters
This settlement establishes a critical precedent: covered entities cannot deflect liability to software vendors when third-party platforms expose patient data. The zero-day nature of the MOVEit vulnerability is significant—Delta Dental couldn't have patched a flaw that was unknown until exploitation—yet NYSDFS still imposed substantial penalties.
For independent practices, this creates three immediate concerns:
Vendor risk is direct risk. Every practice uses file transfer tools, cloud storage platforms, practice management systems, and email providers. Each represents a potential attack vector. The industry saw $9.8M average breach costs in 2024 (IBM Security), and regulators increasingly expect proactive vendor security assessments beyond basic BAAs.
State regulators are escalating enforcement. NYSDFS has become one of the most aggressive state-level cybersecurity regulators, and other states are following this model. Multi-million dollar settlements are no longer reserved for hospital systems—any HIPAA covered entity using third-party platforms faces this exposure.
Zero-day vulnerabilities don't excuse compliance failures. The fact that MOVEit's flaw was unknown until exploitation didn't eliminate liability. Regulators expect layered security controls that limit blast radius when (not if) a vendor platform is compromised.
This settlement establishes a critical precedent: covered entities cannot deflect liability to software vendors when third-party platforms expose patient data.
How Patient Protect Helps
Patient Protect's Vendor Risk Scanner addresses the exact vulnerability chain that led to this settlement. The platform continuously monitors BAA status and evaluates vendor security posture, ensuring practices maintain documentation that regulators demand during post-breach investigations.
The Autonomous Compliance Engine auto-generates third-party risk assessment tasks and tracks completion, creating the audit trail that demonstrates due diligence even when vendor platforms fail. When incidents like MOVEit occur, practices can immediately pull documentation showing systematic vendor oversight.
Security Alerts provide real-time monitoring for supply chain threats, while Breach Simulator models scenarios where vendor platforms are compromised, showing exactly which controls limit data exposure. The platform's Zero Trust Architecture ensures that even if a file transfer tool is breached, access to broader practice systems remains restricted.
For practices already working with compliance vendors, Patient Protect adds the continuous security monitoring and vendor risk management layer that documentation-focused partners weren't built to provide—starting at $39/month with no contracts. Start a free trial at hipaa-port.com or check your risk at patient-protect.com/risk-assessment.
This editorial was generated by AI from publicly available source material and is clearly labeled as such. It does not constitute legal, compliance, or professional advice. Inclusion of any entity does not imply wrongdoing. Patient Protect makes no warranties regarding accuracy or completeness. Verify all information with the original source before relying on it.

