Patient ProtectPatient Protect

Security & Cyber Threats

Built to Break: The Hidden Risks Inside 'Compliant' Platforms

Some HIPAA compliance platforms are built on outdated technology that creates the very vulnerabilities they claim to prevent. Here is how to check yours.

Alexander Perrin·April 2, 2025·Updated April 11, 2026
Built to Break: The Hidden Risks Inside 'Compliant' Platforms

The compliance platform that creates the vulnerability

There is a particular kind of irony in the HIPAA compliance industry: platforms that sell security are sometimes the least secure software a practice uses. They run on outdated JavaScript libraries, unpatched server frameworks, and authentication systems that would fail a basic penetration test. They ask practices to trust them with PHI while operating on technology that makes that trust a liability.

This is not hypothetical. It is observable, verifiable, and more common than the industry wants to admit.

The legacy technology problem

Software ages. Libraries that were secure in 2015 have known vulnerabilities in 2025. Frameworks that were industry standard a decade ago now appear on OWASP's list of security risks. The question is not whether a platform uses older technology — it is whether that platform actively maintains, patches, and updates its dependencies.

Many HIPAA compliance platforms do not.

The economics are straightforward: rewriting a platform on modern architecture is expensive. Patching legacy code is cheaper in the short term. So platforms accumulate technical debt — outdated libraries, deprecated APIs, abandoned dependencies — while continuing to market themselves as security solutions.

The result is a compliance tool that introduces the same categories of risk it was purchased to mitigate.

How to check if your platform uses jQuery

jQuery is a JavaScript library originally released in 2006. It was transformative for web development at the time. It is also, in its older versions, a source of well-documented security vulnerabilities — particularly cross-site scripting (XSS) flaws that can be exploited to steal session tokens, inject malicious code, or exfiltrate data.

You can check whether a website uses jQuery — and which version — in under 60 seconds:

  1. Open your compliance platform in Chrome or Firefox
  2. Open Developer Tools (right-click anywhere on the page and select "Inspect," or press F12)
  3. Navigate to the Console tab
  4. Type jQuery.fn.jquery and press Enter

If the platform uses jQuery, this command returns the version number. If it does not use jQuery, you will see a reference error — which is actually the better outcome.

What to look for:

  • jQuery versions below 3.5.0 contain known XSS vulnerabilities (CVE-2020-11022, CVE-2020-11023)
  • jQuery versions below 3.0.0 have additional prototype pollution vulnerabilities
  • jQuery 1.x — still found on some compliance platforms — has multiple unpatched security flaws that will never be fixed because the 1.x branch is no longer maintained

If your HIPAA compliance vendor is running jQuery 1.x, they are operating on a library with known, unpatched vulnerabilities that directly contradict the security controls they claim to help you implement.

Why legacy tech is a HIPAA violation waiting to happen

The HIPAA Security Rule requires covered entities and business associates to implement technical safeguards that protect ePHI. This includes:

  • Access controls (Section 164.312(a)): Technical policies and procedures to allow access only to authorized persons
  • Audit controls (Section 164.312(b)): Hardware, software, and procedural mechanisms to record and examine access
  • Integrity controls (Section 164.312(c)): Policies to protect ePHI from improper alteration or destruction
  • Transmission security (Section 164.312(e)): Technical measures to guard against unauthorized access during transmission

A platform built on outdated, unpatched libraries with known vulnerabilities cannot satisfy these requirements for its own operations. And since a compliance platform functions as a business associate — handling risk assessments, policy documents, and potentially PHI — its security failures become the practice's compliance exposure.

Put simply: if your compliance vendor's platform has known vulnerabilities, and those vulnerabilities are exploited, the resulting breach is your breach too.

Beyond jQuery: other red flags in platform architecture

jQuery is easy to check because it is client-side — visible in the browser. But the deeper problems are often server-side, where they are harder to detect. Here is what to look for:

Shared hosting environments

Some compliance platforms run on shared hosting infrastructure where multiple customers' data resides on the same server. This creates lateral movement risk: a breach of one customer's instance can potentially expose data from other customers on the same machine.

Ask your vendor: Is our data isolated on dedicated infrastructure, or do we share server resources with other customers?

Outdated server frameworks

Server-side frameworks like older versions of Rails, Django, Express, or PHP have published CVE lists — known vulnerabilities that attackers actively scan for. A platform running an unpatched framework is a target, not a shield.

Ask your vendor: What server-side framework do you use, and when was it last updated?

Weak authentication

Authentication is the front door. If a platform still supports password-only login without MFA, allows passwords shorter than 12 characters, does not enforce account lockout after failed attempts, or stores passwords with weak hashing algorithms, the entire security model is compromised at the entry point.

Ask your vendor: Do you require MFA for all users? What hashing algorithm do you use for password storage? Do you enforce account lockout policies?

No penetration testing

Legitimate security platforms undergo regular third-party penetration testing and publish the results (or at least confirm the testing schedule). If a vendor cannot tell you when their last penetration test was conducted and who performed it, that is a significant gap.

Ask your vendor: When was your last third-party penetration test, and can you share the summary findings?

Missing SOC 2 or equivalent certification

SOC 2 Type II certification requires an independent auditor to verify that a platform's security controls operate effectively over time. It is not perfect, but it is a baseline indicator that the vendor takes security seriously enough to submit to outside scrutiny.

Ask your vendor: Do you hold SOC 2 Type II certification? When was your last audit?

How to evaluate a compliance vendor's security standing

Beyond the technical checks above, here is a practical framework for evaluating whether a compliance vendor is genuinely secure or just marketing security:

Check their own compliance: A HIPAA compliance vendor should be able to produce their own risk assessment, their own policies, and their own BAA without hesitation. If they resist providing these documents, they are selling what they do not practice.

Review their architecture documentation: Legitimate platforms can describe their security architecture — encryption standards, key management, access control models, network segmentation, logging and monitoring infrastructure. Vague answers like "we use industry-standard security" are a red flag.

Test their incident response: Ask what happens if their platform is breached. What is the notification timeline? What is the containment procedure? How do they ensure your data is protected during a security event? A vendor that cannot answer these questions clearly has not planned for the scenario.

Check their dependencies: Use browser developer tools, review their documentation, or simply ask: what third-party libraries and services does the platform depend on, and how are they maintained?

How Patient Protect is built differently

Patient Protect's architecture was designed by a former government CTO with a military-grade security background. The platform reflects that lineage:

  • Zero Trust architecture: No implicit trust for any user, device, or network location. Every request is authenticated, authorized, and encrypted.
  • AES-256-GCM encryption: Data at rest is encrypted with the same standard used by classified government systems.
  • AppSensor intrusion detection: Real-time monitoring for anomalous behavior patterns — not just known attack signatures, but behavioral deviations that indicate compromise.
  • TLS 1.3 transport security: All data in transit is protected with the current strongest transport layer standard.
  • No legacy dependencies: The platform does not carry jQuery, unpatched frameworks, or abandoned libraries. Dependencies are actively maintained, regularly audited, and updated as part of the development lifecycle.
  • Dedicated infrastructure: Customer data is not commingled on shared hosting. Isolation is architectural, not just logical.

The research published through the Secure Care Research Institute documents the technical foundations and threat models that inform the platform's design.

The bottom line

Your HIPAA compliance vendor is a business associate. Their security is your security. Their vulnerabilities are your vulnerabilities. A platform built on outdated technology — regardless of how polished its marketing or how long its feature list — is introducing risk into your practice that you cannot see from the login screen.

Check the technology. Ask the hard questions. And if the answers are not satisfactory, recognize that you are paying for a compliance tool that may be your single biggest compliance gap.

The risk assessment is free and takes less than ten minutes. Start with your own standing. Then evaluate whether your vendor can meet the same standard.

Glossary

| Term | Definition | |---|---| | jQuery | A legacy JavaScript library used for DOM manipulation, widely used in 2010s web development | | Bootstrap | A CSS/JS UI framework from the 2010s, still common in older healthcare platforms | | PHI | Protected Health Information — any individually identifiable health data | | HIPAA | Health Insurance Portability and Accountability Act — federal law governing health data privacy | | SOC 2 | A compliance framework for managing customer data based on five trust principles | | NIST CSF | National Institute of Standards and Technology Cybersecurity Framework | | RBAC | Role-Based Access Control — limiting system access based on user roles | | XSS | Cross-Site Scripting — a web vulnerability allowing injection of malicious scripts | | DOM Injection | A form of attack where untrusted data is inserted into the document object model | | CVE | Common Vulnerabilities and Exposures — a public database of known security flaws | | Security Theater | Superficial or performative security measures that create a false sense of protection | | Audit Log | A record of system events and user activities used for accountability and forensics |