Security & Cyber Threats
HIPAA Breach News Is Misleading: The Real Problem Is Unencrypted Patient Data
Healthcare ransomware headlines mask the real issue. Nearly every major HIPAA breach shares the same root cause: unencrypted patient data.

The headlines are telling the wrong story
Open any healthcare trade publication and the narrative is the same: ransomware gangs are terrorizing hospitals. Sophisticated nation-state actors are infiltrating health systems. Zero-day exploits are breaching electronic health records.
These stories are not wrong. But they are misleading — because they direct attention toward the attack vector while ignoring the vulnerability that makes every one of these attacks devastating. That vulnerability is unencrypted patient data.
Ransomware does not create the exposure. It exploits exposure that was already there. If patient data had been encrypted at rest and in transit, most of the breaches making headlines would have been security incidents — not reportable breaches.
The pattern the headlines miss
Look at the HHS Office for Civil Rights breach portal — what the industry calls the "Wall of Shame." Sort by the largest breaches of the last three years and read the investigation summaries. A pattern emerges almost immediately:
- Stolen laptops containing unencrypted ePHI — breach reported, patients notified
- Ransomware attacks on servers storing unencrypted databases — data exfiltrated, full notification required
- Email accounts compromised containing unencrypted PHI in message bodies and attachments — months of exposure before detection
- Cloud storage misconfigurations exposing unencrypted patient files to the public internet — no authentication, no encryption
In each case, the attack method varies. The underlying failure does not: patient data was stored or transmitted without encryption, and once an attacker gained access — through any means — the data was immediately usable.
The breach dashboard tracks these incidents in real time. Spend five minutes reviewing recent entries and count how many involve unencrypted data. The number is not subtle.
Healthcare breaches cost an average of $9.8 million per incident (IBM, 2024) — the highest of any industry. That figure is not driven by the sophistication of the attack. It is driven by the volume and sensitivity of unencrypted data that attackers access once they are inside.
Why traditional HIPAA compliance is failing
Here is the uncomfortable truth: most practices that suffer a breach were technically "HIPAA compliant" at the time. They had policies. They had completed a risk assessment at some point. They had trained their staff. They had checked the boxes.
What they did not have was encrypted data.
HIPAA does not explicitly mandate encryption. The Security Rule lists encryption as an "addressable" implementation specification — not "required." This distinction has been catastrophically misunderstood by the industry.
"Addressable" does not mean optional. It means you must either implement the specification or document why an equivalent alternative is reasonable and appropriate. In practice, there is no equivalent alternative to encryption for data at rest and in transit. The documentation exception exists for edge cases, not as a blanket opt-out.
Yet compliance vendors — particularly document-generator platforms like Compliancy Group, Abyde, and AccountableHQ — often treat encryption as a policy question rather than a technical control. They help you write a policy about encryption. They do not verify that encryption is actually implemented across your systems. And the OCR settlement record shows that policies without implementation do not protect you when a breach occurs.
This is the gap between performative compliance and actual security. A practice with perfect documentation and zero encryption is a practice waiting for a reportable breach.
The compliance-only trap
The typical compliance workflow looks like this:
- Complete an annual risk assessment (often a questionnaire)
- Generate policies from templates
- Train staff once per year
- File everything in a binder or portal
- Hope nothing happens before the next assessment
Nothing in this workflow verifies that ePHI is encrypted on workstations, laptops, servers, mobile devices, email systems, or backup media. Nothing checks that TLS is enforced on every connection transmitting patient data. Nothing monitors whether encryption keys are properly managed or whether new devices added to the network meet encryption standards.
The HIPAA compliance checklist outlines what a complete compliance program actually requires — including the technical controls that document-only platforms skip.
Encryption as the baseline
Encryption is not a silver bullet. It does not prevent phishing, social engineering, or insider threats. But it does something no other control can: it makes stolen data worthless.
The encryption safe harbor
Under the HIPAA Breach Notification Rule (45 CFR 164.402), if ePHI is encrypted in accordance with NIST standards and the encryption key has not been compromised, the data is not considered "unsecured PHI." A loss or theft of encrypted data is a security incident — but it is not a reportable breach.
This distinction is enormous:
- No patient notification required
- No media notification required (for breaches affecting 500+ individuals)
- No HHS breach report required
- No Wall of Shame listing
- Dramatically reduced enforcement risk
The safe harbor does not protect you from the incident itself. It protects you from the regulatory, financial, and reputational consequences that follow. For a small practice, the difference between a security incident and a reportable breach can be the difference between continuity and closure. An estimated 35-40% of small practices that suffer a breach close within two years.
What encryption actually requires
To qualify for the safe harbor, encryption must meet specific standards:
Data at rest — AES-128 or AES-256 encryption on all devices and media containing ePHI. This includes workstation hard drives, laptop drives, USB drives, backup tapes, server databases, and any removable media.
Data in transit — TLS 1.2 or higher for all network transmissions of ePHI. This covers email (when properly configured), web portals, API connections, VPN tunnels, and cloud service communications.
Key management — Encryption keys must be stored separately from the data they protect, with access limited to authorized personnel. Key rotation and destruction policies must be documented and followed.
Patient Protect implements AES-256-GCM encryption and enforces TLS 1.3 across the platform — exceeding the NIST minimums and qualifying for the safe harbor on every piece of data the system handles.
Why practices skip encryption
If encryption is this important, why do so many practices operate without it? The reasons are consistent:
"Our EHR handles it." Your EHR may encrypt its own database. But what about email? What about the laptop your office manager takes home? What about the spreadsheet of patient balances saved to a desktop? What about the backup drive in the server closet? EHR encryption protects EHR data. It does not protect ePHI that exists everywhere else.
"It is too expensive." Full-disk encryption is built into every modern operating system — BitLocker on Windows, FileVault on Mac. Enabling it costs nothing. TLS certificates are free through services like Let's Encrypt. The expense argument has not been valid for a decade.
"It slows things down." Modern hardware handles encryption transparently. AES encryption is built into Intel and AMD processors at the chip level. Performance impact on modern machines is effectively zero.
"Our compliance vendor said we were fine." If your compliance vendor told you encryption was optional and did not verify your encryption status, your compliance vendor sold you documentation — not protection. There is a difference, and the difference costs $9.8 million on average (IBM, 2024).
What to do right now
If you are reading this and you are not sure whether your practice data is encrypted, that uncertainty is itself a finding. Here is where to start:
- Map your data — Use the ePHI data flow mapper to identify every location where patient data exists in your environment
- Assess your risk — The free risk assessment will identify encryption gaps alongside other security findings
- Enable full-disk encryption on every workstation and laptop — today, not next quarter
- Verify TLS on every system that transmits ePHI — your EHR, email, patient portal, and cloud storage
- Check your backups — encrypted production data backed up to an unencrypted drive is still unencrypted data
The headlines will keep blaming ransomware. The settlements will keep revealing the same root cause. The practices that encrypt their data will survive both.
