California & Washington Healthcare Providers Announce Data Breaches
Data breaches have been announced by Family Health Centers of San Diego, Totem Lake Family Dentistry, and Glendora Surgery Center.
Family Health Centers of San Diego
Family Health Centers of San Diego is sending notification letters to patients about an insider breach of their protected health information. According to the breach notification sent to the California Attorney General, Family Health Centers of San Diego discovered that one of its physicians had sent the personal and protected health information of certain patients to their personal email addresses, in violation of HIPAA and hospital policies.
The investigation confirmed that names, dates of birth, contact information, medical record numbers, and medical information had been emailed to the physician’s account. Family Health Centers of San Diego shut down the physician’s access to patient records, terminated the physician’s employment, and initiated legal action to compel the physician to destroy the emailed information. The physician has also been reported to the Medical Board of California. Family Health Centers of San Diego has offered the affected individuals a complimentary membership to a credit monitoring service for 12 months. The incident is not yet shown on the HHS’ Office for Civil Rights website, so it is unclear how many individuals have been affected.
Totem Lake Family Dentistry
Totem Lake Family Dentistry, a Kirkland, WA-based family dental practice, has notified the HHS’ Office for Civil Rights about a breach of the protected health information of 3,464 patients. According to the notification letters, suspicious activity was identified within an employee’s email account. The investigation confirmed unauthorized access to the account between May 28, 2025, and June 2, 2025. During that time, information in the account may have been viewed or copied. It has taken 11 months to review the contents of the account and mail notification letters to the affected individuals. At the time of issuing notification letters, Totem Lake Family Dentistry was unaware of any attempted or actual misuse of patient data. Credit monitoring and identity theft protection services do not appear to have been offered.
Glendora Surgery Center
Glendora Surgery Center in California has alerted patients about a data security incident that was first identified on December 3, 2025. The forensic investigation confirmed unauthorized access to its network between November 29, 2025, and December 3, 2025. During that time, files containing patient information were exfiltrated from its network. Data compromised in the incident included patient names and medical treatment information.
While data was stolen, Glendora Surgery Center is unaware of any actual or attempted misuse of that information. In response, data privacy and security policies and procedures have been reviewed, administrative and technical controls have been enhanced, and additional security training has been provided to the workforce. The HHS’ Office for Civil Rights has been notified, and a placeholder estimate of at least 501 individuals has been used. The data review is ongoing, and the total will be updated when the data review is concluded.
The post California & Washington Healthcare Providers Announce Data Breaches appeared first on The HIPAA Journal.
HIPAA—1st Cir.: First Circuit refuses to block N.D. Tex.’s order requiring production of records of youth gender-affirming care – VitalLaw.com
Demystifying the Blood Panel: Labcorp Launches HIPAA-Compliant Mobile AI Advisor – HIT Consultant
Client Alert: The Government May Actually Be Here to Help – Health Insurance Portability and Accountability Act of 1996 (HIPAA) Part VIII – JD Supra
Proposed rules would expand employer options for fertility benefits – Lockton
Verizon: Healthcare Sector Facing Sustained, Multi-vector Attacks – The HIPAA Journal
Verizon: Healthcare Sector Facing Sustained, Multi-vector Attacks
Verizon has published its 2026 Data Breach Investigations Report, which shows that the healthcare sector continues to be targeted by cybercriminal groups. The sector is having to contend with sustained multi-vector attacks, including ransomware, unpatched vulnerabilities, and human error. Regardless of the cause, the attacks are putting patient privacy, safety, and care at risk.
Verizon tracked 1,492 healthcare incidents for its 2026 report, including 1,438 confirmed data disclosures, a majority of which were due to ransomware-driven system intrusions achieved through multiple attack vectors, including the exploitation of vulnerabilities (20%), phishing attacks (14%), stolen credentials (11%), and employee errors (11%). Threat actors are being given far too big a window of opportunity to exploit known vulnerabilities. Verizon found that in 2025, only 26% of critical vulnerabilities were fully remediated, with a median time for resolution stretching to 43 days. In healthcare, where complex legacy systems are the norm, the window of opportunity is greater, giving threat actors a wide attack window.
While external actors accounted for the majority of incidents, insider breaches remain common in healthcare. Internal actors were behind 19% of breaches. As Verizon notes, human error continues to be a chronic source of breaches. The human element was involved in 54% of incidents, including misconfigurations, misdirected communications, the loss/theft of unencrypted devices, and poor cyber hygiene.
The most common human-related cause of healthcare data incidents was misdelivery, which accounted for around 40% of incidents, followed by loss incidents at around 25%, and misconfigurations at around 20%. While greater investment in cybersecurity will help to address the 81% of breaches due to external actors, security awareness training plays an important part in preventing data breaches. Employees need to be made aware of security fundamentals and be taught the importance of practicing good cyber hygiene. Social engineering was the third main cause of healthcare breaches in 2025, the majority of which were due to phishing, followed by pretexting – these attack techniques need to be covered in depth in training courses.
Around 32% of healthcare data breaches involved third parties, so applying the security fundamentals internally is only part of the solution. Healthcare organizations must also ensure that they bake security into their contracts with business associates and suppliers. The proposed update to the HIPAA Security Rule, a final rule for which is expected at some point this year, will help to reduce the number of third-party breaches through more prescriptive security requirements for business associates and requiring greater vendor oversight by covered entities to ensure that security measures are implemented.
Each year, the number of real-world security incidents analyzed by Verizon continues to increase, and this year was no exception. The report covers more than 31,000 incidents, including 22,000 confirmed data breaches. GenAI tools are increasingly used by threat actors to accelerate and increase the volume of attacks. GenAI is being used at various stages of the process, including choosing targets, researching vulnerabilities, developing malware, gaining a foothold in networks, and making their campaigns more efficient and effective.
Overall, across all sectors, system intrusions continue to be the top breach pattern, with ransomware the primary driver. Last year, stolen credentials were the top entry point, but this year, this long-standing common attack vector has been overtaken by vulnerability exploitation. This is the first time in Verizon’s 19 years of producing its DBIR reports that vulnerability exploitation has topped the list. Verizon attributes this change to the use of AI by attackers, which has helped them accelerate the time to exploit known vulnerabilities. Defenders now have far less time to remediate vulnerabilities. While the time from disclosure to exploitation used to be measured in months, vulnerabilities are now being exploited in hours.
Ransomware continues to be a key driver of intrusions. Ransomware-related intrusions grew in volume again and now account for 48% of all breaches, up from 44% last year, although the percentage of victims paying a ransom is decreasing, as is the median ransom payment. In the past year, 69% of victims chose not to pay the ransom, and the median ransom payment fell from $150,000 to $139,875.
Awareness about email phishing has grown, making this attack technique less successful. Threat actors have responded by pivoting to mobile-centric social engineering techniques such as text messages (smishing) and voice phishing (vishing), where the success rate is 40% higher than traditional email phishing. Verizon warns that the easy availability of GenAI tools is creating a significant data security risk. Employees are increasingly using genAI tools without the knowledge or approval of the IT department. The massive increase in shadow GenAI use creates a significant risk of data exfiltration through unapproved platforms. This is particularly concerning for regulated sectors such as healthcare.
“While the velocity of cyber threats—driven by AI and faster vulnerability exploitation—is increasing, the foundational principles of security and strong risk management remain the most effective defense,” said Daniel Lawson, SVP Global Solutions, Verizon Business. “The DBIR reinforces that these fundamentals still hold as organizations strive for resilience.”
The post Verizon: Healthcare Sector Facing Sustained, Multi-vector Attacks appeared first on The HIPAA Journal.