Medical Group Announces PHI Exposure Due to Unencrypted Emails

CardioFit Medical Group has discovered emails containing protected health information were inadvertently sent without encryption. Interventional Pain Center in Tennessee has identified unauthorized access to an email account containing PHI.

CardioFit Medical Group, California

CardioFit Medical Group, Inc., a California-based medical group providing acute, chronic, and preventive cardiology care, has started notifying certain patients about the exposure of some of their protected health information. The inadvertent HIPAA violation was identified on February 17, 2026, when CardioFit learned that patient information had been sent via emails that had not been encrypted. The emails were sent in January and February 2026 and were found to contain a limited amount of patient information.

Highly sensitive information such as Social Security numbers, bank account details, or credit card information was not included in the emails; however, the emails did contain names, demographic information, and in certain cases, limited clinical information such as diagnoses and health insurance information. Under HIPAA, email encryption is not mandatory when emails are sent internally, provided that alternative measures are implemented that provide an equivalent level of protection, such as a firewall. When protected health information is sent externally beyond the protection of a firewall, emails should be encrypted to prevent interception in transit and ensure that only the intended recipient can access the emails.

While patient data was exposed, there are no indications that the emails were accessed by unauthorized individuals, and no evidence has been found to indicate any misuse of the exposed information. In response to the breach, CardioFit has conducted a review of its privacy and security practices and has strengthened its procedures related to email encryption. CardioFit has also provided additional training to its staff to prevent similar incidents in the future. Notification letters were sent to the affected individuals on or around April 10, 2026. The data breach is not currently shown on the HHS’ Office for Civil Rights website, so it is unclear how many individuals have been affected.

Interventional Pain Center, Tennessee

Interventional Pain Center, a network of pain management centers in Tennessee, has identified unauthorized access to an employee’s email account that contained the personal and protected health information of 3,171 individuals. The incident was detected on December 11, 2025, and the forensic investigation confirmed that the unauthorized access was limited to a single email account, which was compromised between December 1, 2025, and December 11, 2025.

The account was reviewed to determine the types of information contained in the account and to whom it related. On or around March 17, 2026, Interventional Pain Center confirmed that the account contained files and emails that included names, addresses, zip codes, dates of birth, Social Security numbers, driver’s license numbers, medical histories, diagnoses, condition information, treatment information, prescription information, treating physician names, and health insurance information.

Interventional Pain Center secured the account to prevent further unauthorized access and has implemented additional safeguards to prevent similar incidents in the future, including enhancing its email security and monitoring controls, and providing additional training to the workforce. At the time of issuing notifications, Interventional Pain Center had found no evidence to suggest any of the exposed information had been misused.

The post Medical Group Announces PHI Exposure Due to Unencrypted Emails appeared first on The HIPAA Journal.

Free Webinar: How to Stop Phishing Attacks Before They Reach Your Team

webinar - how to stop healthcare phishing attacksPhishing has long been a leading cause of healthcare data breaches. Hackers target employees as they are a weak link in the security chain, and many healthcare ransomware attacks start with credentials stolen in phishing attacks.

Phishing attacks are often blamed on the employees who respond to phishing attempts. A survey of healthcare IT leaders found 85% of respondents believe employee negligence is a top email security risk, yet despite that, only 16% of respondents said they train their workforce on how to recognize phishing attempts quarterly or more frequently. The majority of healthcare organizations only provide training to their workforce once a year, and hope that the training sticks and employees will remain vigilant throughout the year, which is seldom the case.

Unfortunately, the risk from phishing is getting worse as AI-generated phishing campaigns are difficult for employees to identify. AI-generated phishing emails are grammatically correct, free of spelling mistakes, and use advanced impersonation techniques. An analysis of phishing emails by KnowBe4 between late 2024 and early 2025 found that 83% of phishing emails were AI-generated.  Not only is AI-generated phishing outpacing training programs, the phishing emails also bypass traditional email spam filters. Further, Paubox research shows that when employees do identify phishing attempts, only 5% of attacks are reported to the security team! If you rely on employee training and a traditional email filter, your organization is at risk.

In this free webinar on April 28, 2026, discover why phishing defenses are failing and how you can improve your security posture and block attacks before they reach your team. The webinar is aimed at IT directors, CISOs, security leaders responsible for email infrastructure, compliance officers managing HIPAA email requirements, healthcare administrators who oversee PHI-handling workflows, and security teams weighing whether current controls match current threats.

Webinar attendees will learn about:

  • The evolution of AI-generated phishing and BEC attacks and why they bypass defenses
  • Why healthcare organizations are targeted
  • The findings of a Paubox analysis of 170 email-related data breaches in 2025 and common authentication gaps
  • How the “training plus spam filter” model leaves measurable security gaps
  • How inbound email security at the technical layer catches what training and traditional filters miss
  • How to assess where your organization’s email security actually stands today

WEBINAR DETAILS

How to Stop Phishing Attacks Before They Reach Your Team

Tuesday, April 28, 2026

10 a.m. PT | 11 a.m. MT | 12 p.m. CT | 1 p.m. ET | 6 p.m. BST

Register for the Webinar


Speaker: Dawn Halpin, Demand Generation Manager, Paubox

Dawn Halpin, Paubox

Dawn Halpin, a Marquette University and University of Wisconsin-Milwaukee graduate, is the Demand Generation Manager at the email security firm Paubox. Paubox is a leader in HIPAA-compliant email security for the healthcare industry and is trusted by more than 8,000 organizations, including Cost Plus Drugs, Rippling, and Covenant Health.

The post Free Webinar: How to Stop Phishing Attacks Before They Reach Your Team appeared first on The HIPAA Journal.