25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

June 2024 Healthcare Data Breach Report

In June 2024, 47 data breaches of 500 or more healthcare records were reported to the HHS’ Office for Civil Rights (OCR), the fewest number of breaches since October 2023. Data breaches were down 9.6% from May 2024, and 30.9% down from June 2023, and were well below the 12-month average of 64 data breaches a month.

Healthcare data breaches in the past 12 months - June 2024

healthcare data breaches in June (2020-2024)

For the second consecutive month, the number of breached records has fallen. Across the 47 breaches reported in June, the protected health information of 3,837,356 individuals was exposed, stolen, or impermissibly disclosed.

Breaches healthcare records in the past 12 months - June 2024

June’s compromised record total is the second lowest monthly total in 2024, 54.7% lower than May 2024, and well below the 12-month average of 11,637,320 breached records a month. It is likely to be a very different story next month, as Change Healthcare will be mailing breach notification letters to the individuals affected by its February 2024 ransomware attack from July 20, 2024, which means OCR will soon be notified about the extent of the breach. The CEO of Change Healthcare’s parent company, UnitedHealth Group, told a senate hearing that the breach is likely to affect as many as 1 in 3 Americans – up to 113,000,000 individuals.

healthcare records breached in June (2020-2024)

Largest Healthcare Data Breaches in June 2024

The largest data breach of the month was reported by the Pennsylvania health system Geisinger and involved the protected health information of 1,276,026 individuals. Unusually, for such a large data breach, it was not a hacking incident or ransomware attack. Geisinger discovered that a former employee of a business associate had accessed patient records after being terminated. The business associate failed to terminate the employee’s access rights before terminating the employee.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Lurie Children’s Hospital reported the biggest hacking incident of the month – a ransomware attack involving the theft of the protected health information of 775,860 current and former patients. The attack caused considerable disruption and resulted in the electronic health record (EHR) system being offline for months. The attack occurred in January, but the hospital was not able to restore the EHR until May. Lurie Children’s refused to pay the ransom as there was no guarantee that the data would be returned. The threat group behind the attack claimed to have sold the stolen data.

The Minnesota radiology services company, Consulting Radiologists, also reported a major breach involving the protected health information of 583,824 patients. Few details have been disclosed about the attack, other than it being a hacking incident with possible data theft. Two eye care providers reported ransomware attacks that each affected more than 300,000 patients. Panorama Eyecare’s incident occurred a year previously, with the LockBit ransomware group stealing patient data in May 2023, and Texas Retina Associate’s attack was detected in March 2024; however, the Monto ransomware group had access to its network since October 2023.

Financial Business and Consumer Solutions suffered a breach that was reported to OCR as involving the protected health information of 117,567 individuals. The breach also affected some clients that were not HIPAA-covered entities, as the breach was initially reported to the Maine Attorney General as involving the personal information of 1,955,385 individuals. As the investigation progressed it became clear that the breach was far worse. The Maine Attorney General has now been informed that the breach has affected 4,050,711 individuals. It is currently unclear if any of the additional 2,095,326 individuals were patients of its HIPAA-covered entity clients.

Name of Covered Entity State Covered Entity Type Individuals Affected Type of Breach
Geisinger PA Healthcare Provider 1,276,026 Former employee of a business associate accessed patient data after being terminated
Ann & Robert H. Lurie Children’s Hospital of Chicago IL Healthcare Provider 775,860 Ransomware attack with data theft – ransom not paid
Consulting Radiologists LTD. MN Healthcare Provider 583,824 Hacking incident with potential data theft
Panorama Eyecare CO Healthcare Provider 377,911 Ransomware attack with potential data theft
Texas Retina Associates TX Healthcare Provider 312,867 Ransomware attack with potential data theft
Financial Business and Consumer Solutions, Inc. PA Business Associate 117,567* Hacking incident with potential data theft
Signature Performance, Inc. NE Business Associate 106,540 Hacking incident with potential data theft. Also involved the data of 70,000 Adventist Health Tulare patients
County of Los Angeles Department of Health Services CA Healthcare Provider 41,444 Phishing attack involving 53 compromised email accounts
Radiology and Imaging Specialists FL Healthcare Provider 37,210 No information is available other than a hacking/IT incident involving email
The Mount Kisco Surgery Center LLC d/b/a The Ambulatory Surgery Center of Westchester NY Healthcare Provider 22,139 Compromised employee email account
Aptihealth, Inc. NY Healthcare Provider 19,805 Hacking incident at a business associate (Sisense) with potential data theft
Wisconsin Department of Health Services WI Healthcare Provider 19,150 Accidental disclosure of patient data via email by a business associate
Neurobehavioral Medicine Consultants, P.C. OH Healthcare Provider 18,182 Hacking incident with potential data theft
The Lash Group, LLC PA Business Associate 15,196 Hacking incident with potential data theft affecting Cencora and The Lash Group. The breach was reported to OCR separately by AmerisourceBergen Specialty Group as affecting a total of 255,316 individuals
Insurance ACE/Humana Inc. KY Health Plan 15,003 Unauthorized disclosure of paper records
Kairos Health Arizona, Inc. AZ Business Associate 14,364 Unauthorized access to patient data by a former business associate
SkinCure Oncology IL Business Associate 13,434 Multiple email accounts accessed by an unauthorized individual
Memorial Sloan Kettering Cancer Center NY Healthcare Provider 12,274 Multiple email accounts compromised in a phishing attack

Data Breach Causes and Location of Compromised PHI

There was an 18% month-over-month fall in the number of reported hacking incidents, although even with the reduction, hacking incidents continue to outnumber all other data breach causes. Hacking accounted for 68% of the reported large data breaches in June and 65.5% of the month’s breached records. In total, 2,512,792 records were compromised in hacking and other IT incidents. On average, hacking incidents involved the protected health information of 45,562 individuals with a median data breach size of 6,419 records.

causes of June 2024 healthcare data breaches

12 unauthorized access/disclosure incidents were reported in June, one more than in May; however, there was a 2,138% month-over-month increase in the number of records exposed in these incidents due to a massive insider breach at a business associate of Geisinger. Across the 12 incidents, the records of 1,319,305 individuals were impermissibly accessed or disclosed. The average breach size was 109,942 records and the median breach size was 1,648 records. Two theft incidents were reported that involved the protected health information of 4,018 individuals, one involving a stolen laptop and the other stolen paper records, and there was 1 improper disposal incident involving the protected health information of 1,241 individuals.

The most common location of breached protected health information was network servers. HIPAA Security Rule compliance can make it much harder for hackers to breach networks; however, many breaches occur at HIPAA-regulated entities that have implemented robust cybersecurity defenses. This week, healthcare CISSP, Josh Ablett, shared his views with readers of the HIPAA Journal about the importance of conducting cyber fire drills and how they can reduce the stress on staff following a successful cyberattack and shorten the recovery time. Email was the next most common location of breached protected health information. Email-related breaches are among the easiest to prevent. This month we have highlighted some of the most common ways that email is involved in HIPAA violations.

Location of PHI in June 2024 healthcare data breaches

Where did the Data Breaches Occur?

The OCR breach portal lists data breaches by the reporting entity. In June 2024, 34 breaches were reported by healthcare providers involving 3,538,078 records. The mean breach size was 104,061 records and the median breach size was 3,029 records. 7 breaches were reported by health plans involving 25,905 records, with a mean breach size of 3,701 records and a median breach size of 1,867 records. Business associates reported 6 breaches involving 273,373 healthcare records, with a mean breach size of 45,562 records and a median breach size of 14,780 records.

Under HIPAA, it is ultimately the responsibility of each covered entity to ensure that data breaches are reported to OCR and individual notifications are sent, so some HIPAA-covered entities report breaches when they actually occurred at one of their business associates. Each month, the HIPAA Journal determines where the breach occurred to better reflect the number of data breaches occurring at business associates. The adjusted data has been used for the pie charts below.

Healthcare data breaches at HIPAA-regulated entities in June 2024

Records breached at HIPAA-regulated entities in June 2024

Geographical Distribution of Healthcare Data Breaches

HIPAA-regulated entities in 24 states reported breaches of 500 or more healthcare records in June 2024, with New York and Pennsylvania the worst affected states with five reported data breaches in each state; however, there was a considerable difference in the number of compromised records. In New York, 59,945 records were breached across those 5 incidents whereas the Pennsylvania data breaches affected 1,416,019 individuals.

Illinois was also badly affected, and while only experiencing 2 daya branches, the records of 789,294 individuals were compromised. There was only one reported breach in Minnesota, Colorado, and Texas, but they were all major incidents, affecting 583,824 individuals, 377,911 individuals, and 312,867 individuals respectively.

State Breaches
New York & Pennsylvania 5
Massachusetts & Ohio 4
Georgia 3
California, Connecticut, Florida, Illinois, Michigan, Nebraska & Oregon 2
Alabama, Arizona, Arkansas, Colorado, Iowa, Kansas, Kentucky, Maine, Minnesota, New Mexico, Texas & Wisconsin 1

HIPAA Enforcement Activity in June 2024

OCR did not announce any HIPAA enforcement actions in June; however, the California Attorney General agreed to settle potential violations of HIPAA and state laws with two HIPAA-regulated entities, Blackbaud and Adventist Health Hanford.

California Attorney General Rob Bonta announced that a $6.75 million settlement had been agreed with the South Carolina-based data management software provider Blackbaud, to resolve violations of HIPAA and California’s consumer privacy and data protection laws. Blackbaud was investigated over a cyberattack that was disclosed in May 2020. Hackers had access to its systems for 3 months before the breach was detected.

The investigation confirmed that Blackbaud had not implemented appropriate security measures and did not follow standard security practices.  Blackbaud stored large amounts of sensitive data, retaining sensitive data when there was no longer any legitimate business purpose for retention, was not properly monitoring for suspicious activity within its systems, was not keeping up to date on security standards, and had not implemented multifactor authentication. In addition to the financial penalty, Blackbaud is required to implement robust data security improvements to reduce the risk of further cyberattacks.

The California Attorney General also announced a settlement with Adventist Health Hanford to resolve alleged unauthorized disclosures of patient data to law enforcement without a warrant. The allegations relate to two patients who had stillbirths at the hospital, who had their medical information disclosed to law enforcement about their alleged drug use. Adventist Health maintained that there was no wrongdoing but agreed to settle with the state and pay a nominal financial penalty of $10,000.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist