Therapy Brands is now Ensora Health

Back to resources

Behavioral health data breaches are spiking: Five steps leaders should take to safeguard their data & future 

Data breaches targeting healthcare organizations have surged in recent years. Hackers are becoming more sophisticated, specifically targeting hospitals, clinics, and systems. These attacks often focus on protected health information (PHI)—the sensitive personal data clients trust their providers to protect. 

When a breach occurs, the consequences stretch far beyond a loss of trust. Organizations face steep fines, lawsuits, revenue loss, and a damaged reputation. Breaches also disrupt operations, leading to downtime and workflow interruptions that can take weeks or months to resolve. For healthcare leaders, keeping data secure isn’t just an IT problem; it’s essential to ensuring organizational stability. 

With data breaches on the rise, what can leaders do to protect their organizations? Here’s a closer look. 

The rising tide of healthcare data breaches 

Since early 2024, healthcare providers have faced alarming cybersecurity trends. The U.S. Department of Health and Human Services recorded over 700 data breaches impacting close to 200 million individuals last year. Behavioral health providers, who handle especially sensitive data, have become key targets. 

A major example is the massive breach at Change Healthcare, discovered in February 2024. This incident, the largest healthcare breach in U.S. history, impacted up to 190 million individuals. Hackers accessed 6 terabytes of sensitive data—including Social Security numbers and medical histories. The attack disrupted payment processing across the sector, forcing providers to use personal funds to stay afloat and delaying client care for months. 

Threats like this seem to be continuing in 2025. In March of this year, Horizon Behavioral Health experienced a breach that exposed nearly 50,000 client records. The aftermath included chaos for staff, frustrated clients, and notable financial setbacks. 

Hackers often gain access through phishing scams, which trick employees into opening malicious links or attachments. Other common weaknesses include outdated systems and unpatched software. These vulnerabilities provide easy entry points for hackers to exploit. 

Why is behavioral health such a prime target? 

Behavioral health organizations are particularly appealing to cybercriminals for one key reason: the sensitive nature of their records. Medical data is valuable on the dark web because it includes comprehensive information such as Social Security numbers and financial details. However, behavioral health records take it a step further by including therapy notes, substance abuse histories, and mental health diagnoses. This level of detail makes the data useful not just for identity theft but also for blackmail or personal attacks. 

Adding to the risk, many behavioral health organizations operate with smaller budgets and limited cybersecurity resources compared to large hospital systems. They often cannot afford the tools or staffing needed to mount a robust defense. And when ransomware strikes, these facilities must choose between paying a ransom or enduring an extended operational shutdown while rebuilding their systems from scratch. Both scenarios are costly. 

How the healthcare industry is responding 

The healthcare industry is adapting to the growing threat of cyberattacks in several ways. Modern strategies go beyond traditional tools like firewalls and antivirus software and include more dynamic, robust protections. 

One of the most effective strategies is zero-trust security. This model operates on the assumption that no user, device, or system should be trusted without verification. Features like multifactor authentication (MFA) add layers of protection, requiring secondary verification—even if a password is compromised. For instance, an employee might need both a password and a phone code to access secure files, making it harder for hackers to infiltrate systems. 

Organizations are also tapping into artificial intelligence (AI) for help. AI tools monitor for unusual activity around the clock, flagging and stopping suspicious actions automatically. For example, if a staff member’s account tries to access large amounts of data at an odd time, the system can pause the activity and alert administrators before a breach occurs. 

Meanwhile, programs like the Health Industry Cybersecurity Practices (405[d]) provide free tools and resources to help organizations strengthen their cybersecurity infrastructure without significant cost. 

However, technology is only part of the solution. Employee awareness and vigilance play a huge role in effective protection. 

Five ways leaders can protect PHI – and their organizations 

Reducing vulnerability to breaches requires a proactive approach. These five steps offer practical solutions to bolster security: 

  1. Bolster staff training with phishing simulations 
    Employees are often the first line of defense. Go beyond generic cybersecurity training by implementing phishing simulations. These exercises mimic real-world attacks, helping employees recognize and respond to threats before damage is done. Consider quarterly refreshers to keep awareness high. 
  2. Implement zero-trust security across departments 
    Switch to a zero-trust model, where no user, device, or network is considered trustworthy by default. For instance, use multifactor authentication for all system access and limit permissions based on job roles. Behavioral health teams working remotely, in particular, should have restricted access to databases unless they’re using secure, organization-provided devices.
  3. Stay ahead of vulnerabilities by keeping systems updated 
    Keeping your software up-to-date is one of the simplest and most effective ways to protect against vulnerabilities. Regular updates ensure you’re running the latest security patches, which close off potential entry points for hackers.   
  4. Enhance data encryption measures 
    Sensitive client data should always be protected with encryption, whether it’s being sent or stored. Tools like TLS (Transport Layer Security) keep data safe while it’s being sent, and AES-256 (a powerful encryption method) protects data stored on devices or in databases. This way, even if hackers manage to intercept the data, it’s illegible and useless to them. 
  5. Schedule proactive penetration testing 
    Team up with external cybersecurity firms to conduct penetration testing. These “friendly hackers” simulate attacks on your system to find weak spots you might otherwise miss. Their feedback provides clear priorities for improvement without the risk of a real breach. 

Building trust in a vulnerable era 

For clinicians, every interaction with a client relies on trust. Safeguarding that trust extends beyond care delivery; it involves the responsible handling of one of the most personal aspects of their lives: their data. 

Organizations that take proactive steps to safeguard PHI not only reduce risks but also show clients that protecting their privacy is a priority. And in a field like behavioral health, where stigma still exists, the promise of confidentiality becomes even more critical. 

The spotlight is now on healthcare leaders to step up and meet the challenge. While the path forward requires investment and effort, it pales in comparison to the costs of a breach – financially, legally, and emotionally. 

The question isn’t whether you’ll face an attempted breach but whether you’ll be ready for it.