Security

Why Healthcare’s Administrative Systems Are Becoming A Prime Target For Cyberattacks

Why Healthcare’s Administrative Systems Are Becoming a Prime Target for Cyberattacks

Theft of information from healthcare providers has typically been linked to healthcare organisations themselves. However, based on the new data breach cases appearing in the industry most recently, administrative services associated with the healthcare industry have become many providers' weakest link.

For example, the data breach of the Daniel H Cook Associates reported in 2025 provides a compelling illustration of how healthcare systems, especially those of a non-clinical nature, put a tremendous amount of sensitive information at risk if those systems are compromised.

Unlike hospitals and other types of healthcare organisations, these administrative companies have not been publicly visible to patients or the healthcare community. They provide access to patients' enrolment information, claims processing, and eligibility verification, yet provide a large amount of identifying data, such as names, social security numbers, etc., on a regular basis. The fact that patients neither see nor interact with these companies makes them highly appealing targets for cyber attacks, according to cybersecurity experts.

A High-Value Layer Few Patients Ever See

Healthcare administration platforms connect employers, payers, providers, and customers. These systems gather enormous amounts of identity information without the level of diligence found in clinical settings to maintain such records.

Many companies that provide these types of services have grown rapidly due to mergers or vendor relationships, resulting in a fragmented IT system architecture. Legacy IT systems used by these providers, as well as their reliance on third parties to support an array of IT systems, leave these organizations with significant gaps that can be exploited by attackers. Therefore, unlike hospitals, healthcare administrative systems do not typically go through regular audits and regulatory review, or face a continual need to update their IT systems and infrastructure.

Breaches are more likely to go undetected for extended periods due to inadequate auditing of the access control mechanisms in place. When breaches occur, investigations usually yield evidence of multiple users gaining access to a single organization's internal network; therefore, it is easier to prevent or limit exposure from multiple accesses than from a single system breach.

Why Administrative Data Is Especially Attractive

Administrative healthcare information is an efficient commodity for attackers; one compromised system can provide access to thousands of records with stable identifiers (information that is not easily changed) and may be leveraged for fraudulent purposes (i.e., identity theft) or sold in the marketplace. Additionally, because claims administrators and benefits managers frequently interact with multiple entities, the "blast radius" tends to be larger than a single healthcare organization, meaning that when a breach occurs, there is a potential for widespread exposure of personal identifiers to each of the impacted entities and individuals.

While many of the breaches may not have involved ransomware or public service interruptions, they do illustrate how easy it can be for an unauthorized party to exfiltrate data from a company (obtaining access, copying information, then keeping the system live while removing it from the organization). This stealth approach makes it more difficult for organizations to detect and respond quickly to breaches, which may then lead to delays in notifying affected individuals and responding to the breach.

A Growing Blind Spot in Healthcare Security

Industry analysts point out that most focus in healthcare cybersecurity continues to be on frontline devices. Hospitals generally invest a lot of money into protecting their patients’ records. However, the contractual security requirements with many of their administrative vendors seem to be less strict.

There has been some attention to this issue from regulators; however, there still seems to be an inconsistency regarding the level of enforcement. Each state has different timelines for notifying affected individuals about incidents, and generally, many of these incidents only come to light when state attorneys general or federal agencies are notified a long time after the actual incident occurred.

As a result, confusion is prevalent among patients and employees when it comes to administrative cyber breaches. Often, patients and employees who are affected by an administrative cyber breach do not have any direct relationship with the administrative vendor that breached their data and may not even know the name of the company that sent them the notification letter.

Projections for the Future

Healthcare administrators will have a key role in controlling how data will be exchanged between hospitals and other healthcare facilities. In order to protect against data breaches administrators must improve their security by having better oversight, more clear accountability, and an increased awareness that the data healthcare collects goes far beyond the four walls of a hospital or clinic.

Those who receive breach notifications from administrative services that are connected to the healthcare field should familiarize themselves with how their information is stored and used. As incidents of data breaches continue to grow, this area of the healthcare system has become more visible, as well as more important for protecting individuals and patients.