Michael R. Schwartz MD Data Breach: 9,080 Patients Affected in Hacking
Breach Details
Michael R. Schwartz MD Data Breach: 9,080 Patients Affected in Desktop Computer Hack
A California medical practice has reported a significant data breach to federal authorities after discovering unauthorized access to their computer systems. Michael R. Schwartz, MD Inc., a healthcare provider in California, disclosed that 9,080 patients may have had their sensitive information compromised in a hacking incident that occurred in August 2025.
What Happened
On August 25, 2025, Michael R. Schwartz, MD Inc. discovered that an unauthorized party had gained remote access to one computer within their office network. The breach involved a desktop computer that contained patient information, marking this as a classic example of how cybercriminals target healthcare providers' IT infrastructure.
The practice took nearly two months to complete their investigation and notify affected individuals, sending breach notification letters on October 23, 2025. This same date marked when the practice reported the incident to the U.S. Department of Health and Human Services (HHS) and the California Attorney General, as required under HIPAA breach notification rules.
Who Is Affected
The breach impacted 9,080 individuals whose personal and medical information was stored on the compromised desktop computer. All affected patients are receiving direct notification through mailed letters, as mandated by HIPAA regulations for breaches affecting 500 or more individuals.
California residents affected by this breach are receiving detailed information about the specific types of sensitive information that may have been compromised, though the exact categories have not been publicly disclosed in available documentation.
Breach Details
This incident represents a hacking/IT incident classification under HHS breach reporting categories. The attack specifically targeted a desktop computer within the practice's network, highlighting the vulnerability of endpoint devices in healthcare environments.
Key timeline details include:
- August 25, 2025: Practice becomes aware of unauthorized access
- October 23, 2025: Breach notification letters mailed to patients
- October 23, 2025: Incident reported to HHS and California Attorney General
The practice's response to the breach was comprehensive, involving multiple security measures to prevent future incidents. After detecting the breach, Michael R. Schwartz, MD Inc. took decisive action by replacing all office computers and servers, demonstrating the severity of the compromise and the practice's commitment to securing patient data.
Practice Response and Security Measures
Following the discovery of the breach, the practice implemented several important security measures:
- Complete Infrastructure Replacement: All office computers and servers were replaced, indicating either extensive compromise or a precautionary measure to ensure complete security
- Cybersecurity Expert Engagement: Professional cybersecurity specialists were brought in to assess and secure the practice's systems
- Law Enforcement Notification: The incident was reported to appropriate law enforcement agencies
- Credit Monitoring Services: Affected patients are being provided with 12 months of complimentary credit monitoring services
What This Means for Patients
Patients affected by this breach face potential risks associated with the exposure of their personal and medical information. While the specific types of data compromised have not been publicly detailed, typical healthcare breaches may involve:
- Names and contact information
- Social Security numbers
- Medical record numbers
- Health insurance information
- Medical diagnoses and treatment information
- Financial account details
The provision of 12 months of credit monitoring services suggests that financially sensitive information may have been involved, as this service helps detect unauthorized use of personal information for fraudulent financial activities.
How to Protect Yourself
If you are a patient of Michael R. Schwartz, MD Inc., take these important steps:
- Watch for Notification Letters: All affected patients should receive mailed notification letters with specific details about their exposure
- Enroll in Credit Monitoring: Take advantage of the free 12-month credit monitoring service being offered
- Monitor Financial Accounts: Regularly review bank and credit card statements for unauthorized transactions
- Check Credit Reports: Obtain free annual credit reports from all three major credit bureaus
- Consider Credit Freezes: Place security freezes on credit reports to prevent unauthorized account openings
- Stay Alert for Phishing: Be cautious of unexpected emails or calls requesting personal information
- Monitor Medical Benefits: Review explanation of benefits statements from health insurers for services you didn't receive
Prevention Lessons for Healthcare Providers
This breach offers several critical lessons for healthcare organizations:
Endpoint Security is Critical
The compromise of a single desktop computer led to a breach affecting over 9,000 patients. Healthcare providers must implement robust endpoint protection, including:
- Advanced anti-malware solutions
- Regular security updates and patches
- Network segmentation to limit breach scope
- Multi-factor authentication for all systems
Rapid Response Planning
While the practice's response was comprehensive, the two-month gap between discovery and notification highlights the importance of having incident response plans that enable faster breach assessment and notification.
Infrastructure Security
The decision to replace all computers and servers demonstrates how a single compromised device can necessitate organization-wide security overhaul. Preventive measures are far more cost-effective than post-breach remediation.
Professional Support
Engaging cybersecurity experts and notifying law enforcement shows the importance of having established relationships with security professionals before incidents occur.
Regulatory Compliance and Reporting
This incident demonstrates proper HIPAA breach notification compliance, with the practice meeting their obligations to:
- Notify affected individuals within 60 days of breach discovery
- Report to HHS within 60 days for breaches affecting 500+ individuals
- Notify state attorneys general as required by state law
The breach now appears on the HHS "Wall of Shame," serving as a public record of the incident and reinforcing the importance of robust cybersecurity measures in healthcare.
Looking Forward
As cyber threats continue to evolve, healthcare providers must remain vigilant about protecting patient data. This incident at Michael R. Schwartz, MD Inc. serves as a reminder that even small practices can be targets for cybercriminals and that comprehensive security measures are essential for all healthcare organizations, regardless of size.
The practice's thorough response, including infrastructure replacement and professional security assistance, provides a model for how healthcare providers should respond to significant security incidents. However, the best approach remains prevention through robust security measures and ongoing staff training.
Protect your practice with AI-powered HIPAA compliance. Get started with HIPAA Agent.
Could this happen to your practice?
Most breaches on the Wall of Shame were preventable with proper HIPAA compliance measures. Get AI-powered protection before it is too late.
Related Breaches
Stay Off the Wall of Shame
Get continuous HIPAA compliance monitoring, automated risk assessments, and breach prevention tools.
Get Protected NowView Plans & Pricing