SNSSimple Network Solutions
Article complete
Cybersecurity8 min readFebruary 14, 2019

The 2019 AMCA Data Breach: What Every Small Business Can Learn From Healthcare's Worst Year

2019 opened with a series of devastating healthcare data breaches — led by the AMCA collection agency attack that exposed 25 million patient records. The lessons go far beyond healthcare.

MD

Marco Delgado

Senior Cybersecurity Specialist · Simple Network Solutions

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

CybersecurityPenetration TestingHIPAA/FINRA ComplianceIncident Response
The 2019 AMCA Data Breach: What Every Small Business Can Learn From Healthcare's Worst Year

In June 2019, American Medical Collection Agency (AMCA) — a debt collection company processing medical bills for major healthcare providers including Quest Diagnostics and LabCorp — disclosed that attackers had quietly resided in their payment systems for eight months, harvesting 25 million patient records including Social Security numbers, payment card data, and medical information. The breach forced AMCA into bankruptcy. Quest Diagnostics lost $6 billion in market capitalization in a single trading day. LabCorp fell similarly. And thousands of affected patients faced years of identity theft consequences. The AMCA breach was 2019's opening act in what would become the worst year for healthcare data security on record — but its lessons apply to every small business that processes sensitive data.

What Actually Happened at AMCA

The AMCA attack was not sophisticated in the way that term is often misused. Attackers did not deploy zero-day exploits or nation-state-level techniques. They gained access to AMCA's payment web portal — likely through credential theft or an unpatched vulnerability — and then maintained persistent, quiet access for approximately eight months while the breach went undetected. During that period, every patient who made a payment through AMCA's online portal had their data harvested. The attack was not discovered by AMCA's own security monitoring. It was identified by an external cybersecurity firm that found stolen AMCA payment card data for sale on the dark web.

AMCA did not detect the breach themselves. An external firm found stolen records on criminal forums and notified them. This is the most common breach discovery scenario for small and mid-size businesses in 2019: the victim is the last to know. The average dwell time — how long attackers remain undetected — is 197 days according to IBM's 2019 Cost of a Data Breach Report.

The Third-Party Vendor Problem Every SMB Has

Get monthly IT tips for Miami businesses

No spam · Unsubscribe anytime · Practical advice only

The aspect of the AMCA breach most relevant to small businesses is what it illustrates about third-party vendor risk. Quest Diagnostics and LabCorp did not get hacked directly. Their vendor did. And that vendor's security posture — which neither healthcare company had apparently audited with any rigor — became their catastrophic liability.

Every small business has its own AMCA equivalent: the payroll software provider, the IT support company, the cloud backup vendor, the point-of-sale terminal provider. If any of those third parties is breached, your data — and your clients' data — is exposed. And in most small businesses, no one is monitoring vendor access, auditing vendor security, or even maintaining a list of which vendors have access to which systems.

  • Inventory every third-party vendor with access to your systems or data
  • Ask each vendor directly: what security certifications do you hold? How do you detect a breach? What is your notification timeline if you discover an incident affecting my data?
  • Apply the principle of least privilege to vendor access — they should only access what they need for their specific function
  • Review vendor access credentials quarterly and revoke any that are no longer actively needed
  • Check whether your cyber liability insurance covers incidents originating from a vendor breach

2019 Healthcare Breach Trends: The Full Picture

The AMCA breach was the most visible, but 2019 was a record year across healthcare. The Department of Health and Human Services breach portal logged over 500 significant healthcare breaches affecting more than 41 million patient records. The dominant attack vectors were: hacking and IT incidents (the majority), unauthorized access, and — still — theft of physical devices like unencrypted laptops.

What Small Businesses Outside Healthcare Can Apply Today

  • Implement dark web monitoring: Several managed IT providers, including SNS, include dark web monitoring that alerts you when your company's credentials appear in breach data dumps before attackers use them.
  • Enable breach detection, not just breach prevention: Most small businesses invest in perimeter security (firewalls, antivirus) but have no detection capability. EDR, log monitoring, and anomaly detection give you a chance to catch an intruder who is already inside.
  • Know your breach notification obligations: Florida's Information Protection Act (FIPA) requires notification within 30 days of discovering a breach affecting Florida residents. If you process payment data, PCI DSS has its own notification requirements. Know yours before you need them.
  • Test your incident response: When did you last simulate what you would do in the first 4 hours of a breach? Most small businesses have never done this, and the chaos of an actual incident makes every decision harder and more expensive.

Pro Tip

Simple Network Solutions offers a dark web monitoring service included in all standard managed IT contracts. We scan breach databases continuously and alert you within hours if any of your business email addresses or credentials appear in newly discovered breach data. Call (786) 383-2066 to learn more.

Free Newsletter

Stay ahead of Miami's IT threats & trends

Monthly insights written for South Florida business owners — covering cybersecurity alerts, cost-saving IT strategies, and Miami-specific technology advice.

Cybersecurity alertsCost-saving tipsMiami business focused

No spam. Unsubscribe anytime.

About the Author

MD

Marco Delgado

Senior Cybersecurity Specialist · 14 years experience

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

Marco leads cybersecurity operations at Simple Network Solutions, with 14 years of experience in network security, penetration testing, and compliance for regulated industries. He has responded to over 200 security incidents for Miami businesses and holds four active cybersecurity certifications. He regularly presents at South Florida IT security events and contributes to the FBI InfraGard Miami chapter.

Share:
Ready to Take Action

Questions? Our Miami IT team is standing by.

Turn what you just read into action. Schedule a free consultation with our local team — no sales pressure, just honest technology advice for your Miami business.