The 2019 AMCA Data Breach: What Every Small Business Can Learn From Healthcare's Worst Year
2019 opened with a series of devastating healthcare data breaches — led by the AMCA collection agency attack that exposed 25 million patient records. The lessons go far beyond healthcare.
In June 2019, American Medical Collection Agency (AMCA) — a debt collection company processing medical bills for major healthcare providers including Quest Diagnostics and LabCorp — disclosed that attackers had quietly resided in their payment systems for eight months, harvesting 25 million patient records including Social Security numbers, payment card data, and medical information. The breach forced AMCA into bankruptcy. Quest Diagnostics lost $6 billion in market capitalization in a single trading day. LabCorp fell similarly. And thousands of affected patients faced years of identity theft consequences. The AMCA breach was 2019's opening act in what would become the worst year for healthcare data security on record — but its lessons apply to every small business that processes sensitive data.
What Actually Happened at AMCA
The AMCA attack was not sophisticated in the way that term is often misused. Attackers did not deploy zero-day exploits or nation-state-level techniques. They gained access to AMCA's payment web portal — likely through credential theft or an unpatched vulnerability — and then maintained persistent, quiet access for approximately eight months while the breach went undetected. During that period, every patient who made a payment through AMCA's online portal had their data harvested. The attack was not discovered by AMCA's own security monitoring. It was identified by an external cybersecurity firm that found stolen AMCA payment card data for sale on the dark web.
AMCA did not detect the breach themselves. An external firm found stolen records on criminal forums and notified them. This is the most common breach discovery scenario for small and mid-size businesses in 2019: the victim is the last to know. The average dwell time — how long attackers remain undetected — is 197 days according to IBM's 2019 Cost of a Data Breach Report.
The Third-Party Vendor Problem Every SMB Has
Get monthly IT tips for Miami businesses
No spam · Unsubscribe anytime · Practical advice only
The aspect of the AMCA breach most relevant to small businesses is what it illustrates about third-party vendor risk. Quest Diagnostics and LabCorp did not get hacked directly. Their vendor did. And that vendor's security posture — which neither healthcare company had apparently audited with any rigor — became their catastrophic liability.
Every small business has its own AMCA equivalent: the payroll software provider, the IT support company, the cloud backup vendor, the point-of-sale terminal provider. If any of those third parties is breached, your data — and your clients' data — is exposed. And in most small businesses, no one is monitoring vendor access, auditing vendor security, or even maintaining a list of which vendors have access to which systems.
- Inventory every third-party vendor with access to your systems or data
- Ask each vendor directly: what security certifications do you hold? How do you detect a breach? What is your notification timeline if you discover an incident affecting my data?
- Apply the principle of least privilege to vendor access — they should only access what they need for their specific function
- Review vendor access credentials quarterly and revoke any that are no longer actively needed
- Check whether your cyber liability insurance covers incidents originating from a vendor breach
2019 Healthcare Breach Trends: The Full Picture
The AMCA breach was the most visible, but 2019 was a record year across healthcare. The Department of Health and Human Services breach portal logged over 500 significant healthcare breaches affecting more than 41 million patient records. The dominant attack vectors were: hacking and IT incidents (the majority), unauthorized access, and — still — theft of physical devices like unencrypted laptops.
What Small Businesses Outside Healthcare Can Apply Today
- Implement dark web monitoring: Several managed IT providers, including SNS, include dark web monitoring that alerts you when your company's credentials appear in breach data dumps before attackers use them.
- Enable breach detection, not just breach prevention: Most small businesses invest in perimeter security (firewalls, antivirus) but have no detection capability. EDR, log monitoring, and anomaly detection give you a chance to catch an intruder who is already inside.
- Know your breach notification obligations: Florida's Information Protection Act (FIPA) requires notification within 30 days of discovering a breach affecting Florida residents. If you process payment data, PCI DSS has its own notification requirements. Know yours before you need them.
- Test your incident response: When did you last simulate what you would do in the first 4 hours of a breach? Most small businesses have never done this, and the chaos of an actual incident makes every decision harder and more expensive.
Pro Tip
Simple Network Solutions offers a dark web monitoring service included in all standard managed IT contracts. We scan breach databases continuously and alert you within hours if any of your business email addresses or credentials appear in newly discovered breach data. Call (786) 383-2066 to learn more.
Stay ahead of Miami's IT threats & trends
Monthly insights written for South Florida business owners — covering cybersecurity alerts, cost-saving IT strategies, and Miami-specific technology advice.
About the Author
Senior Cybersecurity Specialist · 14 years experience
CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience
Marco leads cybersecurity operations at Simple Network Solutions, with 14 years of experience in network security, penetration testing, and compliance for regulated industries. He has responded to over 200 security incidents for Miami businesses and holds four active cybersecurity certifications. He regularly presents at South Florida IT security events and contributes to the FBI InfraGard Miami chapter.
