Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect

Free · Ungated · Updated nightly

The most comprehensive free healthcare threat intelligence system ever built.

3,623 incidents. 4.2B individuals affected. 7 federal, regulatory, and community sources unified into twelve analytical views. No login. No subscription.

No account required · Opens immediately

3,623

Threat incidents indexed

Updated nightly

4.2B

Individuals affected

All-time total

7

Data sources unified

Federal + community

12

Analytical views

Exec → predictive

Intelligence views

Twelve analytical views. One intelligence system.

From executive summary to predictive modeling to attack chain visualization — every view is built for independent practices that need to understand their threat environment, not just receive a compliance score.

Executive Brief

Your daily threat summary — overall risk score, key metrics, and actionable alerts.

Risk score updated daily

Threat Landscape

All incidents across all sources, timeline, breakdown by vector, source, and entity type.

188% increase vs prior period

Entity Intelligence

Risk-ranked directory of every healthcare entity with incident histories and relationship networks.

Top entity risk score: 98/100

Incident Explorer

Searchable, sortable table of every threat record. Export to CSV for compliance documentation.

Full dataset · exportable

Geographic Map

Choropleth heat map with incident markers across all 50 states — all 7 sources visible simultaneously.

All US states covered

Risk Forecasting

Statistical projection of future incident volume with 95% confidence band and anomaly detection.

0.3 incidents/month trend rate

Attack Chains

Sankey diagram: source → vector → entity type → severity outcome.

71 unique vectors mapped

HIPAA Scorecard

Compliance performance metrics tied to real breach outcomes.

Enforcement Tracker

OCR resolution agreements, civil money penalties, and corrective action plans linked to breaches.

Benchmarking

Your region and entity type compared to national averages.

Definitions

Full glossary — scoring methodology, source descriptions, threat classifications, vector definitions.

System Health

Data freshness, source status, last update timestamps per source.

Data integrity

Seven sources. One unified intelligence layer.

01

HHS OCR Breach Portal

Federal breach reporting for incidents affecting 500+ individuals. The mandatory disclosure standard for HIPAA-covered entities.

02

State Attorney General Offices

State-level breach notifications that frequently surface weeks before federal reporting. Currently tracking all 50 states.

03

OCR Enforcement Actions

Office for Civil Rights resolution agreements, civil money penalties, and corrective action plans tied to HIPAA violations.

04

FTC Enforcement Actions

Federal Trade Commission proceedings against entities handling health data outside HIPAA jurisdiction.

05

CISA Vulnerability Advisories

Critical infrastructure security advisories relevant to healthcare systems.

06

Patient Protect Network

Threat observations from healthcare security professionals and practice managers across the Patient Protect network.

07

Modeled Threat Signals

AI-derived risk indicators synthesized from cross-source pattern analysis, anomaly detection, and trend modeling.

Every source is visible simultaneously. The Geographic Map color-codes incident markers by data source — so you can see, at a glance, whether a regional threat cluster is driven by federal reporting, state AG action, or community intelligence.

Editorial coverage · From our partner publication

Latest HIPAA Pulse coverage.

Editorial reporting on the breaches and enforcement actions in the dashboard above. Each story is paired with a Patient Protect operational response.

View all on HIPAA Pulse

HIPAA Pulse is the editorial publication of Patient Protect. PP’s HIPAA Response translates each story into operational guidance.

State-level intelligence

Find your state.

Breach incident counts, top attack vectors, affected entities, notification deadlines, and AG reporting requirements — unique data for every US state.

What makes this different

Capabilities no other free platform offers.

Breach Intelligence
Attack Chains Sankey diagram showing threat flow from source through vector to entity type and severity outcome

Attack chain visualization

See exactly how threats flow from source to outcome.

The Attack Chains view traces every incident from its intelligence source through attack vector to entity type and severity outcome — revealing the most exploited pathways in real time.

Every unique attack vector mapped live

Top attack paths identified automatically

Dominant-vector clusters highlighted

The #1 attack vector is Hacking/IT Incident. See how Patient Protect addresses it.

Breach Intelligence
Risk Forecasting linear regression chart with 95% confidence band and anomaly detection

Predictive analytics

Know what’s coming. Not just what happened.

Risk Forecasting uses linear regression with R² confidence scoring and anomaly detection to project future incident volume. The threat surface is growing — the dashboard shows you exactly how fast.

Incident trend rate computed from 90-day average

Next-quarter projection with confidence band

Anomalous spikes flagged automatically

See how these projections relate to your practice. Take the free risk assessment.

Breach Intelligence
Entity Intelligence risk-ranked directory showing healthcare entities with incident histories and relationship networks

Entity risk rankings

Your vendors are in this database. So is your exposure.

Entity Intelligence ranks every healthcare organization by incident frequency, severity, and individuals affected. If you share data with any entity in this system, their risk score is part of your risk profile. A single compromised vendor can cascade across every connected entity.

Risk scores computed from live incident data

Repeat offenders flagged with trend velocity

Relationship network shows threat propagation

If a vendor breach exposes you, Patient Protect keeps your BAA documentation ready. See BAA management.

No gates · No signup · No cost

Every view. Every source. Free forever.

Enterprise threat intelligence platforms price these capabilities for organizations with dedicated security budgets. Patient Protect provides them at no cost because independent practices deserve the same threat visibility as hospital systems — regardless of budget.

From intelligence to action

Knowing the threat landscape is step one. Protecting your practice is step two.

The breach dashboard shows you the threat environment. Patient Protect gives you the controls to stay out of it — risk assessment, policy management, vendor tracking, and continuous compliance monitoring. Starting at $39/month.

14-day free trial · No charge until trial ends

Live dashboard

Explore the full intelligence system.

Before you access the dashboard

The Breach Intelligence Dashboard aggregates data from publicly available federal, regulatory, and community sources. By accessing this tool, you agree to the following:

Data Disclaimer

This data is provided “as-is” for informational and educational purposes only. It does not constitute legal, compliance, or professional advice. Certain records are algorithmically modeled from news sources and labeled accordingly. Patient Protect makes no warranties regarding accuracy, completeness, or timeliness. Inclusion of any entity does not imply wrongdoing. You are solely responsible for independently verifying information before relying on it.

Intellectual Property Agreement

The dashboard's aggregation methodology, scoring algorithms (Severity Score, Source Confidence, Overall Risk Score, Entity Risk Score), threat classification system, and analytical views are proprietary to Patient Protect LLC. Automated scraping, bulk export for commercial purposes, redistribution, and use in competitive products is prohibited. Use is subject to Patient Protect's Terms of Use and IP Policy.

Acceptance is stored locally for 30 days. No account required.

Subscribe to breach intelligence

Get the breaches that matter to your practice — delivered every other Wednesday.

HIPAA Pulse digests breach activity, OCR enforcement, and regulatory moves into one editorial briefing. Free, no spam, unsubscribe anytime — same intelligence powering this dashboard.

Every other Wednesday · Free · Unsubscribe anytime

FAQ

Common questions about breach intelligence.

Is this dashboard really free with no account required?

Yes. No login, no subscription, no trial period. Open it directly at patient-protect.com/breachdash. All twelve views are accessible immediately.

Where does this data come from?

Seven sources: the HHS OCR Breach Portal, State Attorney General notifications from all 50 states, OCR Enforcement actions, FTC enforcement actions, CISA vulnerability advisories, Patient Protect network intelligence, and AI-modeled threat signals. Each source is identified in the dashboard by color code.

How current is the data?

Updated nightly. HHS OCR and State AG data is ingested every night. The timestamp in the dashboard header shows the exact last update time for each source.

Can I export data from the dashboard?

Yes. The Incident Explorer view supports CSV export of all records for compliance documentation, audit reporting, and custom analysis.

How is this different from the HHS OCR breach portal?

The HHS OCR portal shows you one source. This dashboard aggregates seven — including State AG notifications that often appear weeks before federal disclosure, FTC enforcement for non-HIPAA entities, CISA vulnerability advisories, and predictive models. It also adds analytical views — risk forecasting, attack chain visualization, entity risk rankings — that the federal portal doesn’t provide.

Why does breach intelligence matter for my practice?

Independent practices are the fastest-growing target for healthcare cyberattacks — attacks on small providers have increased 6× since 2021. Understanding which breach types and attack methods are trending helps you prioritize the controls that actually prevent incidents at your practice.

What are modeled breaches?

Modeled breaches are AI-derived threat signals synthesized from patterns across all seven data sources. When the system detects anomalous clustering — unusual frequency, vector similarity, or geographic correlation — it generates modeled signals that flag emerging threats before they appear in official reporting.

Is this included in my Patient Protect subscription?

The breach intelligence dashboard is free and open to everyone — no subscription required. Patient Protect subscribers get additional capabilities including practice-specific risk scoring, custom alerts, vendor monitoring, and integration with their compliance workflow.

Data Disclaimer+

The information provided through this dashboard is aggregated from publicly available sources, including but not limited to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) Breach Portal, OCR Resolution Agreements, Federal Trade Commission (FTC) health breach notifications, state Attorney General breach notification databases, the Cybersecurity and Infrastructure Security Agency (CISA) advisories, and curated news reporting. Certain records are algorithmically modeled or AI-derived from news sources and are clearly labeled as such; these “modeled” entries represent projections based on public reporting and have not been confirmed by any regulatory authority.

This data is provided “as-is” for informational and educational purposes only and does not constitute legal, compliance, medical, financial, or professional advice. Patient Protect makes no representations or warranties, express or implied, regarding the accuracy, completeness, timeliness, reliability, or suitability of the data for any particular purpose. Source records may contain errors, omissions, delays, or inaccuracies originating from the underlying publishers, and may be updated, corrected, or withdrawn at any time without notice.

Inclusion of any organization, individual, incident, or enforcement action in this dataset does not imply wrongdoing, liability, guilt, non-compliance, or any adverse determination. References to specific entities reflect publicly reported information and should not be interpreted as an endorsement, accusation, or characterization by Patient Protect.

Users are solely responsible for independently verifying any information before relying on it for decision-making, regulatory reporting, business operations, journalism, research, or legal proceedings. Patient Protect, its affiliates, officers, employees, contributors, and data providers disclaim all liability for any direct, indirect, incidental, consequential, or punitive damages arising from the use of, reliance on, or inability to use this data.

Use of this dashboard is subject to applicable laws, the terms of service of original data sources, and Patient Protect's Terms of Use. Redistribution, resale, or commercial use may require separate authorization.

If this data hits close to home

Response guides for when it happens to your practice.