Blog | CompassMSP

American Eyewear Manufacturer Slapped With HIPAA Penalty

Written by Melody Simpson | Mar 13, 2025 1:00:39 PM

On February 20th, 2025, the U.S. Department of Health and Human Services (HHS) Office of Civil Rights announced a 1.5 million dollar fine to Warby Parker after conducting their HIPAA cybersecurity hacking investigation. The eyewear manufacturer failed to secure customer data, leading to unauthorized access to nearly 200,000 individuals' protected health information (PHI). The investigation revealed that Warby Parker violated three key HIPAA Security Rule provisions. These included failing to conduct a thorough risk analysis, failing to implement sufficient security measures, and failing to monitor system activity. This HIPAA penalty also goes in conjunction with the updated cybersecurity protocols recently changed in 2025, requiring healthcare organizations to adjust their current stances and account for further compliance.

How the Breach Occurred

Warby Parker suffered a credential stuffing attack between September and November 2018. Hackers used previously stolen login credentials from unrelated breaches to gain unauthorized access to customer accounts.

This method exploited weak password practices, where users reused credentials across multiple platforms. The attackers accessed names, addresses, email addresses, partial payment card details, and eyewear prescriptions. Warby Parker failed to detect and mitigate the attack before significant data exposure occurred.

Warby Parker did not immediately implement stronger security controls despite encountering unusual login attempts. The company delayed action, allowing additional accounts to be compromised over time. This delay contributed to the regulatory penalties imposed by HHS.

The eyewear retailer reported additional breaches in April 2020 and June 2022, further exposing customer data. These recurring security failures demonstrate a pattern of weak cybersecurity oversight and inadequate incident response.

Key HIPAA Violations Identified

The HHS Office for Civil Rights (OCR) found Warby Parker violated multiple HIPAA Security Rule requirements. The first violation was a failure to conduct a proper risk assessment. HIPAA mandates that organizations handling PHI identify vulnerabilities and implement controls to mitigate risks.

Secondly, Warby Parker failed to implement adequate security measures. The company did not enforce multi-factor authentication (MFA) or use sufficient encryption to expose customer data. These security gaps allowed attackers to exploit login credentials and access sensitive data.

The third major violation was Warby Parker’s failure to monitor system activity regularly. HIPAA requires covered entities to review access logs and detect suspicious activity. Warby Parker could not prevent or mitigate the attack without proper monitoring before extensive damage occurred.

Regulators also noted that Warby Parker had opportunities to strengthen security following prior breaches but failed to take necessary actions. This negligence contributed to the severity of the penalty imposed by HHS.

Lessons for Healthcare Businesses Handling PHI

Organizations that handle PHI must learn from Warby Parker’s failures to avoid similar HIPAA penalties. One crucial lesson is the importance of proactive risk assessments. Identifying vulnerabilities before an attack occurs can prevent costly breaches.

Another key takeaway is the importance of implementing strong access controls, such as multi-factor authentication. Without additional authentication layers, companies remain vulnerable to credential-stuffing attacks. Regular password resets and employee training can further reduce the risk of unauthorized access.

Continuous monitoring of system activity is essential. Automated security tools can detect and flag suspicious login attempts, enabling rapid response to potential threats. Organizations should establish clear protocols for investigating and mitigating security incidents.

Another lesson is the importance of encryption. Encrypting PHI at rest and in transit ensures that attackers cannot easily read sensitive data even if attackers gain access. Companies must also maintain secure backups to recover data in case of a breach.

Finally, regulatory compliance should be a top priority. HIPAA violations result in fines and damage to a company’s reputation and customer trust. Regular security audits and compliance reviews help ensure ongoing adherence to data protection standards.

How Can Healthcare Leaders Protect Themselves from a HIPAA Penalty

Businesses handling PHI must take proactive steps to secure sensitive data and avoid HIPAA penalties. Implementing strong cybersecurity frameworks is the first line of defense against cyber threats.

  • Conduct regular risk assessments. Review security policies, conduct penetration testing, and update defenses to identify vulnerabilities before they are exploited.
  • Enforce strict access controls – Implement multi-factor authentication (MFA) across all systems and restrict access based on job roles.
  • Train employees on cybersecurity – Regular training ensures staff recognize phishing attempts, password security, and HIPAA compliance best practices.
  • Implement strong encryption – Encrypt PHI both in transit and at rest to prevent unauthorized access and maintain data confidentiality.
  • Maintain secure backups – Regularly test backup systems to ensure quick recovery in case of ransomware attacks or data loss.
  • Develop an incident response plan – Establish clear procedures for containment, investigation, and remediation of security breaches.

Finally, businesses should engage with managed cybersecurity services to ensure continuous compliance. Partnering with experts helps organizations navigate regulatory changes, improve security posture, and mitigate potential threats.

How To Strengthen Your Cybersecurity Posture and Avoid a HIPAA Penalty

Healthcare businesses must implement a multi-layered cybersecurity strategy to avoid a HIPAA penalty. The first step is conducting thorough and regular risk assessments. Identifying weaknesses before attackers exploit them is crucial for maintaining compliance.

Next, organizations should enforce strict access control policies. Multi-factor authentication (MFA) and role-based access control (RBAC) limit exposure by ensuring only authorized personnel access PHI. Enforcing password policies and educating employees on cybersecurity best practices further strengthens defenses.

Data encryption should be a standard practice. Encrypting all PHI minimizes the impact of potential breaches by rendering stolen data unreadable. Secure data backup solutions provide additional protection in case of ransomware attacks or data loss.

Continuous security monitoring and incident response planning are also essential. Businesses must deploy real-time threat detection tools and conduct regular penetration testing. A well-defined incident response plan ensures rapid mitigation of security incidents, reducing regulatory exposure.

Finally, organizations should engage in regular HIPAA compliance audits. These reviews ensure that all security measures align with regulatory requirements, preventing costly enforcement actions. Working with cybersecurity experts can help businesses navigate complex compliance landscapes.

Protect Yourself with the Right Cybersecurity Partner

Warby Parker’s HIPAA penalty underscores the financial and reputational risks of failing to secure PHI. Credential-stuffing attacks, weak access controls, and inadequate monitoring contributed to the breach and subsequent fines.

Businesses must take proactive steps to strengthen their cybersecurity defenses. Regular risk assessments, multi-factor authentication, encryption, and real-time monitoring are essential to a strong security posture. Compliance with HIPAA regulations is not optional but a critical requirement for protecting sensitive data.

Ensuring regulatory compliance can be challenging, but expert guidance simplifies the process. Our cybersecurity team helps businesses implement robust security measures to safeguard PHI and maintain HIPAA compliance. Contact us today to strengthen your defenses and avoid costly penalties.

Join Us for Our Next Webinar:

You're invited to join us on March 20th at 1 PM EST for "HIPAA 2025 Proposed Updates: What Healthcare Leaders Need to Know to Stay Compliant."