Newsletter Subscribe
Enter your email address below and subscribe to our newsletter

You go to the mailbox expecting the usual mix of grocery store circulars, credit card offers, and maybe a nice card from your grandkids. Instead, you find a very serious-looking letter from a company whose name you vaguely recognize.
The letter uses a lot of formal, soothing corporate jargon like “security incident,” “unauthorized access,” and “out of an abundance of caution.” Translated from corporate PR-speak into plain English, this means: “We accidentally left the digital back door wide open, and internet raccoons got into the filing cabinets.”
If this has happened to you, take a deep breath. You are not alone, and it’s entirely not your fault. We tend to panic when we hear about hackers, immediately assuming they are draining our checking accounts to buy luxury yachts. But in the modern digital age, your health data is actually worth far more to hackers on the dark web than your credit card number.
Why? Because while a stolen credit card can be canceled with one phone call, your medical history—your birthdate, your health conditions, your insurance details—cannot be easily changed. Hackers use this information to commit medical identity theft, which can be a massive headache if you don’t know what to look out for.

Before we put on our detective hats, we need to understand a massive blind spot in the medical tech world. Most of us have heard of HIPAA. It’s the law that makes your doctor’s office treat your medical chart like it contains the nuclear launch codes.
The information your doctor holds is called Protected Health Information (PHI). If a hospital gets hacked, HIPAA ensures that the government gets involved immediately, and you get notified by law.
But what about that fancy new smartwatch your daughter bought you to track your heart rate? Or the medication reminder app you downloaded to your smartphone to keep track of your daily pills?
Here is the “aha” moment: Much of the data floating around in consumer wearable tech and care apps is not protected by HIPAA. You are relying entirely on the app developer’s internal security to keep your data safe. When a breach happens here, the rules are different, which is why you have to be your own advocate.
So, you just found out your health app or wearable device was caught up in a data breach. Resist the urge to toss your smartphone into the nearest body of water. Instead, follow this simple 24-hour response plan.
First, immediately change the password for the app or device that was breached. If you use that same password for your email or bank account (and let’s be honest, many of us are guilty of password recycling), change those too.
Second, set up strong auth on your important accounts. This is just a fancy way of saying “Two-Factor Authentication.” It means that even if a hacker guesses your password, they can’t get in without also having physical access to your cell phone to receive a special text message code.
Finally, place a free fraud alert on your credit reports with Equifax, Experian, or TransUnion. Even if it was just a sleep-tracking app that was hacked, hackers are clever. They combine your health app data with other public information to try and pry open your financial accounts.

Sometimes, you won’t get a letter right away. App companies can be notoriously slow at admitting they messed up. So, how do you spot an “invisible” breach where your wearable health data has fallen into the wrong hands?
You look for scammers using your health data against you. Hackers love to sell specific health habits to phone scammers. These scammers then call you up, pretending to be from Medicare or your insurance company.
Because the scammer knows you recently tracked a heart condition on your smartwatch, or that you use an app for diabetes management, they sound incredibly legitimate. They’ll use this highly specific knowledge to try and con you out of your Social Security Number. Rule of thumb: If someone calls you unprompted knowing your specific health details, hang up and call your doctor or insurance provider directly.
If your health data has been compromised, the absolute best tool in your defense arsenal is your Medicare Summary Notice (MSN). This is the statement that comes in the mail every three months detailing the services Medicare paid for on your behalf.
Most of us glance at the MSN, confirm we don’t owe any money, and promptly throw it in a filing cabinet to gather dust. But if a hacker has stolen your medical identity, the MSN is where their crimes will show up.
You need to audit this document like a detective looking for clues. Check for “Phantom Services.” Look at every date, every doctor, and every piece of medical equipment listed. If your MSN says you received a brand-new motorized wheelchair in North Dakota last Tuesday, and you live in Florida and walk just fine, your medical identity has been compromised.

So, if HIPAA doesn’t protect your Fitbit or your diet-tracking app, who does? Enter the Federal Trade Commission (FTC) and their Health Breach Notification Rule.
This rule is essentially the government’s way of telling tech companies, “If you lose people’s sensitive health data, you have to tell them, or we will fine you into oblivion.”
It’s a newer rule, but it’s vital for your protection. It means that even non-HIPAA apps are legally required to inform you if a breach happens. If an app tries to sweep a data leak under the rug, the FTC can step in. Knowing this rule exists gives you power; it means you have a federal agency in your corner when consumer tech companies fail to secure your data.
Usually, no. Tearing up your Medicare card is rarely necessary unless you have concrete proof that someone is actively using your specific Medicare number to bill for fraudulent services. Keep your card, but monitor your MSN statements closely.
While highly unlikely from a simple app breach, severe medical identity theft can result in someone else’s medical history mixing with yours. This is why auditing your records is critical. You don’t want a hacker’s allergy profile accidentally ending up on your hospital chart.
If you spot a phantom service or suspicious charge, your first call should be to the Senior Medicare Patrol (SMP). This is a nationwide network of experts specifically trained to help seniors track down, report, and resolve Medicare fraud. You can find your local SMP branch by visiting their official website.
Yes! Technology is a wonderful tool for maintaining our health and independence. You don’t need to go back to tracking your steps with a notebook and pencil. Just be mindful of what information you share with these apps, and always use strong, unique passwords.

Finding out your health data was breached is stressful, but it doesn’t have to be a disaster. By understanding the difference between your doctor’s highly guarded files and your smartwatch’s data, you are already steps ahead of the scammers.
Take a few minutes today to log into your favorite health apps and update those passwords. Dig out your last Medicare Summary Notice and give it a quick read-through. Treat your health data exactly like you treat your bank account: with a healthy dose of skepticism and a watchful eye.
Technology is supposed to make our golden years easier, not give us extra homework. But by taking a few simple precautions, you can enjoy the peace of mind that comes with knowing your digital health profile is locked up tight!