The proposed HIPAA Security Rule updates represent the most significant compliance shift in decades for healthcare practices. With ransomware attacks surging 36% in 2026 and average breach costs reaching $10-12 million, these changes eliminate the flexibility that previously allowed practices to choose which security measures to implement.
Healthcare organizations can no longer treat encryption, multi-factor authentication, and secure backup protocols as optional “addressable” requirements. Under the proposed rules issued by HHS in December 2024, all safeguards become mandatory, fundamentally changing how practices approach cloud storage, backup systems, and file sharing.
Why These Changes Are Happening Now
The numbers tell a stark story. In 2025 alone, 605 healthcare breaches exposed 44.3 million patient records, with ransomware accounting for 40-45% of all incidents. Healthcare remains the top target for cybercriminals, with 96% of 2026 attacks involving data theft before encryption.
The financial impact extends far beyond ransom payments. Average breach costs now exceed $10 million when factoring in operational disruption, regulatory penalties, and reputation damage. Some practices face 19-day average downtimes, directly impacting patient care and revenue.
These realities drove HHS to propose eliminating the distinction between “required” and “addressable” specifications. The message is clear: optional security is no longer acceptable when patient data and practice survival are at stake.
Mandatory Multi-Factor Authentication for All Access
Multi-factor authentication (MFA) transitions from an addressable safeguard to a universal requirement. This applies to every system containing electronic protected health information (ePHI), including:
- Cloud services and storage platforms
- EHR/EMR systems and patient portals
- Email systems and file sharing applications
- Remote access connections
- Administrative and user accounts
Business associates must verify MFA implementation annually with covered entities, creating accountability throughout the vendor chain. This verification requirement ensures that third-party cloud providers and IT service companies maintain consistent security standards.
The practical impact means every staff member needs MFA for any system accessing patient data. This includes office managers, billing staff, clinical personnel, and administrators. No exceptions exist for “trusted” devices or internal networks.
Universal Encryption Requirements for ePHI
Encryption becomes non-negotiable for all ePHI, whether stored or transmitted. The proposed standards require:
Data at Rest Protection
- AES-256 encryption for all stored ePHI
- FIPS 140-2 Level 2 certification minimum (Level 3 for high-risk environments)
- Hardware Security Modules (HSMs) for key management in cloud environments
- Full device encryption for laptops, mobile devices, and portable storage
Data in Transit Security
- TLS 1.3 or higher for all network transmissions
- RSA-4096 or Elliptic Curve Cryptography for key exchanges
- Secure protocols for email, file transfers, and remote access
This eliminates previous flexibility where practices could justify alternative safeguards. Every database, backup file, cloud storage repository, and transmitted message must meet these encryption standards.
Enhanced Requirements for HIPAA Compliant File Sharing
Secure file sharing receives particular attention under the proposed rules. Healthcare practices frequently share patient information with specialists, insurance companies, legal representatives, and other authorized parties. The new requirements ensure this sharing maintains security throughout the process.
Key file sharing mandates include:
- End-to-end encryption for all shared files
- MFA verification before access authorization
- Audit trails documenting who accessed what information when
- Time-limited access with automatic expiration
- Network segmentation preventing lateral movement during breaches
Practices must evaluate current file sharing methods against these standards. Email attachments, consumer cloud services, and unencrypted file transfers will no longer meet compliance requirements.
Backup and Recovery System Overhaul
The proposed rules establish specific requirements for backup systems and disaster recovery capabilities. These changes address ransomware’s dual threat of encryption and data theft:
Mandatory Backup Standards
- 72-hour recovery capability for critical systems like EHRs
- Quarterly backup restoration testing with documented results
- Separate recovery controls preventing ransomware spread to backups
- Encryption protection for all backup files and repositories
HIPAA Compliant Cloud Backup Requirements
- Geographically separated backup locations
- Air-gapped or immutable backup copies
- Automated backup monitoring with failure alerts
- Business associate agreements covering backup service providers
These requirements move beyond traditional backup approaches that focused solely on data preservation. The new standards prioritize rapid recovery and ransomware resistance.
Cloud Storage Compliance Essentials
Cloud storage platforms must meet elevated security standards under the proposed rules. This impacts how practices evaluate and manage HIPAA compliant cloud storage solutions.
Essential cloud storage requirements:
- Zero-knowledge encryption where providers cannot access decryption keys
- Geographic data residency controls for sensitive information
- Regular vulnerability scanning every six months
- Annual penetration testing by qualified security professionals
- Comprehensive audit logging with tamper-proof records
Practices must verify these capabilities through updated business associate agreements and regular compliance confirmations. Generic cloud services without healthcare-specific security features will not meet the new standards.
Implementation Timeline and Compliance Strategy
While these remain proposed changes pending final HHS rulemaking, practices should begin implementation immediately. OCR enforcement focus on cybersecurity violations has intensified, with average penalties exceeding $3 million for significant breaches.
Immediate action steps include:
- Inventory all systems containing or accessing ePHI
- Audit current security measures against proposed requirements
- Update business associate agreements with cloud providers and IT vendors
- Implement MFA across all relevant systems
- Begin quarterly backup testing procedures
Expected compliance timeline suggests final rules in mid-2026 with 180-240 day implementation windows. However, practices implementing these measures proactively demonstrate good faith compliance efforts during any OCR investigation.
What This Means for Your Practice
The shift from addressable to mandatory HIPAA safeguards represents a fundamental change in healthcare cybersecurity expectations. Practices can no longer justify security gaps through risk analysis or alternative measures.
This transition offers significant benefits beyond compliance. Mandatory encryption, MFA, and backup testing create robust defenses against ransomware attacks that have crippled healthcare organizations nationwide. The upfront investment in proper security infrastructure protects against catastrophic losses that average over $10 million per incident.
Consider consolidating with healthcare-focused IT providers who understand these requirements and can implement comprehensive solutions. Managing multiple vendors with varying security standards increases complexity and audit risks.
The proposed rules ultimately aim to create a baseline security standard that protects patient data while ensuring healthcare operations can continue during cyber incidents. Practices that embrace these changes position themselves for long-term operational stability and regulatory compliance in an increasingly dangerous threat environment.










