The U.S. Department of Health and Human Services proposed major updates to the HIPAA Security Rule in January 2025, with final rules expected by May 2026. These changes require immediate attention from medical practice administrators and healthcare executives responsible for protecting patient data and maintaining HIPAA compliance.
The proposed rules eliminate the distinction between “required” and “addressable” safeguards, making most cybersecurity measures mandatory. Healthcare organizations will have 240 days after the final rule is published to achieve full compliance, making preparation crucial now.
What These HIPAA Updates Mean for Healthcare Practices
Healthcare remains the costliest industry for data breaches, with an average cost of $7.42 million per incident in 2025 according to IBM’s latest research. While this represents a decrease from 2024, healthcare breaches still cost nearly double the global average and take the longest to identify and contain at 279 days.
The proposed HIPAA Security Rule updates address this vulnerability by mandating specific technical controls that were previously optional:
- Multifactor authentication (MFA) for all system access to electronic protected health information
- Encryption for data both at rest and in transit across all systems
- Network segmentation to prevent lateral movement during cyberattacks
- Anti-malware protection deployed across all relevant systems
- Vulnerability scanning every six months and annual penetration testing
- System hardening including removal of unnecessary software
- Enhanced backup and recovery with testing every six months
Enhanced HIPAA Risk Assessment Requirements
The updated rules significantly strengthen HIPAA risk assessment requirements. Healthcare organizations must now conduct more detailed annual risk analyses that include:
Technology asset inventory and network mapping showing how electronic protected health information flows through your systems, updated annually or when changes occur.
Written documentation of identified threats, vulnerabilities, and risk levels with specific remediation plans.
Annual compliance audits and designation of a dedicated security official.
These enhanced requirements reflect the reality that many healthcare breaches stem from inadequate risk assessment and planning. Organizations that conduct thorough risk assessments can reduce breach costs by an average of $208,000 according to recent data.
Business Operations and Cost Impact
For practice managers and clinic executives, these updates address core operational concerns:
Reducing downtime risks: Healthcare breaches take an average of 279 days to identify and contain. The new rules’ emphasis on real-time monitoring and faster incident response helps protect critical EHR access.
Preventing ransomware disruptions: Immutable backups and anti-malware requirements directly target ransomware, which has become a primary threat to medical practices.
Protecting against regulatory penalties: Enhanced enforcement is expected beginning late 2026 into 2027. Non-compliance risks substantial fines and potential lawsuits.
Streamlining vendor management: Business associates must now provide annual verification of safeguards and notify covered entities within 24 hours of any security incidents.
Practical Implementation Steps
While waiting for final rules, healthcare administrators can take immediate action:
Start with multifactor authentication: This foundational control is straightforward to implement across multi-location practices and provides immediate security benefits.
Assess current encryption: Review whether patient data is encrypted both when stored and transmitted. This includes email communications and cloud-based systems.
Review backup procedures: Ensure backups are tested regularly and can be restored quickly. Consider immutable backup solutions that prevent ransomware encryption.
Conduct staff training: Annual cybersecurity training programs addressing phishing and social engineering attacks remain essential for HIPAA compliance.
Evaluate managed IT partnerships: Many smaller practices benefit from managed IT support for healthcare that specializes in HIPAA compliance and can handle technical implementation requirements.
The proposed rules also address emerging threats like AI-driven attacks and “shadow AI” devices that could provide unauthorized network access. Healthcare leaders should prepare for these evolving cybersecurity challenges.
What This Means for Your Practice
These HIPAA Security Rule updates represent the most significant cybersecurity requirements for healthcare in over two decades. While implementation may seem daunting, particularly for smaller practices with limited IT resources, the goal is clear: protect patient data and reduce the devastating costs of healthcare breaches.
The 240-day compliance window after final rules are published provides time for thoughtful implementation, but preparation should begin now. Focus on conducting a comprehensive risk assessment, implementing basic controls like MFA and encryption, and partnering with experienced healthcare IT professionals who understand both the technical requirements and regulatory landscape.
By taking proactive steps today, your practice can build cybersecurity resilience while maintaining operational efficiency and patient care quality. The investment in compliance infrastructure pays dividends through reduced breach risk, lower insurance costs, and the peace of mind that comes from protecting your patients’ most sensitive information.










