The proposed HIPAA Security Rule updates expected to finalize in May 2026 will fundamentally change how healthcare organizations approach cybersecurity compliance. These changes mandate multifactor authentication (MFA), encryption, enhanced backups, and real-time monitoring—creating significant challenges for private practices and healthcare organizations already struggling with rising cyber threats.
Understanding the Proposed HIPAA Changes
The Department of Health and Human Services aims to eliminate the current “addressable” versus “required” distinction, making all security safeguards mandatory. This shift represents the most significant overhaul of HIPAA security requirements since the original rule’s implementation.
Key mandatory requirements include:
- Multifactor Authentication: Required for all system access, including remote access, onsite users, administrators, and applications
- Encryption: Mandatory for all electronic protected health information (ePHI) both at rest and in transit
- Enhanced Backup and Recovery: Organizations must demonstrate 72-hour restoration capability with testable disaster recovery plans
- Real-time Monitoring: Vulnerability scans every six months, annual penetration testing, and 24-hour incident reporting timelines
These changes align with modern cybersecurity frameworks like NIST, reflecting the urgent need to address escalating healthcare cyber threats. In 2024, healthcare data breaches affected nearly 238 million Americans, with ransomware attacks targeting 67% of healthcare organizations—nearly double the 2021 rate.
Why These Changes Matter for Your Practice
Healthcare organizations face an unprecedented cybersecurity crisis. The average cost of a healthcare data breach reached $9.8 million in 2024, growing at twice the rate of other industries. More alarming, ransomware attacks cause an average of $9,000 per minute in downtime.
The proposed HIPAA updates directly address the root causes of these vulnerabilities. However, they also create compliance challenges, particularly for resource-limited private practices and multi-location clinics.
Current vulnerabilities putting practices at risk:
- Insufficient staff cybersecurity training
- Legacy systems with poor patch management
- Inadequate cybersecurity funding (typically 6% or less of IT budgets)
- Third-party vendor vulnerabilities
- Lack of comprehensive HIPAA risk assessment processes
Compliance Challenges for Healthcare Organizations
Unlike current HIPAA requirements that allow flexibility in implementation, the proposed changes demand “provable technical enforcement” regardless of organization size. This creates several challenges:
Technical Implementation Costs
Upgrading systems for MFA, encryption, and monitoring requires significant investment. Organizations must also conduct biannual vulnerability scans and annual penetration testing—expenses that many smaller practices haven’t budgeted for.
Expertise Requirements
The new requirements demand detailed risk assessments, network segmentation, and sophisticated patch management. Many practices will need external vendors or extensive staff training to meet these demands.
Vendor Dependencies
Business Associate Agreements must now enforce these controls on all vendors. The excuse “our vendor doesn’t support MFA” will no longer be acceptable under the proposed rules.
Operational Disruptions
Organizations must revamp policies, update agreements, and prove restoration capabilities through testing. The shortened breach reporting timeline (24 hours for business associates) adds additional pressure.
Practical Steps to Prepare Now
While the rules won’t finalize until May 2026, healthcare leaders should begin preparation immediately to avoid compliance scrambles and reduce current cyber risks.
Immediate Actions
Conduct a comprehensive HIPAA risk assessment to identify current vulnerabilities and gaps. This assessment will form the foundation of your compliance strategy and help prioritize investments.
Implement MFA across all systems starting with the most critical applications. Begin with email systems, EHR/EMR access, and administrative tools.
Audit current encryption practices for both data at rest and in transit. Many organizations already encrypt some data but lack comprehensive coverage.
Medium-Term Preparation
Develop and test backup restoration procedures to meet the 72-hour requirement. This includes both technical capabilities and documented processes.
Begin network segmentation to isolate administrative systems, cloud migrations, and billing data from clinical operations. This prevents breaches from spreading across your entire infrastructure.
Establish vendor compliance requirements and begin updating Business Associate Agreements to include the new security mandates.
Long-Term Strategy
Consider partnering with managed IT support for healthcare providers who specialize in HIPAA compliance and can help navigate the complex technical requirements.
Develop a comprehensive cybersecurity training program for all staff, focusing on phishing recognition and secure data handling practices.
Create incident response plans that meet the new reporting requirements and ensure your organization can respond quickly to potential breaches.
What This Means for Your Practice
The proposed HIPAA updates represent both a challenge and an opportunity for healthcare organizations. While compliance costs and complexity will increase, these changes also provide a framework for significantly improving your cybersecurity posture.
Starting preparation now allows you to spread costs over time and implement changes gradually rather than facing a compliance crisis in 2026. More importantly, early implementation of these security measures will protect your practice from the growing cyber threats that have already cost the healthcare industry billions.
The key to success is treating this as a business continuity initiative, not just a compliance requirement. Organizations that view cybersecurity as an investment in operational stability and patient trust will be better positioned to thrive in the evolving healthcare landscape.
Delaying preparation risks escalating financial hits from both compliance penalties and cyberattacks, while potentially disrupting patient care workflows. The time to act is now—before the rules become mandatory and before your practice becomes the next cyber attack statistic.










