The HIPAA Security Rule

May 4, 2026

The HIPAA Security Rule overhaul expected in 2026 is one of the most significant changes since 2003. It is still based on a proposed rule (NPRM), but industry consensus—and HHS direction—indicates a shift from flexible, risk-based guidance to prescriptive, enforceable cybersecurity requirements.


Below is a structured breakdown of the most important expected changes and what they mean operationally.


1) Elimination of “Addressable” Safeguards → Mandatory Controls

Current state: Many controls (e.g., encryption) are “addressable”

2026 shift: Most become required

  • Encryption, MFA, logging, and other safeguards can no longer be skipped with justification
  • Removes variability across organizations
  • Forces baseline security standardization

Impact:

  • Small practices lose flexibility
  • Audits become binary: implemented vs. not implemented


2) Mandatory Encryption (At Rest + In Transit)

  • Encryption of **all ePHI** required
  • Applies to:
  • Servers and databases
  • Workstations/endpoints
  • Backups and archives

Likely standard: AES-256 (or equivalent), TLS 1.2+

Impact:

  • Legacy systems become a liability
  • Backup platforms and imaging systems (CBCT, etc.) must comply


3) Multi-Factor Authentication (MFA) Required Everywhere

  • MFA required for:
  • All systems accessing ePHI
  • Privileged/admin access
  • Remote access

Impact for dental/medical workflows:

  • Shared logins and “no phones in operatories” become compliance risks
  • Requires alternative MFA methods (hardware tokens, workstation-based auth, etc.)


4) Formal Security Testing Requirements

New minimum standards expected:

  • Vulnerability scanning: at least every 6 months
  • Penetration testing: annually

Impact:

  • Moves organizations from “reactive IT” to **continuous security validation**
  • MSPs/SOC providers become operationally required, not optional


5) Stricter Risk Analysis & Ongoing Risk Management

  • Risk analysis must be:
  • Comprehensive
  • Documented
  • Continuously updated
  • Must show:
  • Identified risks
  • Remediation actions
  • Evidence of progress

OCR focus for 2026 enforcement:

  • Proof—not just documentation—of risk management


6) Asset Inventory & Data Flow Mapping (New Requirement)

Organizations must maintain:

  • Full asset inventory (hardware, software, cloud)
  • Data flow maps showing where ePHI travels

Impact:

  • Requires visibility across:
  • SaaS (Open Dental cloud, imaging integrations)
  • Vendors and APIs
  • Critical for incident response and compliance audits


7) Enhanced Vendor / Business Associate Requirements

  • More detailed **BAA requirements**
  • Mandatory:
  • Security controls (MFA, encryption)
  • Faster breach notification (often 24–72 hours)
  • Demonstrated compliance

Impact:

  • Third-party risk becomes a primary audit area
  • MSPs and SaaS vendors are directly accountable

8) Faster Incident & Breach Reporting

  • Expected requirement: **~72-hour reporting window**
  • Aligns more closely with modern regulatory frameworks (e.g., GDPR-like timelines)

Impact:

  • Requires:
  • SIEM / log aggregation
  • Incident response plans
  • 24×7 monitoring capability

9) Network Segmentation & System Hardening

  • Required segmentation of systems handling ePHI
  • Mandatory controls around:
  • Unsupported software removal
  • Anti-malware
  • Patch management

Impact:

  • Flat networks (common in dental offices) become non-compliant
  • VLANs and firewall segmentation become required architecture


10) Shift From “Policy-Based” to “Proof-Based” Compliance

This is the most important strategic change:

  • Old model: “Have policies and documentation”
  • New model: “Prove controls are implemented and working”

Examples:

  • Logs must exist and be reviewed
  • Controls must be tested
  • Risk remediation must be tracked


Timeline (Expected)

  • Proposed rule issued: **Jan 2025**
  • Likely final rule: **~May 2026**
  • Estimated compliance window: **~180 days** (late 2026)


What This Means for MSP / Dental Clients (Practical View)


For your environment (dental/medical MSP):

Immediate gaps most practices will have:

  • No MFA on shared workstations
  • Incomplete encryption (especially backups, imaging systems)
  • No formal asset inventory or data mapping
  • No documented risk management lifecycle
  • Limited or no SIEM/log retention

Services that become “required,” not optional:

  • 24×7 SOC + SIEM
  • Vulnerability scanning + annual pen testing
  • Endpoint detection & response
  • Backup with immutable + encrypted storage
  • Identity & access control modernization


Bottom Line


The 2026 HIPAA Security Rule changes are not incremental—they are a forced modernization of healthcare cybersecurity:

  • Less flexibility
  • More technical enforcement
  • Shorter timelines
  • Higher accountability (including vendors)


Folders labeled
June 12, 2025
In March 2025, a small Alabama-based dermatology clinic became the latest cautionary tale in a growing wave of healthcare cyberattacks
A doctor is sitting at a desk using a laptop computer.
May 12, 2025
As healthcare and dental providers increasingly rely on digital records, cloud applications, and connected devices, the responsibility to protect sensitive patient data has never been greater.
A man is sitting at a desk reading a piece of paper.
May 9, 2025
Section 179 of the IRS tax code is one of the most powerful, business-friendly provisions available to small and mid-sized companies.
A person is holding a cell phone in front of a laptop.
May 2, 2025
If your business relies on Google Workspace (formerly G Suite) to send emails through third-party applications—such as scanners, CRM systems, helpdesk tools, or website contact forms—then there’s an important security update you need to know about.
A woman is sitting at a desk using a laptop computer.
April 22, 2025
Creating a Hyper-V instance running Amazon Machine Image (AMI) 2023 involves several detailed steps.
A woman is sitting at a desk in a warehouse using a cell phone.
February 28, 2025
Cyberattacks are a growing concern, and small to mid-sized businesses – especially dental, medical, accounting, and construction offices – are increasingly targeted. To help organizations respond effectively to security incidents, a free Security Incident Response Toolkit is now available.
A man in a suit and tie is holding a globe with the words cyber security written on it.
February 26, 2025
As cyber threats continue to grow, the FBI is warning businesses—particularly small and mid-sized dental, medical, accounting, and construction offices—to back up their data immediately. This alert comes in response to a surge in attacks specifically targeting these industries.
A woman is pointing at a sign that says windows 10 end-of-life : what is it and why should you care ?
February 7, 2025
As of October 14, 2025, Microsoft will officially end support for Windows 10. After this date, the operating system will no longer receive security updates, technical assistance, or software updates from Microsoft. While your Windows 10 PC will continue to function, using an unsupported operating system poses significant risks.
A man is using a laptop computer with a loading bar on the screen.
February 5, 2025
Microsoft’s ESU program provides critical security updates for Windows 10 devices beyond the official end-of-support date. This is a paid service designed for individuals and businesses that need extra time to transition to a supported operating system.
A judge 's gavel is sitting on top of a black table.
January 8, 2025
In December 2024, Westend Dental, an Indianapolis-based dental practice, agreed to pay a $350,000 penalty to the Indiana Attorney General's Office to resolve multiple alleged violations of federal and state laws, including the Health Insurance Portability and Accountability Act (HIPAA)