Back to articles
HIPAA & Security

2026 HIPAA Security Overhaul

Dr. Jose I. Delgado
7 min read
2026 HIPAA Security Overhaul

The 2026 HIPAA Security Overhaul may become one of the most important healthcare compliance changes in many years. The HHS Office for Civil Rights has listed final action for the proposed rule for May 2026. However, these changes have not been finalized or released yet. Because of that, some details discussed in this article may change before the final rule becomes effective.

For healthcare professionals, this matters because cybersecurity is no longer just an IT issue. It affects patient care, daily operations, billing, trust, and legal risk. When systems go down, patients may wait longer for care. When electronic protected health information is exposed, the organization may face reporting duties, investigations, and reputational damage.

The current HIPAA Security Rule remains in effect while HHS completes the rulemaking process. Today, covered entities and business associates must protect electronic protected health information through administrative, physical, and technical safeguards. The proposed overhaul would update and strengthen many of those expectations.

Based on the current regulatory timeline, healthcare organizations should expect several stages. The final rule is currently expected around May 2026. After that, organizations will likely receive a future compliance date. Many healthcare observers expect the main compliance period to fall sometime in 2027, although HHS may adjust the timing in the final rule.

This means organizations should not wait until the final deadline appears. Instead, they should begin reviewing their current HIPAA Security program now. Early preparation gives leaders more time to budget, train staff, update systems, and correct gaps.

One major proposed change involves the old difference between “required” and “addressable” standards. For years, many organizations misunderstood “addressable.” Some treated it as optional. In reality, it meant the organization had to assess the safeguard and document its decision.

The proposed 2026 HIPAA Security Overhaul moves toward a more direct model. Many safeguards that once allowed flexibility may become mandatory. However, because the rule has not been finalized, organizations should treat this information as a strong planning guide rather than a final checklist.

Multi-factor authentication is one of the biggest expected changes. Under the proposal, MFA would be required for systems that access ePHI, with limited exceptions. This means staff may need more than a password to access patient information.

For example, a front desk employee may log into an EHR with a password and a code sent to a trusted device. A billing manager may need MFA before accessing claims records. A provider may need MFA before logging into remote charting tools.

This may feel inconvenient at first. However, passwords alone are no longer enough. One stolen password can open the door to patient records, billing systems, and internal communications.

Encryption is another major area. The proposal would require encryption of ePHI at rest and in transit, with limited exceptions. This means stored patient data should be protected. It also means data moving between systems should be protected.

For example, a laptop with patient files should use encryption. Emails, portals, backups, and file transfers also need careful review. These steps may take time, especially for smaller practices with older systems.

Vulnerability management also becomes more serious under the proposal. HHS has discussed vulnerability scanning at least every six months. It has also discussed penetration testing at least once every 12 months.

A vulnerability scan looks for known weaknesses. A penetration test goes further. It tests whether someone could actually exploit those weaknesses. Together, they help leaders see risk before attackers find it.

These activities should not wait until 2027. Organizations can begin identifying vendors, pricing services, and planning testing schedules during 2026. That way, they will not be rushed when the final compliance date arrives.

Patch management also needs attention. Unpatched software can create serious risk. An up-to-date IT asset inventory helps organizations understand their environment and protect the systems that matter most.

This is where many healthcare organizations struggle. They may know their EHR. However, they may forget old laptops, scanners, servers, phone systems, medical devices, or third-party portals. Those forgotten systems can create risk.

The proposed rule also highlights network segmentation. This means an organization should not allow every system to connect freely to every other system.

For example, a guest Wi-Fi network should not connect to the EHR. A billing workstation should not have unnecessary access to clinical devices. A compromised device should not give an attacker access to the whole organization.

Incident response is another key concern. Healthcare organizations need plans that work during real emergencies. A policy sitting in a binder does not help when systems are locked by ransomware.

The proposed rule may include stronger expectations for backup and recovery controls. Some reports have discussed restoration expectations within short time frames after a serious disruption. However, because the final rule has not been released, organizations should wait for the final language before treating any specific restoration window as confirmed.

Even so, the practical lesson is clear. Backups must be usable. A backup that cannot restore critical systems quickly may not protect the organization. Leaders should ask a simple question: “Can we restore care operations if our main systems fail?”

Business associates also need close attention. The proposal may increase vendor reporting and documentation expectations. This could affect billing companies, IT vendors, cloud services, consultants, software platforms, and data management companies.

Covered entities should review Business Associate Agreements during 2026. However, a signed BAA is only one part of vendor oversight. Organizations also need proof that vendors can protect ePHI.

The 2026 HIPAA Security Overhaul also makes the Security Risk Assessment more important. OCR already expects regulated entities to conduct an accurate and thorough assessment of risks and vulnerabilities to ePHI.

A strong SRA should not be a checklist exercise. It should identify systems, users, vendors, threats, safeguards, gaps, and corrective actions. It should also connect to a living risk management plan.

For example, an SRA may show that staff share logins. It may show that remote access lacks MFA. It may show that old devices still connect to the network. Each finding should lead to action.

This is where Taino Consultants can support healthcare organizations. Taino Consultants can help leaders assess risk, review operations, and build a practical plan. The goal is not just to satisfy a rule. The goal is to protect the organization.

EPICompliance can also help organizations manage ongoing compliance work. The platform includes training, policies, forms, monthly compliance tasks, and a Business Associate Center. EPICompliance Premium also includes compliance advisor guidance, a HIPAA Security Risk Assessment, and a Risk Management Plan.

Healthcare professionals should also expect some debate. Large regulatory changes can bring concerns about cost, timing, and operational burden. Legal challenges may also affect timing or final requirements.

However, healthcare organizations should still prepare now. Many proposed changes reflect cybersecurity practices that already make sense. Waiting for the final rule may leave organizations with too little time to respond.

Preparation does not mean panic. It means taking reasonable steps before the deadline arrives. It also means building habits that protect patients every day.

A practical preparation timeline may look like this. In early to mid-2026, review your current HIPAA Security Risk Assessment. Identify missing systems, vendors, users, and safeguards. In late 2026, begin updating policies, MFA, encryption, backups, vendor files, and incident response plans. In 2027, focus on final implementation, staff training, testing, and documentation once HHS confirms the compliance deadline.

Start with your asset inventory. Know what systems you use. Know where ePHI lives. Know who can access it. Then review MFA, encryption, backups, vendor access, patching, and incident response.

Next, review your policies. Policies should match your actual operations. If a policy says you perform quarterly access reviews, then you need proof. If it says staff complete annual training, then records should support that.

Training also matters. Staff need to understand why these changes matter. A medical assistant, biller, provider, or front desk employee may not think of themselves as part of cybersecurity. However, every user can protect or expose patient information.

Leadership must stay involved. HIPAA Security cannot sit only with IT. It must include administration, compliance, operations, human resources, providers, and vendors.

The best approach is simple. Review your current program. Identify gaps. Assign owners. Set deadlines. Track progress. Then repeat the process throughout the year.

As CEO of Taino Consultants and EPI Compliance, I believe the 2026 HIPAA Security Overhaul should be treated as a call to action. Healthcare organizations do not need to become cybersecurity companies. However, they must become better guardians of patient information.

Patients trust us with deeply personal information. They expect us to protect it. Strong HIPAA Security practices help protect that trust.

Because the final rule has not yet been released, healthcare organizations should continue watching for official OCR updates. The final version may change the timing, scope, exceptions, or exact requirements discussed in this article.

Take control now: review, refresh, and actively manage your program. For quick, practical guidance, stay tuned to EPI Compliance webcasts and watch upcoming discussions on the EPICompliance YouTube channel.


At Taino Consultants and EPI Compliance, our mission is to help healthcare organizations build compliance programs that actually work in daily operations. We understand that providers, managers, billing teams, and administrators already carry heavy responsibilities. That is why our approach focuses on practical guidance, organized documentation, meaningful training, and risk management that fits the real world of healthcare.



HIPAA Security, HIPAA 2026, Healthcare Cybersecurity, Security Risk Assessment, ePHI, OCR, Taino Consultants, EPICompliance, Business Associates, MFA, Encryption

About Dr. Jose I. Delgado

Dr. Jose I. Delgado is the founder and CEO of Taino Consultants, a veteran-owned, 8(a) graduate healthcare IT consulting firm based in St. Augustine, Florida. With over 30 years of experience in healthcare compliance and government contracting, Dr. Delgado has helped organizations navigate HIPAA, MACRA/MIPS, and federal IT security requirements.

Need help with healthcare compliance?

Taino Consultants provides HIPAA compliance consulting, MACRA/MIPS compliance support, and healthcare IT modernization services for government and private healthcare organizations.

Schedule a consultation