New 2026 HIPAA Security Rule: MFA, Encryption, and What Small Practices Must Do Now

Published: March 19, 2026 8 min read

The 2026 HIPAA Security Rule changes represent the most significant overhaul of healthcare data security requirements in over two decades. If you run a small practice with 1 to 50 employees, the changes heading your way will affect how you handle encryption, multi-factor authentication, vulnerability scanning, and much more. The compliance window is tight, and the cost of inaction is steep. Here is what you need to know and what to do about it, starting today.

Why HHS Is Updating the HIPAA Security Rule in 2026

The current HIPAA Security Rule was last meaningfully updated in 2013. Since then, the healthcare industry has seen an explosion of ransomware attacks, cloud adoption, telehealth expansion, and sophisticated phishing campaigns targeting small practices. According to HHS, healthcare data breaches affected over 167 million individuals in 2023 alone.

The Department of Health and Human Services published a Notice of Proposed Rulemaking (NPRM) at the end of 2024, outlining sweeping changes to the Security Rule. The HHS NPRM fact sheet makes the intent clear: close the gaps that have allowed preventable breaches, and hold every covered entity and business associate to the same baseline standard regardless of size.

The final rule is expected to be published in May 2026, with a compliance deadline approximately 240 days later, putting most practices on a timeline through early 2027. That sounds like a comfortable runway until you realize what needs to happen in those 240 days.

Key 2026 HIPAA Security Rule Changes That Affect Small Practices

The proposed rule introduces several foundational shifts. If you have been relying on the old framework's flexibility to justify lighter security measures, that era is ending. Here are the changes that matter most for small healthcare practices.

1. Elimination of "Addressable" vs. "Required" Distinction

This is the single biggest conceptual change in the 2026 HIPAA Security Rule. Under the current rule, certain safeguards are labeled "addressable," which many practices have interpreted as "optional." In practice, this has allowed smaller organizations to document why they chose not to implement a specific control and move on.

Under the new rule, every specification is required. Full stop. There is no more "addressable" category. If the rule says you need it, you need it. The only exception mechanism involves requesting a time-limited waiver from HHS for specific, documented circumstances, and those are expected to be rare.

For small practices, this means you can no longer write a one-paragraph justification for why you skipped encryption on a legacy workstation or chose not to implement audit logging on a file server. Every safeguard must be in place.

2. Mandatory Encryption of ePHI at Rest and in Transit

Encryption is no longer "addressable." The updated rule will require all electronic protected health information to be encrypted both at rest (stored on devices, servers, and backups) and in transit (sent over networks, email, or messaging platforms).

What this means practically:

Most modern EHR platforms already handle encryption on their end. The gaps usually show up in practice-owned devices, email systems, and local file storage. Those are the areas to focus on first.

3. Mandatory Multi-Factor Authentication (MFA)

Multi-factor authentication will be required for any system that accesses ePHI. This applies to EHR systems, email accounts, cloud services, remote desktop connections, VPNs, and administrative portals.

MFA means requiring at least two of the following to log in: something you know (password), something you have (phone, hardware token), or something you are (fingerprint, face scan). A password alone will no longer satisfy the requirement.

For small practices, this often means:

If your staff currently logs into the EHR with just a username and password, that needs to change before the compliance deadline.

4. Vulnerability Scanning and Penetration Testing

The new rule introduces explicit requirements for vulnerability scanning and penetration testing. Under the current rule, risk analysis is required but the methodology is left vague. The 2026 changes add specificity:

For a small practice, this likely means hiring an outside IT security firm to perform these assessments. Expect to budget for both the testing itself and the remediation work that follows. This is one of the areas where costs can add up quickly if your infrastructure has not been well-maintained.

5. Enhanced Risk Analysis Requirements

Risk analysis has always been a HIPAA requirement, but the new rule tightens the expectations significantly. You will need to maintain a written, up-to-date technology asset inventory that includes every system touching ePHI. Your risk analysis must map specific threats and vulnerabilities to each asset and document how each identified risk is mitigated.

The days of running a generic risk assessment template once a year and filing it away are over. HHS expects a living document that reflects your actual environment.

6. Written Security Policies and Procedures with Annual Review

The updated rule requires comprehensive written policies and procedures covering every Security Rule standard. These must be reviewed and updated at least annually, and any changes must be documented with version history.

Staff training on these policies must also be documented, with records showing who was trained, when, and on what topics. Training must occur at initial hire and at least annually thereafter.

7. Business Associate Oversight

The new rule strengthens requirements around business associates. You will need to verify that your business associates have implemented the required safeguards, not just signed a BAA. This means reviewing their security practices and maintaining documentation of their compliance posture.

The Compliance Timeline: What to Expect

Based on the NPRM and HHS communications, here is the anticipated timeline for the 2026 HIPAA Security Rule changes:

There is no small-practice exemption. Whether you are a solo dentist or a 50-person multi-specialty clinic, the same requirements apply on the same timeline. HHS has explicitly stated that the elimination of the "addressable" category is intended to create a uniform baseline.

Estimated Costs for Small Practices: $20K-$50K

Cost is the question every practice manager asks first, and the answer is not comfortable. Based on industry estimates and the scope of the new requirements, small practices with 1 to 50 employees should expect to spend between $20,000 and $50,000 to reach full compliance with the updated rule.

Here is how those costs typically break down:

Compliance Area Estimated Cost
Updated risk analysis and asset inventory $3,000 - $8,000
Encryption deployment (devices, email, backups) $2,000 - $6,000
MFA implementation across systems $1,000 - $3,000
Vulnerability scanning (annual) $2,000 - $5,000
Penetration testing (annual) $4,000 - $10,000
Policy and procedure development/update $3,000 - $8,000
Staff training program $1,000 - $3,000
IT infrastructure upgrades (if needed) $2,000 - $7,000
Total estimated range $18,000 - $50,000

These numbers vary significantly depending on your starting point. A practice that already uses a modern cloud-based EHR, has MFA enabled, and keeps devices encrypted may land on the lower end. A practice running an on-premise server with outdated workstations and no formal security program could exceed the upper range.

The cost of noncompliance is worse. HIPAA penalties range from $141 per violation up to $2.1 million per violation category per year. A single breach investigation at a small practice can easily result in six-figure penalties, not counting the operational disruption, legal fees, and reputational damage.

What to Do Now: A Practical Preparation Checklist

You do not need to wait for the final rule to start preparing. In fact, waiting is the worst strategy. Most of the changes in the NPRM are directionally certain, and everything on this list is good security practice regardless. Here is what small practices should prioritize right now.

Immediate Actions (Start This Month)

Short-Term Actions (Next 30-90 Days)

Medium-Term Actions (90-180 Days)

Why Small Practices Are Most at Risk

Large health systems have dedicated compliance departments, CISO-level leadership, and IT budgets in the millions. Small practices typically have none of these. The practice manager is often the de facto compliance officer, the IT person, and the front desk scheduler.

This is exactly the gap that cybercriminals exploit. Small practices are targeted precisely because they tend to have weaker security controls, less monitoring, and slower incident response. The new rule is designed to raise the floor for everyone, but the lift required is proportionally heavier for smaller organizations.

The good news is that small practices also tend to have simpler environments. Fewer systems, fewer users, and fewer vendors mean the scope of the compliance effort is smaller, even if the relative burden is larger. With the right approach and tools, getting compliant is entirely achievable.

The Role of Technology in Managing Compliance

Trying to manage all of this with spreadsheets, Word documents, and a filing cabinet is a recipe for failure. The new rule's emphasis on documentation, continuous monitoring, and regular review practically requires a systematic approach.

Compliance management platforms designed for small healthcare practices can significantly reduce the time and cost of meeting the new requirements. The right tool should help you conduct and maintain your risk analysis, generate practice-specific policies, track staff training, manage your asset inventory, and monitor your compliance posture over time.

This is not about checking a box once. The 2026 HIPAA Security Rule changes demand an ongoing compliance program. The practices that invest in a sustainable approach now will be in far better shape than those scrambling to catch up after the final rule drops.

What Happens If You Do Nothing

Let's be direct. If the final rule publishes in May 2026 and you have not started preparing, you will be facing a 240-day sprint to overhaul your entire security program. That means simultaneously implementing encryption, deploying MFA, writing policies, conducting risk analyses, scheduling penetration tests, training staff, and upgrading infrastructure.

The IT vendors and security consultants you need will be overwhelmed with demand. Prices will increase. Availability will decrease. The practices that started early will have their pick of resources. The ones that waited will be competing for whatever is left.

And if you miss the deadline entirely, you are operating out of compliance from day one. Every day of noncompliance is a day of risk: risk of breach, risk of investigation, risk of penalties, and risk of the kind of reputational damage that small practices cannot easily recover from.

The Bottom Line for Small Practices

The 2026 HIPAA Security Rule changes are coming, and they are substantial. The elimination of the "addressable" distinction, mandatory encryption, required MFA, and new vulnerability testing requirements represent a genuine step change in what HHS expects from every covered entity.

But this is not cause for panic. It is cause for action. The practices that start now, even with small steps like enabling MFA and verifying encryption, will be well-positioned when the final rule arrives. The checklist above gives you a clear path forward. Pick the first item you have not done yet, and start there.

Your patients trust you with their most sensitive information. The new rule is designed to make sure that trust is backed by real, verifiable security. That is good for patients, good for the industry, and ultimately good for your practice.

Ready to simplify your HIPAA compliance?

ComplyMD helps small healthcare practices navigate the new Security Rule requirements with AI-powered risk analysis, automated policy generation, and continuous compliance monitoring. Get prepared before the deadline.

Join the Waitlist