Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 31, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 31, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 31, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 31, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025
      Recent

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025

      Filament Is Now Running Natively on Mobile

      May 31, 2025

      How Remix is shaking things up

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025
      Recent

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New HIPAA Security Rule Would Strengthen Healthcare Cybersecurity

    New HIPAA Security Rule Would Strengthen Healthcare Cybersecurity

    January 7, 2025

    HIPAA Security Rule

    The HIPAA Security Rule would get its first update since 2013 under a new proposal that would mandate basic security practices like multi-factor authentication, encryption, and network segmentation for healthcare providers, health plans, and others who handle sensitive patient data.

    The proposed changes to the Health Insurance Portability and Accountability Act’s Security Rule were published this week – and took up 125 three-column pages of the Jan. 6 Federal Register. The U.S. Department of Health and Human Services (HHS) estimates that the new security requirements would cost more than $30 billion over the first five years, but after a difficult year for healthcare data breaches and ransomware attacks, stronger security controls may find favor even in a tougher regulatory environment on Capitol Hill.

    “The increasing frequency and sophistication of cyberattacks in the health care sector pose a direct and significant threat to patient safety,” HHS Deputy Secretary Andrea Palm said in a statement. “These attacks endanger patients by exposing vulnerabilities in our health care system, degrading patient trust, disrupting patient care, diverting patients, and delaying medical procedures. This proposed rule is a vital step to ensuring that health care providers, patients, and communities are not only better prepared to face a cyberattack, but are also more secure and resilient.”

    HIPAA Security Rule Adds Encryption, MFA and More

    The proposal is now in a 60-day public comment period, after which HHS will consider the feedback before proceeding with a final rule. The new HIPAA security requirements would apply to health plans, health care clearinghouses (organizations that enable the exchange of healthcare data between providers and insurers), most healthcare providers, and business associates.

    An HHS fact sheet provides a good overview of the proposal, which also adds requirements for risk assessment, incident response, written policies and procedures, and regular review, testing, and updating.

    The cybersecurity controls that the updated HIPAA Security Rule would require include:

    • Encryption of ePHI (electronic protected health information) “at rest and in transit, with limited exceptions.”
    • Establishing “technical controls for configuring relevant electronic information systems, including workstations, in a consistent manner,” including anti-malware protection, removing extraneous software from relevant electronic information systems, and disabling network ports “in accordance with the regulated entity’s risk analysis.”
    • Requiring the use of multi-factor authentication, “with limited exceptions.”
    • Requiring vulnerability scanning at least every six months, and penetration testing at least annually.
    • Requiring network segmentation.
    • Requiring “separate technical controls for backup and recovery of ePHI and relevant electronic information systems.”

    Regulated entities would be required to “review and test the effectiveness of certain security measures at least once every 12 months, in place of the current general requirement to maintain security measures.”

    Asset Inventory, Network Map, Incident Response Requirements

    Risk assessment, auditing, and incident response planning would also be mandated by the proposal. Some of those proposed requirements include:

    • Developing a technology asset inventory and network map that illustrates the movement of ePHI “throughout the regulated entity’s electronic information systems,” to be updated at least annually or in response to changes that affect ePHI.
    • Requiring notification of regulated entities within 24 hours when a workforce member’s access to ePHI or certain electronic information systems is changed or terminated.
    • Drafting incident response plans that include restoring relevant electronic information systems and data within 72 hours.
    • Conducting a Security Rule compliance audit at least annually, plus verification requirements for business associates.

    Conclusion

    The proposed HIPAA Security Rule requirements are based on commonly accepted cybersecurity best practices for preventing – or limiting the damage from – data breaches and ransomware attacks.

    As such, they shouldn’t be particularly controversial – especially after a year that saw patient health endangered by numerous cyberattacks, hazards that have led to bipartisan agreement that healthcare cybersecurity needs to improve.

    With the average cost of a data breach significantly higher for healthcare than for any other sector, commonsense security controls may wind up saving healthcare organizations money – and improving patient privacy in the process.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAccelerating Sybase-to-MongoDB Modernization With PeerAI
    Next Article The AI Fix #32: Agentic AI, killer robot fridges, and the robosexual revolution

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 31, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    May 31, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

    Development

    Cyberattack Disrupts Japan Airlines Operations, Delays Over 40 Flights

    Development

    Generating audio for video

    Artificial Intelligence

    3 Questions: Enhancing last-mile logistics with machine learning

    Artificial Intelligence

    Highlights

    Development

    New Case Study: The Malicious Comment

    May 7, 2024

    How safe is your comments section? Discover how a seemingly innocent ‘thank you’ comment on…

    Beyond Aha Moments: Structuring Reasoning in Large Language Models

    May 22, 2025

    Quantum Machine Learning for Accelerating EEG Signal Analysis

    May 20, 2024

    Rilasciato Sublime Text 4 versione 4200

    May 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.