Go back

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

Industry Insights
January 10, 2025
7m read
7m read
7m listen
7m watch
7m watch
Protecting Patients’ Data Beyond HIPAA Requirements HeaderProtecting Patients’ Data Beyond HIPAA Requirements Thumbnail
speakers
speakers
speakers
authors
Rajan Kapoor
participants
No items found.
share

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

In October of last year, our CMO Luke posted about his frustrations that his six year old’s health information may have been compromised as part of an account takeover at a health care provider. He’s not alone. As of November 2024, the healthcare sector reported 667 data breaches impacting 180 million individuals. Folks are starting to pay attention to this growing problem. In response, the Office of Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS) has proposed significant amendments to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. These proposed changes aim to enhance the protection of electronic protected health information (ePHI) by introducing stricter cybersecurity measures.

We’re thrilled to see some much-needed improvements proposed to the regulations, and sincerely hope that organizations take them into account regardless of whether they’re actually accepted and published. 

The proposed amendments are a step in the right direction but these changes still don’t go far enough to produce meaningful improvements to the safety of patient data–and in some cases they focus on the wrong things entirely. 

Highlights of the proposed amendments

The proposed modifications to the HIPAA Security Rule include several key requirements that are simply sound security fundamentals, and regardless of whether these proposals are codified within HIPAA, healthcare organizations should strongly consider them.

  • Multi-Factor Authentication (MFA): Access to systems containing ePHI should require MFA, adding an extra layer of security to prevent unauthorized access. In 2024, MFA is a must for any organization: credentials can be compromised too easily and in too many ways to rely on a single factor. MFA isn’t perfect, but it is absolutely table stakes at this point.
  • Enhanced Risk Analysis: Covered entities and business associates would be required to conduct more comprehensive risk analyses, including a detailed assessment of potential threats and vulnerabilities to EHI. Understanding the risk within your environment is critical to building an effective data security program: without it, effective prioritization is impossible, and security planning is effectively built on guesswork.
  • Stricter Requirements for Business Partners: Third parties working with ePHI will have additional accountability and be held to the same standards as the entities covered under HIPAA, including certain mandatory security measures, enhanced audit and oversight. Again: a common-sense, solid idea. The security of any data is dictated by the weakest link in the chain of custody: failing to hold business partners to the same standards will simply shift the focus of attackers, not actually improve security.

Additionally, there are several solid recommendations around stricter overall cybersecurity requirements, updated security practices, notification requirements, and more.

Missing the mark on protecting data at rest

For all the good recommendations within the proposed changes, there are a few areas that gave us pause. Perhaps the most glaring was changing the encryption of ePHI from an “addressable standard” (i.e., something that each organization should decide on a case-by-case basis) to a requirement.

There is absolutely nothing wrong with encrypting data at rest. In general, it’s a great idea. But in practice, it does very little to actually protect data–particularly data stored in the cloud. We’re not telling anyone not to encrypt sensitive data. It’s never a bad idea. But unless you’re only worried about someone sneaking into a Microsoft datacenter in the middle of the night and stealing hard drives, it’s not sufficient.

The goal of encrypting data is to prevent unauthorized access to the information. Simply encrypting the data only protects against certain threats and attack vectors, but does nothing against the most common attack types in today’s threat landscape.

Account takeover attacks are among the biggest threats facing healthcare organizations (and everyone else, for that matter). And in the event of a compromised account, the access will appear legitimate–to the system’s security, it will appear that it’s simply a doctor or nurse or healthcare admin accessing the information. 

Modern protection for sensitive and regulated data

Material Security offers a robust suite of tools designed to safeguard sensitive data within cloud email and productivity suites, making us an ideal partner for healthcare organizations.

Material Security provides intuitive capabilities to discover and protect sensitive content within email and file-sharing platforms. Our modern approach to data loss prevention (DLP) keeps sensitive data safe even in the event of a breached account, without disrupting operations or productivity.

Our API-based integration with Google Workspace and Microsoft 365, Material Security applies access controls directly to message objects that warrant protection. We automatically detect, classify, and secure sensitive data (including a range of ePHI) out of the box, and make it easy to create custom detection categories. Sensitive data in the inbox is secured behind an MFA prompt–meaning legitimate users can access it within seconds, but attackers are locked out.

With advanced AI-driven threat detection and real-time, automated response capabilities, Material Security ensures organizations remain secure against sophisticated phishing attacks and potential data breaches, and can detect and alert on subtle signs of account breach and takeover–helping security teams stop attacks and contain damage.

Our solutions are designed to help organizations meet stringent regulatory requirements, providing peace of mind and ensuring that sensitive data remains protected against emerging threats. This includes robust audit logs showing when all sensitive data was accessed, and by whom.

Real-world solutions for protecting sensitive patient data

So what do the proposed changes mean for today’s healthcare organizations? Realistically: probably nothing. These sorts of recommendations are often position statements for outgoing administrations more than anything else, and the likelihood these will be accepted are low. 

That said, they shouldn’t be ignored. The majority of the topics covered in the proposed amendments are very good ideas–and as discussed above, an organization responsible for sensitive data in 2024 that is lacking some of the proposed requirements is frankly worrying. Healthcare organizations must proactively assess their current cybersecurity frameworks and invest in effective solutions to not only comply with regulatory requirements, but to stay ahead of the ever-evolving threats that are increasingly targeting healthcare organizations.

Contact Material Security today to find out how we help healthcare organizations protect their patients’ data and stay ahead of compliance requirements.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

Eddie Conk
10
m read
Read post
Podcast

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Listen to episode
Video

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m watch
Watch video
Downloads

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Watch video
Webinar

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Listen episode
blog post

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

Rajan Kapoor
7
m read
Read post
Podcast

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

7
m listen
Listen to episode
Video

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

7
m watch
Watch video
Downloads

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

7
m listen
Watch video
Webinar

Protecting Patients’ Data Beyond HIPAA Requirements

Recent proposed changes to the HIPAA Security Rule don’t go far enough, but that shouldn’t stop healthcare organizations from keeping patient data safe.

7
m listen
Listen episode
blog post

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

Patrick Duffy
2
m read
Read post
Podcast

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

2
m listen
Listen to episode
Video

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

2
m watch
Watch video
Downloads

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

2
m listen
Watch video
Webinar

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

2
m listen
Listen episode
blog post

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

Patrick Duffy
4
m read
Read post
Podcast

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen to episode
Video

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m watch
Watch video
Downloads

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Watch video
Webinar

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.