2026 HIPAA Security Rule Update: New Requirements Every Healthcare Organization Must Prepare For

Quick Answer: The 2026 HIPAA Security Rule update introduces significant changes including mandatory encryption of ePHI at rest and in transit (removing the “addressable” designation), required multi-factor authentication for all systems accessing ePHI, 72-hour incident reporting requirements, annual penetration testing, and enhanced business associate oversight obligations. These changes, proposed by HHS in late 2025, represent […]

HIPAA Compliance for Generative AI: What Healthcare Organizations Must Know

Quick Answer: HIPAA compliance for generative AI requires healthcare organizations to treat AI tools like ChatGPT, Gemini, or Copilot as potential business associates when they process electronic protected health information (ePHI). Key compliance requirements include: executing Business Associate Agreements with AI vendors before sharing any patient data, conducting risk assessments that specifically address AI-related vulnerabilities, […]

AI Security Risks in Healthcare: What Every Organization Needs to Know

Quick Answer: AI security risks in healthcare include unauthorized ePHI exposure through AI model training data, prompt injection attacks that extract sensitive information, AI-generated hallucinations leading to incorrect clinical decisions, supply chain vulnerabilities in AI dependencies, and insider threats amplified by AI-powered data access. Healthcare organizations must include AI systems in their HIPAA Security Risk […]

Network Vulnerability Assessments and HIPAA: Why Your SRA Isn’t Complete Without One

Biometrics for Network Security

Quick Answer: A HIPAA network vulnerability assessment is a technical evaluation that scans your healthcare network infrastructure to identify security weaknesses that could expose electronic protected health information (ePHI). It involves scanning servers, workstations, firewalls, routers, and connected devices for known vulnerabilities, misconfigurations, and outdated software. HIPAA does not explicitly mandate vulnerability assessments, but they […]

The New Voice Scam to Watch For

Someone talking on the phone

The New Voice Scam to Watch For Resources Blog AI voice scams are here—fraudsters clone voices with seconds of audio. Learn how to protect accounts, payments, and your team. Phone impersonation scams aren’t new—but they’ve become far more dangerous. Last year, we warned about fraudsters calling to trigger password resets or reroute payments. Those risks […]

Why Network Vulnerability Assessments Are a Must in Healthcare

Illustration of internet traffic with cross-sections secured by locks

Why Network Vulnerability Assessments Are a Must in Healthcare and What They Should Look Like in 2025 Resources Blog Discover why Network Vulnerability Assessments are essential—and how Medcurity’s new NVA Dashboard makes them smarter and actionable. Big news before we dive in:We’ve just launched a smarter, more actionable way to manage Network Vulnerability Assessments—and it’s […]

Why Medcurity Is the HIPAA Compliance Solution Large Hospitals Need in 2025

Hospital Emergency Room and Entrance directions sign

Why Medcurity Is the HIPAA Compliance Solution Large Hospitals Need in 2025 Resources Blog Scalable, intuitive HIPAA compliance for hospitals—Medcurity simplifies risk assessments, training, and policies across complex systems with expert support. For large hospitals and healthcare systems, managing HIPAA compliance is no small task. With thousands of employees, multiple departments, third-party vendors, and decentralized […]

//...snippet//