/
Zero Trust Segmentation

2025 HIPAA Security Updates: What Healthcare Organizations Need to Know

Cyberattacks are hitting healthcare harder than ever. With patient safety and sensitive data on the line, the new proposed HIPAA Security Rule updates are a bold call to action: resilience over excuses.

Proposed updates to the Security Rule aim to strengthen the protection of electronic protected health information (ePHI). For years, healthcare organizations have struggled to follow cybersecurity guidance. Many have left critical gaps in their defenses.  

Now, the Office for Civil Rights (OCR) is calling for a stronger, clearer approach to secure the nation’s healthcare systems. The message? It’s time to prioritize action over intention.

Here’s a breakdown of what the proposed changes mean and how healthcare providers can prepare.

The 3 biggest proposed HIPAA security changes  

The new HIPAA proposals aren’t just small changes to the existing Security Rules. They’re game-changers for healthcare cybersecurity. Here are the three biggest shifts every healthcare organization needs to prepare for now.

1. Moving from a prevention to resilience mindset

One big change in the proposed updates is the shift from focusing only on security to focusing on cyber resilience.  

It’s not enough to keep threats out — you need to be prepared to contain attacks and reduce their impact. Healthcare organizations are critical infrastructure, and any disruption to their operations can be catastrophic. They must be able to recover quickly when attacks happen.

As the proposal explains, “Regulated entities must consider how their security measures support resilience in the face of an adverse event.”

This is a powerful shift in thinking. Healthcare organizations are being asked to build systems that can adapt and recover during crises.  

The new requirements mean that cyber resilience isn’t just a bonus. It’s essential for protecting patients, data, and operations in today’s threat landscape.

2. Building customized, risk-based cybersecurity

Another key update is the move to a risk-based security approach.  

Instead of treating all risks the same, organizations must evaluate their specific threats and focus on addressing the most critical ones.

The draft rule states, “Entities must reduce risks to their ePHI to a level that is reasonable and appropriate for their specific circumstances.”

This approach recognizes that not all healthcare organizations are the same. A large hospital network has different risks than a small clinic. By tailoring security efforts to their unique situations, providers can ensure their defenses are both effective and efficient.

3. Tackling security for legacy devices

One of the toughest challenges for healthcare organizations is dealing with outdated medical devices. These legacy systems often lack modern security features, leaving networks vulnerable to attack.  

The new proposal doesn’t sugarcoat this issue. The draft acknowledges, “Some regulated entities may incur costs for replacing legacy medical devices that cannot be reasonably protected against current threats.”

While necessary, these updates could strain small and rural providers with limited budgets. But ignoring the problem isn’t an option. Cyberattacks targeting vulnerable devices could cost even more in the long run.

HIPAA’s proposed technical requirements for healthcare cybersecurity

The proposed updates aren’t just about broad ideas. They include specific actions healthcare organizations must take to improve security:

  • Incident response: Organizations must create and test incident response plans regularly to ensure they’re ready for potential cyber events.
  • Supply chain security: Providers need to assess risks in their business partners and supply chains to address third-party vulnerabilities.

The draft also highlights technical requirements, making them mandatory instead of optional:

  • Vulnerability mitigation
  • Encryption
  • Multi-factor authentication (MFA)
  • Data backup and recovery
  • Restricting open ports
  • Segmentation

Segmentation, in particular, is worth noting. While it’s been considered best practice for years, it’s now becoming a compliance and insurance requirement.

Why microsegmentation matters now for healthcare

The draft mentions network segmentation, but healthcare organizations should take it a step further with microsegmentation.  

Microsegmentation breaks networks into smaller, isolated zones. This limits the movement of attackers if they breach the system, also called lateral movement.

Unlike traditional segmentation, which relies on perimeter defenses, microsegmentation works at a granular level. It can stop threats from spreading while maintaining normal operations. For healthcare providers, this means fewer disruptions and stronger protection for sensitive data.

At Illumio, we’ve seen how microsegmentation transforms security strategies. It’s not just about meeting regulations — it’s about creating a proactive defense system that’s ready for new threats and resilient when an attack happens.

What’s next for healthcare cybersecurity?

The proposed HIPAA updates are more than regulatory tweaks — they’re a wake-up call for the healthcare industry. Healthcare organizations must move beyond outdated practices and adopt a forward-thinking approach to cybersecurity.  

Resilience is no longer optional; it’s a necessity.

These changes won’t be easy. Implementing them will require time, money, and a shift in mindset. But the cost of inaction is far higher. Cyberattacks are becoming more sophisticated, and the stakes are too high to ignore.

Healthcare organizations should see these updates as an opportunity, not a burden. By investing in resilience and adopting best practices like microsegmentation, they can build a stronger, more secure future.

The organizations that rise to this challenge will be better prepared for the threats of tomorrow — and will gain the trust of their patients and partners in the process.

Read our guide on how the Illumio Zero Trust Segmentation Platform can help you meet new HIPAA security requirements.

Related topics

Related articles

Meet Illumio in Las Vegas at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference
Zero Trust Segmentation

Meet Illumio in Las Vegas at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference

Join Illumio ZTS experts at this year’s Gartner IT IOCS on December 5-7 in Las Vegas.

Getting Segmentation Right With Structured Policy Control
Zero Trust Segmentation

Getting Segmentation Right With Structured Policy Control

Ultimately, Zero Trust Segmentation controls are about making and enforcing security rules to prevent the spread of breaches across systems and environments.

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them
Zero Trust Segmentation

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them

Zero Trust Segmentation is a proven way to prevent ransomware propagation, but may seem overwhelming for IT leaders at midsize organizations. Here are four common objections we've heard from them and how to overcome each.

9 Reasons Why Healthcare Providers Should Implement Zero Trust Segmentation
Zero Trust Segmentation

9 Reasons Why Healthcare Providers Should Implement Zero Trust Segmentation

Explore the benefits of Zero Trust Segmentation for your healthcare organization.

Connected Medical Devices: Healthcare’s Top Cybersecurity Vulnerability
Cyber Resilience

Connected Medical Devices: Healthcare’s Top Cybersecurity Vulnerability

Get insight into connected IoT medical device security vulnerabilities and how to solve it with Zero Trust Segmentation.

Why Healthcare Must Take a Breach Containment Approach to Cybersecurity
Zero Trust Segmentation

Why Healthcare Must Take a Breach Containment Approach to Cybersecurity

Get insight into the healthcare industry's rapid digital transformation in the context of the UK's NHS 75th anniversary.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?