Cybersecurity Basics

A Small Business Guide to HIPAA Compliance and IT Security

March 10, 20257 min readProSIGHT Security

If your small healthcare business handles patient data, HIPAA compliance isn't optional. Here's what you need to understand about the IT requirements.

HIPAA Is About More Than Privacy Policies

The Health Insurance Portability and Accountability Act (HIPAA) is a federal privacy and security regulation that applies to healthcare providers, health plans, and healthcare clearinghouses. For small healthcare offices — medical practices, dental offices, physical therapy clinics, mental health practices — HIPAA compliance isn't optional. It's a legal requirement with significant penalties for violations.

Many small healthcare businesses have a general awareness of HIPAA as a compliance and documentation requirement, but they underestimate how much of HIPAA is actually about technology and security. The HIPAA Security Rule, in particular, lays out specific requirements for protecting electronic protected health information (ePHI) — patient data stored, transmitted, or processed by your IT systems.

What HIPAA Requires From a Technology Standpoint

Access Controls and Audit Logging

HIPAA requires that you control who can access patient data and verify that access is appropriate. This means unique user logins (not shared credentials), role-based access (a front desk person shouldn't have access to medical records they don't need), and audit logs that record who accessed what data and when. You need to be able to generate a report showing who accessed a specific patient's records on a specific date — and for this to be accurate and complete.

Most healthcare IT systems maintain audit logs, but many small offices don't regularly review them or don't have processes in place to respond to inappropriate access.

Encryption of Patient Data

HIPAA requires that patient data be encrypted both in transit (when it's being transmitted over networks) and at rest (when it's stored on devices or servers). If a laptop containing unencrypted patient data is stolen, that's a reportable breach. If the same data is stolen but encrypted, it's not a breach (because an attacker can't read the data without the encryption key).

For small offices still using physical file cabinets, encryption applies to any digital copies of patient data. For offices using electronic health records (EHR) systems, encryption is typically built in — but only if it's configured and enabled.

Secure Authentication

HIPAA explicitly requires strong authentication for systems that contain patient data. "Strong" means more than just a password. In practice, this means multi-factor authentication (MFA) for any system that stores or accesses ePHI, though HIPAA doesn't mandate MFA specifically — it requires a level of security that, in modern threat landscape, generally means MFA.

HIPAA also requires that passwords meet certain strength requirements, that they be changed periodically, and that they not be shared.

Security Awareness and Training

HIPAA requires regular security training for all staff members who handle patient data. Training should cover privacy practices, secure handling of patient information, recognition of suspicious activity, and what to do if a breach or unauthorized access occurs. The regulation requires documented evidence that training has occurred.

Incident Response and Breach Notification

If a breach occurs — an unauthorized access to patient data — HIPAA requires that you investigate, quantify the risk to patient privacy, and notify affected individuals if there's a likelihood that privacy was compromised. If the breach involves more than 500 people, you must also notify the media and the Secretary of Health and Human Services. The notification process is procedurally complex and requires documentation of your investigation.

Business Associate Agreements

If you use vendors or contractors who have access to patient data — cloud hosting providers, email services, backup providers, IT support vendors — you need Business Associate Agreements (BAAs) with them. A BAA is a legal contract that commits the vendor to HIPAA compliance and allows them to process ePHI on your behalf. Using a vendor to handle patient data without a BAA is a HIPAA violation, even if the vendor is trustworthy.

Common Compliance Gaps in Small Healthcare Offices

Shared Logins and Lack of Audit Trails

Many small practices share login credentials for their EHR or practice management system — all front desk staff use the same account, or all clinicians share administrative credentials. This violates HIPAA's requirement for unique logins and makes audit logging ineffective because you can't tell who accessed what.

EHR Systems Running on Unencrypted Devices

A laptop running unencrypted EHR data, or a mobile device without encryption, is a HIPAA compliance failure. If the device is stolen or lost, you have a reportable breach. Many small practices haven't enabled full-disk encryption on their workstations or verified that their EHR vendor is encrypting data in transit and at rest.

No Business Associate Agreements

Practices often use email services, cloud backup, IT support vendors, or other third-party services without realizing that these vendors need BAAs. Using a personal Gmail account or unsanctioned cloud storage to handle patient data — even temporarily — is a HIPAA violation.

Inadequate Safeguards for Remote Access

Especially post-pandemic, many healthcare staff work remotely and access patient data from home. Ensuring that remote access is secure — encrypted connections, strong authentication, and device security controls — is a HIPAA requirement that many practices struggle with.

No Documented Incident Response Plan

HIPAA requires that you have a plan for responding to breaches and unauthorized access. If you don't have a documented procedure for investigating incidents, notifying affected individuals, and reporting to authorities, you're not compliant. The plan doesn't need to be elaborate, but it needs to exist and be communicated to staff.

The Role of IT and Security Services

It's important to note that ProSIGHT Security does not specialize in or provide HIPAA compliance consulting directly. However, the IT and cybersecurity controls that support HIPAA compliance — MFA, encryption, access controls, audit logging, incident response capabilities — are core components of any mature IT security program. Many managed IT and security providers work with healthcare clients to help implement the technical controls that support compliance.

When evaluating IT providers for your healthcare practice, ask specifically about their experience with healthcare compliance, whether they can help you audit your current setup against HIPAA requirements, and whether they can provide the technical controls and documentation needed to demonstrate compliance.

The Compliance Journey

Achieving HIPAA compliance is not a one-time project — it's an ongoing process. Regulations evolve, new technologies emerge, and your business changes over time. Regular audits of your IT setup, training for staff, and partnership with vendors who understand healthcare requirements are essential. The goal is to protect patient privacy while building IT infrastructure that enables your practice to scale and operate efficiently.