25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

OCR Issues Guidance on Ransomware Prevention and Response

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) has published a video presentation offering guidance to HIPAA-regulated entities on ransomware prevention and compliance with the HIPAA Security Rule.

The video presentation was released in recognition of National Cybersecurity Awareness Month to improve awareness of the threat of ransomware and educate HIPAA-regulated entities on how compliance with the HIPAA Security Rule can help prevent ransomware attacks and limit their impact.

OCR investigates all large data breaches (500 or more records) to determine if noncompliance with the HIPAA Rules led to or contributed to the attack. These investigations have allowed OCR to identify ransomware trends, which Nick Heesters, OCR’s senior advisor for cybersecurity, explains in the video presentation. Ransomware attacks on HIPAA-regulated entities increased by 102% between 2019 and 2023 and large numbers of attacks have already been reported this year. It is clear that ransomware is one of the biggest threats to health information privacy.

OCR is currently working on an update to the HIPAA Security Rule and there have been calls for much stricter cybersecurity standards for healthcare organizations; however, compliance with current HIPAA Security Rule provisions can greatly reduce an organization’s susceptibility to ransomware attacks and limit their severity should an attack succeed.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

OCR’s investigations of ransomware-related data breaches have revealed that some HIPAA-regulated entities have only partially complied with the provisions of the HIPAA Security Rule or have improperly implemented certain provisions. Had the entity been fully compliant, the attack could have been prevented or its severity could have been reduced. These compliance failures opened the door for hackers and security mistakes have allowed hackers to operate undetected inside healthcare networks for months.

In one investigation, OCR found that the covered entity had implemented a Security Information and Event Management (SIEM) system that generated rules-based alerts to identify potential unauthorized system activity. The SIEM system detected a potential compromise and sent the alerts via email to a member of the security team; however, that team member had left the organization 3 weeks prior to the attack and the email alerts were no longer being monitored.

Some of the most commonly identified HIPAA compliance failures include not providing security awareness training to all members of the workforce. Security awareness training is vital for raising awareness of threats and eradicating bad security practices that can give threat actors the access they need. A successful ransomware attack may result in file encryption, but not necessarily a data breach. OCR often found a lack of encryption for protected health information stored on the network. If encryption had been used, data exfiltration would not have exposed patient data and there would not have been a reportable breach to investigate.

The HIPAA Security Rule requires backups to be made, but poor backup practices are often identified in OCR’s investigations, such as the failure to use the 3-2-1 approach to backing up data – Make three separate backups, store them on at least two different media, and ensure that one copy is kept securely off-site. This approach will help to ensure a rapid recovery in the event of file encryption.

Recent enforcement actions by OCR over ransomware-related data breaches have identified insufficient reviews of activity in information systems, which allowed intrusions to go undetected for weeks or months. One of the most commonly identified HIPAA compliance issues is the failure to conduct a comprehensive, accurate, organization-wide risk analysis, manage the identified risks, and reduce them to a low and acceptable level.

Being fully compliant with the HIPAA Security Rule may not always prevent attacks and data breaches, but non-compliance or partial compliance with the HIPAA Security Rule often contributes to the failure to stop, contain, and recover from a ransomware attack. When OCR investigates data breaches, investigators look for any underlying noncompliance that caused or contributed to the attack. Three recent enforcement actions have resulted in financial penalties for non-compliance with the HIPAA Security Rule.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist