HIPAA Security Rule Updates: The Cybersecurity Changes Home Care Agencies Should Prepare For
Home Care Is a Target – Even Small Agencies
Cybersecurity is no longer a “big hospital problem.” Home care agencies are now prime targets because they often:
store highly valuable protected health information (PHI)
use multiple apps (some unsecured)
rely on mobile devices in the field
have limited IT staff
As HIPAA Security enforcement and expectations evolve, agencies that don’t take cybersecurity seriously face serious consequences: ransomware, operational shutdown, reputational damage, and costly penalties.
This blog is a practical guide for home care agency owners: what changes are coming, what risks you already have, and how to protect your agency without becoming an IT department.
Why HIPAA Security Is Changing
Threats have changed. The way agencies operate has changed. And enforcement is becoming more serious.
The biggest driver: healthcare breaches are increasing and home care agencies are part of that ecosystem.
Even if you’re small, the same rules apply when you handle PHI.
What Home Care Agencies Get Wrong About HIPAA Security
HIPAA is not just about privacy.
HIPAA Security is about:
access controls
encryption
audit trails
authentication
device security
secure communication
vendor accountability
And one of the most common home care violations is simple: staff using non-secure channels to communicate or store PHI.
Text messages. Personal email. Notes on phones. Shared login credentials.
The Biggest Cybersecurity Risks in Home Care
Here are the most common vulnerabilities:
1) Caregivers texting PHI
“Client has a UTI, please send nurse” seems harmless — but it’s PHI. If that message lives on an unsecured device, it’s a risk.
2) Shared logins
Shared accounts destroy accountability. If there’s a breach or audit, you can’t prove who accessed what.
3) Personal devices without protection
Caregivers often use their own phones. If the phone is lost and not encrypted, that’s a major exposure.
4) Unsecured cloud tools
Some agencies upload client documents into generic storage tools that were never meant for HIPAA.
5) Vendors without BAAs
If a vendor touches PHI, you need a Business Associate Agreement (BAA). No BAA = liability.
The 2026 HIPAA Security Checklist for Home Care Agencies
Here’s the practical plan every agency should implement this year:
1) Require Multi-Factor Authentication (MFA)
If your EMR or systems support MFA, turn it on.
MFA prevents:
stolen passwords
unauthorized logins
account takeovers
2) Use a HIPAA-Compliant EMR
A secure EMR is the foundation of your security posture.
You want:
encryption in transit + at rest
audit logs
role-based access controls
secure messaging
automatic backups
BAAs
Modern EMRs like INMYTEAM are built with HIPAA-grade controls to reduce your risk significantly.
3) Replace Texting with Secure Messaging
Secure messaging inside your EMR matters because it:
protects PHI
keeps communication tied to the client record
creates a record for audits
reduces mistakes
4) Lock Down Device Policies
Even if caregivers use personal devices, you can require:
passcode lock
auto-lock timer
no screenshots of client info
remote wipe (if feasible)
updated operating systems
The goal is to reduce “lost phone” disasters.
5) Create Role-Based Access
Not everyone needs access to everything.
Your system should allow:
caregivers access only to assigned clients
admins access to scheduling and billing
supervisors access to compliance dashboards
Role-based access reduces risk dramatically.
6) Perform an Annual Risk Assessment
HIPAA expects a security risk assessment, and most small agencies skip it.
Even a simple internal review helps:
identify gaps
update policies
confirm vendor compliance
prepare for audits
7) Train Staff With Real Examples
Training must include:
what counts as PHI
how breaches happen
what to do if a phone is lost
why texting PHI is dangerous
secure documentation rules
The Big Mistake: Thinking Security Is “IT’s Job”
In home care, security is operational.
Security affects:
caregiver workflows
client trust
compliance
billing
reputation
The best cybersecurity strategy is an EMR + workflows that minimize risk automatically.
Conclusion
HIPAA Security expectations are rising, but you don’t need to panic. You need a plan.
If you implement MFA, secure messaging, role-based access, device policies, and use a modern HIPAA-compliant EMR like INMYTEAM, you’ll dramatically reduce your risk and become a stronger agency in 2026.
Request a demo of INMYTEAM:
Want to see what others have to say about us? See our reviews here.

