Paubox blog: HIPAA compliant email - easy setup, no portals or passcodes

Modernizing healthcare communication

Written by Tshedimoso Makhene | August 07, 2025

Electronic health records (EHRs), telehealth, and cloud-based systems have transformed how healthcare professionals interact with patients and each other. But with progress comes vulnerability, as digital systems, while faster and more efficient, are more exposed to cyber threats, technical failures, and human error. In fact, according to the US Department of Health and Human Services, as quoted from the Hacker News, “There's been a 93% increase in large breaches from 2018 to 2022. In that same period, there's been a 278% increase in breaches involving ransomware.” This makes modern healthcare communication more prone to data breaches and compliance risks if not properly secured. The recent HIPAA Security Rule updates stress the need for healthcare organizations to modernize their communication systems and strengthen cybersecurity defenses.

“Recent HIPAA updates signal an urgent need to modernize outdated communication systems and fortify cybersecurity defenses,” says David Chou, Founder of Chou Group Healthcare Technology Advisory Services. “The challenge lies in upgrading 24/7 operational systems without disruption, making it critical for leaders to prioritize multifactor authentication and proactive incident response planning.” Chou’s insights are timely as the healthcare industry continues to face an increase in cyberattacks. 

 

Why modernizing healthcare communication is necessary

Healthcare is evolving rapidly, and the way information is exchanged must keep up. Outdated communication systems, once standard, are now ill-equipped to handle the demands of a digital, data-driven healthcare environment. An example of this is the use of fax machines in healthcare. 70% of healthcare providers were still using fax machines in 2021. However, these machines cannot integrate with electronic health records (EHRs)

From growing cybersecurity threats to rising patient expectations, the pressure to modernize is increasing. In the first half of 2025, U.S. healthcare organizations reported 311 data breaches to the HHS OCR involving 500 or more individuals. These incidents affected approximately 23.1 million individuals, and most of these breaches stemmed from hacking and IT incidents, many of which may involve outdated communication systems.

This is where modern communication tools, like email, come in. They ensure efficiency and continuity of care but also safeguard sensitive patient information. This is proven in the study Methods and Effectiveness of Communication Between Hospital Allied Health and Primary Care Practitioners: A Systematic Narrative Review, which states that “advances in health IT may offer a promising solution to the inconsistency of healthcare communication.”

Legacy systems like fax machines, unsecured email, and siloed databases may only increase the risk of data breaches and hinder collaboration between providers. As regulatory standards, like HIPAA, are updated to reflect today’s digital realities, healthcare organizations must view modernization as a necessity. 

Read also: Technology in healthcare

 

Outdated systems and their risks

Healthcare organizations often operate 24/7, relying on infrastructure that must always be available. Yet many of these systems were designed years ago, before cybersecurity became a central concern. Upgrading them is not as simple as flipping a switch, but involves phasing out the old technology and phasing in the new.

Legacy systems create several problems:

  • Security vulnerabilities: Older software may not support encryption, multifactor authentication (MFA), or regular patches.
  • Inefficiency: Manual processes like faxing or mailing documents slow down care delivery.
  • Non-compliance: Outdated systems may not meet modern HIPAA standards, exposing the organization to penalties.
  • Poor integration: Legacy tools often don’t integrate with newer EHRs or communication platforms, leading to data silos and duplication.

These risks are especially pronounced during transitions. As David Chou points out, "The challenge lies in upgrading 24/7 operational systems without disruption, making it critical for leaders to prioritize multifactor authentication and proactive incident response planning."

Read also: How legacy systems disrupt patient care

 

What the recent HIPAA updates emphasize

In December 2024, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a Notice of Proposed Rulemaking (NPRM) aimed at modernizing the HIPAA Security Rule, marking the first substantial update since 2013. These updates include: 

 

Elimination of “Addressable” vs. “Required” standards

Previously, “addressable” standards allowed entities to decide whether to implement certain safeguards, often considered as optional. The new proposal removes this distinction, making all implementation specifications mandatory, with only limited exceptions.

 

Mandatory encryption of ePHI

Encryption is no longer optional; it is now required for ePHI both at rest and in transit, ensuring that even if data is intercepted or stolen, it remains unreadable and protected.

 

Compulsory multi-factor authentication (MFA)

MFA transitions from “strongly recommended” to mandatory for access to all ePHI systems, with limited exceptions for very specific legacy medical devices (with transition plans).

 

Detailed risk analysis, asset inventory and mapping

Organizations must now:

  • Maintain an up-to-date written inventory of all technology assets handling ePHI.
  • Create a network map tracing how ePHI flows through systems.
  • Conduct formal risk analyses before implementing system changes and update them annually.

 

Enhanced administrative requirements

The draft adds mandates for:

  • Written policies and procedures covering patch management, workforce access, sanctions, and contingency planning.
  • Annual compliance reviews, penetration testing, and vulnerability scans.
  • Strict workforce access and termination controls, including timely deprovisioning and cross-entity notifications.

 

Formalized incident response and contingency planning

The proposal requires documented and tested incident response procedures, including:

  • Incident detection, reporting, and remediation workflows.
  • A 72-hour recovery mandate for critical health systems.
  • Business associate notification protocols: for example, alerting covered entities within 24 hours of contingency plan activations.

 

Stronger oversight of business associates

Businesses handling ePHI must:

  • Annually verify that technical safeguards are in place.
  • Notify covered entities within 24 hours of initiating contingency procedures.

Go deeper: HHS proposes updated HIPAA security rule

 

How these updates change the communication space

The 2025 HIPAA Security Rule updates reshape healthcare communication by raising the security baseline, enforcing accountability, and closing long-standing compliance loopholes. Here's how:

 

Secure communication is no longer optional; it’s mandatory

All digital communication, emails, patient portals, messaging apps, and document exchanges must use automatic encryption. This forces organizations to upgrade from legacy systems (e.g., unencrypted email, fax machines) to HIPAA compliant platforms like secure email providers, encrypted messaging apps, and telehealth tools.

 

Mandatory multi-factor authentication (MFA)

This sets a higher standard for user verification in messaging platforms, EHR portals, and collaboration tools. Providers must now integrate MFA into all communication endpoints, adding a layer of defense against phishing, credential theft, and unauthorized access.

 

Asset inventory and network mapping are now required

Healthcare organizations must now formally track every communication tool in use (e.g., email platforms, texting apps, file-sharing services). Shadow IT, unapproved or informal communication tools, will be considered a serious compliance risk and must be eliminated or integrated into governance.

 

Testing and policies for communication systems

Ongoing penetration tests, vulnerability scans, and staff training become essential parts of system upkeep. This creates a more resilient and proactive communication environment.

 

Business associates face stricter oversight

Healthcare organizations must re-evaluate their vendor relationships. All email, telehealth, and messaging providers must offer full HIPAA compliance, rapid breach response protocols, and technical safeguards, pushing the industry toward more transparent and secure communication ecosystems.

 

Incident response integration with communication tools

Healthcare communication tools must now support incident response, including breach notifications, system lockdowns, audit logs, and secure backup channels. Real-time alerts and traceability become standard requirements.

 

How Paubox aligns with the 2025 HIPAA Security Rule updates

As healthcare providers face new HIPAA mandates in 2025, Paubox emerges as a leading solution that already meets or exceeds many of the proposed standards. Its all-in-one, HIPAA compliant email platform simplifies secure communication without sacrificing usability, helping organizations transition smoothly into this new regulatory landscape.

 

Seamless and automatic email encryption 

With the updated HIPAA Security Rule making encryption of ePHI mandatory, both in transit and at rest, Paubox encrypts every email by default, without requiring patient portals, login credentials, or message retrieval links. This automatic and seamless encryption ensures compliance while maintaining provider-patient communication flow, whether on desktop or mobile.

 

Built-in multi-factor authentication (MFA)

With MFA now required for system access, Paubox supports two-factor authentication (2FA) and integrates seamlessly with identity management systems like Google Workspace and Microsoft 365. This provides an extra layer of protection against credential theft and phishing.

 

Comprehensive audit trails and access logging

To meet HIPAA’s updated requirements for activity monitoring, Paubox provides detailed audit logs of sent, received, and encrypted emails. These logs support internal reviews, compliance reporting, and incident response investigations.

 

Proactive threat detection and spam protection

Paubox Email Suite includes inbound threat protection, scanning emails for malware, ransomware, and phishing attempts. This aligns with the 2025 requirement for formalized risk management and early incident detection.

 

Business associate agreement (BAA) and vendor accountability

Paubox signs a business associate agreement (BAA) with every customer, demonstrating full commitment to HIPAA compliance. With tighter oversight of business associates under the new rule, the contract ensures shared accountability for data protection.

 

Incident response support

Should a breach occur, Paubox is equipped to support your incident response plan with:

  • Rapid log access for breach analysis.
  • Secure, encrypted outbound messaging for breach notifications.
  • 24/7 customer support to assist in incident mitigation.

Learn more: Features of Paubox Email Suite

 

FAQS

What types of communication need to be HIPAA compliant?

Any communication that involves protected health information (PHI), including emails, text messages, telehealth platforms, EHR messaging, and cloud file sharing, must meet HIPAA compliance standards, including encryption, access control, and audit logging.

 

What are the penalties for failing to comply with the updated HIPAA Security Rule?

Penalties can range from $142 to $71,162 per violation, with an annual maximum of over $2 million for identical provisions. OCR may also impose corrective action plans, audits, or referrals for criminal investigation in cases of willful neglect.

 

Do solo providers or small practices need to comply with these updates?

Yes. HIPAA applies to all covered entities and business associates, regardless of size. Small practices must take appropriate steps to meet the new requirements, such as using encrypted email, enabling MFA, and maintaining up-to-date policies and training.

 

Are healthcare vendors also affected by the HIPAA updates?

Yes. Business associates, like email providers, cloud platforms, and IT support, must also adhere to the stricter requirements, including encryption, security assessments, and breach notification protocols.