Email is the number one attack vector in healthcare breaches. Learn how to secure every communication channel in your Arizona practice before the 2026 HIPAA Security Rule takes effect.

Email remains the most common entry point for healthcare data breaches. In 2025, 170 email-related HIPAA breaches were reported, impacting over 2.5 million patients. Nearly 75% of the breached organizations lacked basic email authentication protections that could have prevented the attacks. For healthcare practices in Phoenix and across Arizona, email security is not a secondary concern. It is a front-line compliance requirement.
The proposed 2026 HIPAA Security Rule raises the bar even further, requiring end-to-end encryption for any email containing ePHI. Standard TLS encryption between mail servers will no longer be considered sufficient. If your practice currently relies on consumer email tools or basic business email without proper configuration, you are likely out of compliance today and will certainly be out of compliance when the new rule takes effect. Understanding what HIPAA-compliant communication looks like, and implementing it across every channel, is essential for protecting your patients and your practice.
Standard email services like consumer Gmail, Yahoo, and Outlook.com transmit messages in plain text between servers, meaning ePHI can be intercepted in transit. Even if your provider uses TLS encryption, that protection only covers the connection between mail servers. It does not encrypt the message content itself.
Under the proposed 2026 HIPAA Security Rule, end-to-end encryption is required for any email containing ePHI. The Paubox report found that 41% of breached healthcare organizations fell into the highest risk category based on their email settings, up from 31% the previous year. For Phoenix healthcare practices, even a single unencrypted email containing a patient name and diagnosis can constitute a HIPAA violation.
HIPAA-compliant email requires several layers of protection working together. Encryption is the foundation: AES-256 for data at rest, TLS 1.2 or higher for data in transit, and end-to-end encryption for messages containing ePHI. But encryption alone is not enough.
Your email domain needs three critical authentication records. SPF (Sender Policy Framework) specifies which mail servers are authorized to send email on behalf of your domain. DKIM (DomainKeys Identified Mail) adds a digital signature to verify that emails were not altered in transit. DMARC (Domain-based Message Authentication, Reporting, and Conformance) tells receiving servers what to do with messages that fail SPF or DKIM checks. The Paubox report found that 75% of healthcare organizations breached through email in 2025 lacked these basic protections.
Additional requirements include multi-factor authentication for all email accounts that may contain ePHI, audit trails logging all email activity, a signed Business Associate Agreement with your email provider, and retention policies ensuring ePHI-related communications are kept for six years.
Email is just one of several communication vectors that require HIPAA compliance. Text messaging must use HIPAA-compliant platforms rather than standard SMS, which is unencrypted. Patient portals require encryption and access controls. Telehealth platforms must be HIPAA compliant with signed BAAs; the temporary COVID-era enforcement discretion that allowed non-compliant platforms has ended.
Fax machines remain common in many Arizona practices and are still a frequent source of HIPAA violations when patient information is sent to incorrect numbers or left in unsecured trays. Voicemail systems that contain ePHI must be secured with access controls and encryption. Social media should never be used to discuss patient information, even in private messages.
The 2026 rule's mandatory encryption requirements apply to all electronic communications containing ePHI. Practices should conduct a complete inventory of every communication channel used to send, receive, or store patient information, then verify that each channel meets HIPAA standards.
Technology alone cannot prevent email breaches. Phishing attacks targeting staff emails remain among the most common breach causes in healthcare. Your practice needs regular phishing simulation exercises, clear policies on what can and cannot be communicated via email, procedures for verifying patient identity before sending ePHI, and guidelines for handling suspicious emails.
One frequently overlooked risk is staff members auto-forwarding work email to personal accounts, creating unencrypted copies of ePHI outside the practice's control. Your email policies should prohibit auto-forwarding, and your IT provider should configure technical controls to prevent it. For Phoenix practices, where 93% of healthcare organizations experienced cyberattacks in 2025, comprehensive staff training is not optional.
QBitz Insight
When Qbitz IT audits email security for Phoenix healthcare practices, we consistently find three critical gaps: (1) email domains lacking DMARC, DKIM, and SPF records, which leaves the practice vulnerable to spoofing attacks, (2) staff members auto-forwarding work email to personal accounts, creating unencrypted copies of ePHI outside the practice's control, and (3) no email retention policy, meaning practices cannot demonstrate compliance during an OCR audit. We recommend a quarterly email security review as part of your ongoing HIPAA compliance program. Contact us at 480-900-2123.
A: No. Consumer versions of Gmail (free), Outlook.com, Yahoo Mail, and similar services are not HIPAA compliant and should never be used for ePHI. However, Google Workspace (Business Plus and Enterprise tiers) and Microsoft 365 (Business Premium and E3/E5 tiers) can be configured for HIPAA compliance if you obtain a signed BAA from the provider, enable encryption, configure data loss prevention policies, and implement multi-factor authentication. The key difference is the paid business tier with a BAA, not the email platform itself.
A: It depends on the content and the platform. Standard SMS is not encrypted and should not be used for ePHI. However, you can send appointment reminders that include only the patient's name, date, and time without clinical details using most platforms. For any communication that includes clinical information, diagnoses, treatment details, or other ePHI, you must use a HIPAA-compliant messaging platform with encryption and a signed BAA. Many patient engagement platforms (Weave, RevenueWell, Klara) offer HIPAA-compliant messaging built in.
A: Every healthcare practice should implement all three. SPF specifies which mail servers are authorized to send email on behalf of your domain. DKIM adds a digital signature to verify that emails were not altered in transit. DMARC tells receiving servers what to do with messages that fail SPF or DKIM checks. The Paubox report found that 75% of healthcare organizations breached through email in 2025 lacked these basic protections. Your IT provider should configure and monitor these records as part of standard email security.
A: HIPAA requires that documentation related to ePHI policies and procedures be retained for six years. For emails containing ePHI, best practice is to retain them for at least six years from the date of creation or the date they were last in effect, whichever is later. Arizona does not have a separate state-level retention requirement that exceeds HIPAA's. Your email archiving solution should be HIPAA compliant (encrypted, access-controlled) and should support search and retrieval for compliance audits or legal discovery.
A: Act immediately. Attempt to recall the message if your email platform supports it. Contact the unintended recipient and request they delete the message without reading or forwarding it. Document the incident in your HIPAA breach log with date, time, content, sender, and recipient. Conduct a breach risk assessment to determine if the disclosure constitutes a reportable breach. If the assessment determines the incident is reportable, notify affected patients and HHS within the required timeframes. Under Arizona law (A.R.S. 18-552), you must notify affected individuals within 45 days if a breach is confirmed. Review and update your email policies to prevent recurrence.
A: Absolutely. Any platform used for virtual patient consultations must meet HIPAA requirements, including end-to-end encryption, access controls, audit logging, and a signed BAA with the platform provider. Consumer video tools like FaceTime, standard Zoom, and Facebook Messenger are not HIPAA compliant. HIPAA-compliant telehealth options include Zoom for Healthcare (with BAA), Doxy.me, Updox, and platform-specific telehealth integrations within your EHR system. The temporary COVID-era enforcement discretion that allowed non-compliant platforms has ended.
Did You Know?
Under the proposed 2026 HIPAA Security Rule, standard TLS encryption between mail servers is no longer considered sufficient for protecting ePHI in email. The new requirement calls for end-to-end encryption, meaning the message must be encrypted from the sender's device to the recipient's device, not just between the email servers. If your practice currently relies on TLS-only email encryption, you will need to upgrade before the compliance deadline.