This legislation strengthens the cybersecurity posture of the healthcare sector by mandating federal coordination, establishing incident response protocols, enforcing stricter security standards, and providing grants and workforce training to improve resiliency.
Bill Cassidy
Senator
LA
The Health Care Cybersecurity and Resiliency Act of 2026 aims to strengthen the cybersecurity posture of the healthcare sector by mandating closer coordination between the Department of Health and Human Services (HHS) and the Cybersecurity and Infrastructure Security Agency (CISA). The bill establishes new cybersecurity standards for healthcare entities, including requirements for multifactor authentication and encryption, while creating a grant program to assist organizations in adopting these protections. Additionally, it enhances breach reporting transparency, provides specialized cybersecurity guidance for rural health providers, and directs the development of a strategic plan to grow the healthcare cybersecurity workforce.
The Health Care Cybersecurity and Resiliency Act of 2025 is a major push to lock the digital doors of our hospitals and clinics. At its core, the bill requires the Department of Health and Human Services (HHS) and the Cybersecurity and Infrastructure Security Agency (CISA) to stop working in silos and start co-authoring the playbook for defending medical data. It mandates that within one year, HHS must roll out a formal incident response plan to handle hacks, while also updating federal regulations to force healthcare providers to adopt modern security tech like multifactor authentication (MFA) and data encryption. If you’ve ever received a 'data breach' letter from your doctor, this bill is the government's attempt to make those letters a thing of the past by setting a high, mandatory floor for digital safety.
For the average patient, the most visible change will be how your data is handled behind the scenes. Section 9 of the bill updates the HIPAA-era privacy rules to require that any computer system holding your health records must use MFA—that's the extra step where you verify your identity via a code on your phone. It also requires 'penetration testing,' which is essentially hiring ethical hackers to find the holes in a hospital's network before the bad guys do. For a local clinic, this means moving away from old, 'legacy' software that hasn't been updated since the flip-phone era. While this keeps your records safer, it does mean your small-town doctor might have a bit of a learning curve as they upgrade their systems to meet these new federal standards.
Recognizing that a massive hospital in a city has more tech experts than a small clinic in a rural county, the bill includes a specific lifeline for rural providers. Section 10 requires HHS to create a tailored 'cyber readiness' guide specifically for rural entities, acknowledging that their challenges—like limited budgets and staff—are different. To back this up, Section 11 creates a grant program running through 2030. These grants can be used to hire cybersecurity pros, train current staff, or ditch old servers for more secure cloud-based systems. For a non-profit health center or a rural clinic, this could be the difference between staying open after a ransomware attack or being forced to turn patients away because their digital files are locked.
The bill also aims to pull back the curtain on what happens after a hack. Section 6 and 7 update the public breach portal so you can see not just that a breach happened, but exactly how many people were affected and what 'corrective actions' the government took against the company. It’s about accountability—making sure companies can't just sweep a leak under the rug. Finally, to make sure there are actually enough people to do this work, the bill tasks HHS with creating a strategic plan to grow the healthcare cybersecurity workforce. This includes training for 'asset owners'—the people who actually run the machines—so they know how to spot a phishing email before it cripples an entire hospital wing.