Your Dental Practice Has Never Had a HIPAA Risk Assessment. That's Exactly Why OCR Is Watching.

April 22, 2026
By Melissa Thornton, CISSP | Cybersecurity Advisory Group | cyberadvisor.tech

There are approximately 200,000 dental practices in the United States. The vast majority have never completed a formal HIPAA risk assessment. Not once.

That is not an assumption. It is what OCR investigators find, practice after practice, when they open an enforcement case. And dental offices are increasingly on their radar.

If you own or manage a dental practice, this post is going to cover what OCR is actually penalizing dental practices for right now, why your practice management software is likely creating compliance gaps you do not know about, and what your cyber insurance carrier is going to ask for at your next renewal — whether you are prepared or not.

Why Are Dental Offices a Growing Target for Cyberattacks?

Dental practices are not small, low-value targets. They are data-rich, security-poor, and increasingly on the map for ransomware operators.

Consider what a typical dental practice holds on every patient: full legal name, date of birth, Social Security number, insurance information, treatment history, X-rays and imaging, and financial payment data. That combination of personal, medical, and financial information is exactly what cybercriminals sell on dark web markets and exactly what makes a breach expensive to resolve.

At the same time, most dental practices run with one to five dentists, five to twenty-five total staff, and either no IT support at all or a local IT company that manages hardware and software but has no understanding of HIPAA security requirements. That gap between the value of your data and the maturity of your defenses is what makes dental offices attractive targets.

Cyberattacks on dental offices surged in 2025, with practices increasingly targeted for their data stores. This is not a trend that is slowing down.

What Is OCR Actually Doing to Dental Practices Right Now?

The Office for Civil Rights does not only go after hospitals. Some of its most notable recent enforcement actions have been against solo and small-group dental practices.

  • Gums Dental Care, a solo dental practice in Maryland, was hit with a $70,000 civil penalty by OCR in 2024. This marked OCR's 50th HIPAA Right of Access enforcement action — and it was a single-dentist practice.
  • Jefferson Dental Center was hit by ransomware in November 2024, with 12,340 patients affected.
  • Across 2025, OCR enforcement actions against dental offices accelerated, with the agency citing HIPAA Right of Access violations, failure to conduct risk assessments, and lack of documented security policies as the most common findings.

The Right of Access rule — which requires practices to provide patients with timely access to their own records — has become one of OCR's most active enforcement areas. Dental practices repeatedly show up in these cases because their workflows around patient records are informal, undocumented, and handled differently by every staff member.

The pattern across nearly every enforcement action is the same: no HIPAA risk assessment on file, no written security policies, and no documented procedure for handling patient data requests.

Is Your Practice Management Software Actually HIPAA Compliant?

This is one of the most common misconceptions in dental security, and it costs practices every year.

Dentrix, Eaglesoft, and Open Dental are the dominant practice management platforms in dentistry. Each of these vendors will tell you their software is built to support HIPAA compliance. What they will not tell you — because it is buried in your Business Associate Agreement — is that HIPAA compliance is your responsibility, not theirs. The software is a tool. How you configure it, who has access to it, how it is backed up, and whether it is connected to other systems securely is entirely on you.

The most common configuration gaps found in dental practice management software include:

  • No role-based access controls: Every staff member, from the front desk to the hygienist, has access to the same patient data with the same permissions
  • Automatic login or shared passwords: Staff log in once and leave the system open all day, meaning anyone who walks to that terminal can access patient records
  • Unencrypted backups: Patient data is backed up to an external hard drive or local server with no encryption, making it fully readable if stolen
  • No audit logging reviewed: The software logs who accessed what records and when, but no one has ever looked at those logs
  • Outdated software versions: Updates that patch known security vulnerabilities are not applied because the office manager does not want to deal with downtime

None of these are software failures. They are configuration and process failures — and they are exactly what an OCR investigator or a ransomware group will find.

What Does the 2025 HIPAA Security Rule Mean for Dental Offices?

The 2025 HIPAA Security Rule update eliminated the distinction between "addressable" and "required" implementation specifications. That distinction was the loophole that allowed small practices to skip controls they deemed unreasonable or unnecessary. That loophole is now closed.

Here is what is now mandatory for every dental practice, regardless of size:

Requirement What It Means for Your Practice
Encryption of all ePHI at rest and in transit Patient records stored on your server or sent via email must be encrypted.
MFA for all ePHI access Every login to your practice management software, email, and billing platform requires multi-factor authentication.
Annual HIPAA security risk assessment A documented risk assessment must be completed and updated every year.
Annual penetration testing Your systems must be actively tested for vulnerabilities on a scheduled basis.
Complete asset inventory You must document every device and system that stores or transmits patient data.
72-hour breach notification to HHS Confirmed breaches must be reported to HHS within 72 hours.

If your practice was not doing these things before, you are now out of compliance by default — not because of something you did wrong, but because the rules changed and most dental practices have not caught up.

What Is Your Cyber Insurance Carrier About to Ask You?

Cyber insurance renewal is one of the most reliable triggers that sends dental practice owners looking for help, and the requirements have changed significantly in the past two years.

Most cyber insurance applications for healthcare practices now require you to document and verify:

  • Multi-factor authentication on all systems that access patient data
  • Endpoint detection and response (EDR) on all practice computers
  • Encrypted, tested backups stored separately from your primary systems
  • A documented incident response plan
  • A completed HIPAA risk assessment within the past 12 months
  • Staff security awareness training conducted within the past year

If you cannot check those boxes, you are likely looking at a coverage denial, a significant premium increase, or a policy with exclusions that eliminate coverage for the exact scenarios you are trying to insure against.

The practices that wait until 30 days before renewal to figure this out are the ones that end up in a panic, accepting whatever terms they can get. The ones that address it now have leverage and documentation when the underwriter asks.

Does a Dental Practice with 8 Employees Really Need a vCISO?

Not a full-time one. A full-time Chief Information Security Officer costs $200,000 to $400,000 per year. That is not the right model for a dental practice with eight employees and one location.

What a dental practice with eight employees does need is someone with CISO-level expertise who can:

  • Complete a HIPAA risk assessment and produce documentation you can show to OCR or your insurer
  • Review your Business Associate Agreements with your practice management vendor, billing company, and any cloud services you use
  • Build written security policies that reflect how your office actually operates
  • Configure your practice management software with appropriate access controls and audit logging
  • Create a basic incident response plan so your staff knows exactly what to do if something goes wrong
  • Prepare you for cyber insurance renewal with the documentation your carrier requires

That is what a fractional vCISO delivers, at a fraction of the cost of a full-time hire, and without the overhead of recruiting, onboarding, and retaining an executive-level employee.

What Should a Dental Practice Do Right Now? (A Practical Starting Point)

If you manage a dental practice and you are not sure where your security posture stands, here is where to start.

Step 1: Pull your Business Associate Agreements.
List every vendor that touches patient data: your practice management software, billing company, cloud backup service, email provider, telehealth or patient communication platform. Every one of them needs a current, signed BAA. If you cannot find it, it may not exist.

Step 2: Audit your user accounts.
How many people have login access to your practice management software? When did you last remove a former employee's access? Do any accounts share a password? Role-based access controls and immediate deprovisioning of departed staff are two of the simplest and most impactful things you can do.

Step 3: Turn on MFA.
Multi-factor authentication is now a HIPAA requirement and a cyber insurance requirement. Turn it on for your practice management software, your email, and your billing platform. If your software does not support MFA natively, that is a gap worth flagging immediately.

Step 4: Verify your backups.
When were your patient records last backed up? Where are those backups stored? Have you ever tested whether you can actually restore from them? Encrypted, tested, off-site backups are the single most important technical control for surviving a ransomware attack.

Step 5: Schedule a HIPAA risk assessment.
Everything above feeds into a formal risk assessment, but the risk assessment is also where you find the gaps you did not know to look for. For a practice that has never had one, a HIPAA risk assessment is the starting point for building a defensible security program.

Frequently Asked Questions

  • Is Dentrix or Eaglesoft automatically HIPAA compliant if we use it correctly?
    No. These platforms are built to support HIPAA compliance, but compliance is the practice's responsibility. How the software is configured, who has access, and how data is handled are all outside the vendor's control and squarely yours.
  • We have a local IT company. Doesn't that cover our HIPAA requirements?
    IT support and HIPAA security compliance are different things. Your IT company keeps your systems running. HIPAA compliance requires a documented risk assessment, written policies, BAA management, and ongoing security governance — none of which fall within a standard IT support contract.
  • How much does a HIPAA risk assessment cost for a dental practice?
    Costs vary, but for a small dental practice, a thorough risk assessment should not require an enterprise budget. Cybersecurity Advisory Group conducts HIPAA risk assessments specifically for small healthcare practices, including dental offices, as part of the vCISO engagement.
  • What happens if a dental practice fails a cyber insurance audit?
    Coverage can be denied, premiums can increase substantially, or the policy can be rewritten with exclusions that eliminate coverage for ransomware or data breach events — exactly the scenarios you need coverage for.

The Bottom Line

Most dental practices are operating with a significant gap between the sensitivity of their patient data and the security controls protecting it. That gap is visible to OCR, to ransomware operators, and increasingly to cyber insurance underwriters.

Closing that gap does not require a massive IT budget or a full-time security team. It requires a documented risk assessment, a few basic technical controls, and written policies that reflect how your practice actually operates.

If you are not sure where your practice stands, a 15-minute conversation is enough to identify your biggest exposure points and what it would take to address them.

Schedule a Free 15-Minute HIPAA Gap Call with Cybersecurity Advisory Group →

Melissa Thornton, CISSP, is the founder of Cybersecurity Advisory Group and a veteran healthcare CISO with experience securing large health systems and building security programs from the ground up for small practices. Cybersecurity Advisory Group serves dental offices, mental health clinics, home health agencies, and specialty practices across the NY/NJ/CT tri-state area.

Related Blogs

April 22, 2026

Your Therapy Notes Are a Ransomware Target. Here's What Small Behavioral Health Practices Need to Know.

Read More
April 22, 2026

What the New HIPAA Security Rule Really Means for Small Practices

Read More
April 22, 2026

Field Clinicians on Personal Devices. Staff Accessing PHI Over Home WiFi. This Is the Home Health Security Problem Nobody Is Talking About.

Read More