April 23, 2026 OCR Action: Four settlements totaling $1,165,000. More than 427,000 patients affected. Every case cited the same root cause: an inadequate or absent HIPAA Security Rule risk analysis. All four entities agreed to two-year corrective action plans with OCR monitoring.
On April 23, 2026, the HHS Office for Civil Rights (OCR) announced settlements with four regulated entities to resolve ransomware-related HIPAA Security Rule investigations. Combined penalties totaled $1,165,000, the breaches affected more than 427,000 individuals, and every one of the four investigations identified the same failure: an inadequate, organization-wide risk analysis. For medical practices, clinics, dental offices, and health systems, the message is impossible to misread — risk analysis is the door OCR walks through, and ransomware is the lever that opens it.
What Did OCR Announce on April 23, 2026?
OCR settled four separate HIPAA Security Rule investigations tied to ransomware breaches. Each entity agreed to a corrective action plan with two years of OCR monitoring, in addition to the financial penalty:
| Entity | Patients Affected | Penalty | Key Finding |
|---|---|---|---|
| Assured Imaging | 244,813 | $375,000 | Medical imaging/screening provider — inadequate Security Rule risk analysis |
| Regional Women's Health Group (Axia Women's Health) | 37,989 | Undisclosed | Multi-state women's health network — inadequate Security Rule risk analysis |
| Consociate Health | 135,000+ | Undisclosed | 2020 phishing attack escalated to ransomware in late 2021 — inadequate risk analysis |
| Star Group, L.P. Health Benefits Plan | 9,316 | Undisclosed | Health benefits plan — inadequate Security Rule risk analysis |
| Total | 427,000+ | $1,165,000 | All: inadequate risk analysis |
These resolutions bring OCR's totals to 19 completed ransomware investigations and 13 completed Risk Analysis Initiative investigations. In every one of the four latest cases, OCR specifically cited risk analysis failures.
$1.165M
Combined Fines
427K+
Individuals Affected
4 of 4
Cited Risk Analysis Failure
Why Is Risk Analysis OCR's Lead Enforcement Tool in 2026?
The HIPAA Security Rule requires every covered entity and business associate to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to ePHI. OCR has signaled that in 2026 the Risk Analysis Initiative is expanding to also include risk management — regulators will look not only at whether you identified risks, but whether you actually acted on them.
The enforcement signal: A risk analysis that lives in a binder from three years ago will be treated, for enforcement purposes, the same as no risk analysis at all.
How Do Ransomware Attacks Turn Risk Analysis Gaps Into HIPAA Fines?
When ransomware hits, the entity files a breach report. OCR asks for the most recent Security Risk Assessment and the remediation plan that flowed from it. The Consociate Health timeline — phishing in 2020, ransomware in late 2021 — is the textbook version: the gap between initial access and detonation gives OCR a long stretch of unmanaged risk to point at.
Comparitech reported 201 ransomware attacks on healthcare in Q1 2026, 120 of them hitting providers directly. Each one is a potential OCR inquiry. The question isn't whether ransomware will reach your organization — it's whether your documentation will hold up when it does.
What Does a Defensible 2026 Risk Analysis Look Like?
OCR's enforcement record makes the requirements clear. A defensible risk analysis in 2026 has all of the following characteristics:
Completed within the last 12 months
Refreshed after any material system, vendor, or workflow change
Organization-wide: every system, location, vendor, and workflow that touches ePHI
Specific about threats: phishing, weak MFA, exposed file shares, missing BAAs
Each threat rated by likelihood and impact
Every finding linked to a remediation step, owner, and due date
Executed: tickets closed, controls deployed, training completed
Documented and retained — not just completed
Where Does File Sharing Fit In?
Unencrypted shares, consumer cloud drives without a Business Associate Agreement (BAA), and orphaned external links are common findings in healthcare risk analyses and OCR corrective action plans. They represent exactly the kind of specific, documented threat that a defensible risk analysis must identify — and that a remediation plan must close.
AXIS CloudSync provides HIPAA-aligned file sharing and storage with encryption, access controls, audit logging, and a BAA from $18/user/month (plans $15–$22/user/mo). It does not, alone, make a practice HIPAA compliant — no product can. It closes one of the most-cited gaps with a documented, BAA-covered control that can be pointed to in your risk analysis remediation log.
Frequently Asked Questions
What did the four April 2026 settlements have in common?
All four entities were cited for failures to conduct an accurate and thorough HIPAA risk analysis. Combined fines totaled $1,165,000 and more than 427,000 individuals were affected.
Does HIPAA require an annual risk analysis?
No fixed cadence is specified in the regulation, but OCR treats anything older than 12 months — or any analysis that doesn't reflect current systems and vendors — as inadequate for enforcement purposes.
What is the difference between risk analysis and risk management?
Risk analysis identifies threats and vulnerabilities to ePHI. Risk management is what you do about them — the remediation steps, controls deployed, and training completed. OCR's 2026 Risk Analysis Initiative covers both.
Are small practices targets for OCR enforcement?
Yes. The Star Group settlement involved fewer than 10,000 individuals. OCR enforcement is not limited to large health systems — any covered entity or business associate is subject to the same Security Rule requirements.
The April 23 settlements are the clearest signal yet: healthcare entities without a current, documented risk analysis are exposed in 2026.
AXIS CloudSync provides HIPAA-aligned, BAA-backed file sharing from $18/user/month — start a free trial and close a common Security Rule gap before it shows up in an OCR letter.
Schedule a Demo →

