Your practice has one Wi-Fi network. The password is written on a sticky note at the front desk. Doctors, billing staff, medical devices, and patients in the waiting room all connect to the same network. A patient sitting six feet from your EHR workstation is on the same network as your patient database.
This is the most common Wi-Fi setup in small medical practices. It is also a HIPAA violation waiting to happen.
Wi-Fi signals extend beyond your walls — into the parking lot, the neighboring suite, the building lobby. Anyone within range can attempt to connect. And on a flat network with a shared password, a connected device in the waiting room can discover and potentially reach your EHR workstations, printers, medical devices, and shared folders. OCR has cited inadequate wireless security as a contributing factor in HIPAA violations with fines exceeding $1 million.
Why Your Wi-Fi Is a HIPAA Problem
HIPAA's Security Rule does not mention "Wi-Fi" by name. But it regulates any technology that transmits electronic protected health information (ePHI) — and your wireless network transmits ePHI every time a workstation accesses the EHR, a medical device sends vitals data, or a billing computer processes claims.
Four Security Rule standards apply directly to wireless networks:
- Transmission security (§164.312(e)): Guard against unauthorized access to ePHI transmitted over the network. For Wi-Fi, this means encryption — WPA3-Enterprise or WPA2-Enterprise at minimum.
- Access controls (§164.312(a)): Unique user identification for every person accessing ePHI. A shared Wi-Fi password provides zero individual accountability.
- Audit controls (§164.312(b)): Log who connected, when, from what device. Enterprise authentication (802.1X) provides this. A shared password does not.
- Person or entity authentication (§164.312(d)): Verify the identity of anyone accessing ePHI. Shared passwords fail this test entirely.
The combination of encryption, unique identification, audit logging, and access controls effectively requires enterprise-grade wireless authentication for any network carrying ePHI. A consumer router with a shared password does not meet the standard — regardless of how strong the password is.
The Three Non-Negotiables
1. Enterprise encryption (WPA2-Enterprise or WPA3-Enterprise).
WPA2-Personal (the "shared password" mode on consumer routers) fails HIPAA in three ways: no per-user authentication, no audit trail, and the password can be brute-forced offline if captured. Everyone uses the same key, and if an employee leaves, you must change the password for everyone.
WPA2-Enterprise uses 802.1X authentication with a RADIUS server. Each user logs in with unique credentials (username and password or a digital certificate). The system generates per-session encryption keys — even if one session is compromised, others remain secure. Every connection is logged with who, when, and what device.
WPA3-Enterprise adds 192-bit security, mandatory Protected Management Frames (preventing deauthentication attacks), and forward secrecy (past sessions cannot be decrypted even if the long-term key is compromised). If your hardware supports WPA3, use it. Most business-grade access points sold since 2020 support WPA3.
WPA2-Personal is acceptable only for your guest network — where no ePHI is accessible.
2. Network segmentation (VLANs).
Separate your wireless network into isolated segments using VLANs (virtual local area networks). At minimum, create four SSIDs on four VLANs:
- CLINIC-SECURE (VLAN 10): EHR workstations, clinical applications — WPA3-Enterprise or WPA2-Enterprise
- MEDICAL-DEVICES (VLAN 20): Connected medical devices (vital signs monitors, imaging, lab equipment) — WPA2-Enterprise
- ADMIN (VLAN 30): Front desk, billing, non-clinical staff — WPA2-Enterprise
- GUEST (VLAN 40): Patient and visitor Wi-Fi — WPA2-Personal with captive portal, completely isolated
Deny all traffic between VLANs by default. Create explicit allow rules only where needed — for example, VLAN 20 medical devices can send data to the EHR server on VLAN 10, but nothing else. The guest VLAN must have zero routes to any internal VLAN. Each VLAN gets its own DHCP scope with different IP subnets.
3. Logging and monitoring.
HIPAA requires you to retain wireless logs for six years. Your records must include:
- Every 802.1X authentication event — username, timestamp, MAC address, success or failure, assigned VLAN
- Connection and disconnection events for every device
- Failed authentication attempts (critical for detecting brute-force attacks)
- DHCP logs showing IP address assignments
- Rogue access point alerts
- Configuration change logs
Forward all logs to a centralized logging server for long-term retention and search. Set automated alerts for failed authentication attempts (more than 5 in 10 minutes), rogue access point detection, and configuration changes.
Guest Wi-Fi: How to Do It Right
Patients expect guest Wi-Fi. Here is how to offer it without creating a HIPAA liability:
- Captive portal: Require guests to accept a Terms of Use page before accessing the internet. Include a disclaimer that the network is for internet access only and is not private.
- Complete isolation: The guest VLAN must have zero routes to any internal VLAN. Also enable client isolation (AP isolation) so guest devices cannot see or communicate with each other.
- Bandwidth limiting: Cap guest bandwidth at 5-10 Mbps per user to prevent streaming from degrading clinical network performance.
- DNS filtering: Use a DNS filter to block malware, phishing, and inappropriate content on the guest network.
- Session time limits: Auto-disconnect guest sessions after 4-8 hours.
- Simple password rotation: If using a password, rotate it weekly or monthly and display it in the waiting room. This is acceptable because the guest network has no access to ePHI.
Test isolation regularly: Connect a phone to the guest network and try to access clinical resources. If anything responds, your segmentation is broken.
Hardware for Small Practices
You do not need enterprise-priced equipment. Here are reliable options for a practice with 5-15 employees:
Access points:
- Ubiquiti UniFi U6 Pro ($150-$180): Wi-Fi 6, WPA3, VLAN support, built-in RADIUS, free management software with no licensing fees. Best value for most small practices.
- Aruba Instant On AP25 ($200-$250): Wi-Fi 6, WPA3, cloud-managed with free tier, built-in RADIUS proxy. Good for practices without IT staff.
- Cisco Meraki Go GR62 ($200-$250): Wi-Fi 6, WPA3, cloud-managed, built-in guest portal. Subscription-free tier available.
Managed switch (required for VLANs):
- Ubiquiti USW-Lite-16-PoE ($200): 16 ports, 8 PoE (powers access points), full VLAN support.
- Aruba Instant On 1930 8G PoE ($200-$250): 8 ports, matches Aruba AP ecosystem.
Firewall/router:
- Ubiquiti UniFi Dream Machine Pro ($380): Router, firewall, UniFi controller, IDS/IPS in one device.
- Fortinet FortiGate 40F ($400-$500): Enterprise-grade next-generation firewall with FortiGuard subscription (~$300/year).
RADIUS server: Ubiquiti UniFi includes a built-in RADIUS server sufficient for small practices. For non-UniFi setups, JumpCloud offers cloud-hosted RADIUS — free for up to 10 users, $7-$11/user/month after that.
Example budget for a 10-person practice (~2,000 sq ft):
- 2 access points (Ubiquiti U6 Pro): $360
- 1 managed PoE switch: $200
- 1 firewall/router (UDM Pro): $380
- Cabling and installation: $300-$500
- Total: $1,240-$1,440 with no recurring licensing fees
Common Wi-Fi Mistakes
These are the wireless security failures found most often in small practices:
- One network, one password, everyone connects. Doctors, billing, and patients on the same network. This is the number one HIPAA wireless violation.
- Guest SSID on the same VLAN as clinical systems. A guest network exists but is not actually isolated. A patient's phone can discover workstations and shared folders.
- WPA2-Personal on the clinical SSID. Even with a strong password, shared-key authentication provides no individual accountability and no audit trail.
- Default router credentials. admin/admin or admin/password on the management interface. Attackers can reconfigure your entire network.
- Consumer-grade equipment. A $50 home router lacks VLANs, 802.1X, logging, and enterprise management. You cannot build HIPAA-compliant Wi-Fi on consumer hardware.
- No firmware updates. Access points and switches running firmware years out of date with known vulnerabilities.
- Clinical password on a sticky note. The WPA2-Personal key for the clinical network posted at the front desk, visible to every patient.
- No rogue AP detection. No alerts when unauthorized access points appear on the network — including personal hotspots brought in by staff.
Physical Security
Do not overlook the physical layer:
- Mount access points on ceilings with tamper-resistant brackets. Do not place them in public areas.
- Lock your network closet. The switch, firewall, and any servers should be in a locked cabinet. Only authorized IT personnel should have access.
- Reduce transmit power. Lower AP power to cover only your office footprint. Broadcasting at full power extends your network into the parking lot and neighboring suites.
- Disable unused switch ports. Prevents someone from plugging in an unauthorized device.
Getting Started
If your practice currently has a single network with a shared password, here is the upgrade path:
- This week: Audit your current setup. What router do you have? What encryption is enabled? Is the firmware current? Who has the password?
- This month: Purchase business-grade equipment (budget: $1,200-$1,500). Have your IT provider configure VLANs, 802.1X, and RADIUS.
- After setup: Test guest network isolation (connect a phone and try to reach clinical resources). Verify all clinical staff can authenticate with unique credentials. Confirm logging is capturing authentication events.
- Ongoing: Rotate guest passwords monthly. Revoke RADIUS credentials immediately when staff depart. Update firmware quarterly. Include wireless infrastructure in your annual HIPAA risk assessment.
The Bottom Line
HIPAA-compliant Wi-Fi costs $1,200 to $1,500 for a small practice — with no recurring licensing fees if you choose the right hardware. The cost of a Wi-Fi-related breach — $7.42 million on average for healthcare — makes that investment trivial.
If your practice has a single shared password and no network segmentation, fix it this quarter. Separate your clinical network from your guest network. Replace shared passwords with enterprise authentication. And log everything.
Book a free IT assessment and we will audit your wireless infrastructure, design a HIPAA-compliant network architecture, and handle the full implementation. Explore our managed IT services and cybersecurity plans that include network design and monitoring.