{"id":800,"date":"2026-02-23T10:56:20","date_gmt":"2026-02-23T15:56:20","guid":{"rendered":"https:\/\/eagleassociates.net\/news\/?p=800"},"modified":"2026-02-23T10:56:20","modified_gmt":"2026-02-23T15:56:20","slug":"artificial-intelligence-cybersecurity","status":"publish","type":"post","link":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/","title":{"rendered":"Artificial Intelligence &amp; Cybersecurity"},"content":{"rendered":"\n<p>Many health and dental care organizations have already begun implementation of various forms of artificial intelligence (AI) technology into their operations (e.g., AI phone menus, AI transcription, etc.). Although the use of AI has its benefits, cybersecurity must be considered, because under HIPAA\u2019s Security Rule, you are required to ensure the security of all PHI that is received, stored, and transmitted.<\/p>\n\n\n\n<p>The National Institute of Standards and Technology (NIST) is an organization that develops best practices and standards for infrastructure, systems, networks and more. NIST has developed guidelines for cybersecurity in the AI era titled \u201cCybersecurity Framework Profile for Artificial Intelligence.\u201d You can find the guidelines <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2025\/12\/draft-nist-guidelines-rethink-cybersecurity-ai-era\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">here<\/mark><\/a>. These guidelines focus on ways that organizations can secure their AI systems, defend against cyberattacks, and thwart AI threats.<\/p>\n\n\n\n<p>It can be very helpful to share NIST guidance with your IT vendor, who should also be involved in implementation of AI technologies. Your IT vendor can identify areas of risk and help to mitigate them. Some of the NIST guidance may be difficult to understand for those who are not IT experts. However, the guidance may assist you in identifying risks you hadn\u2019t even considered when adopting AI.<\/p>\n\n\n\n<p>Foundationally, you should have a business associate agreement (BAA) with any vendor that provides AI services, and which will access, transmit, store, or work with EPHI. Be sure to obtain the BAA prior to granting any access to EPHI.<\/p>\n\n\n\n<p>In addition, all AI technologies should be evaluated as part of your Security Risk Analysis (SRA) to identify any vulnerabilities and risks associated with the products. Corrective actions may be identified during the SRA to reduce\/mitigate risks that are present. Again, your IT vendor will be an important resource in this area.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many health and dental care organizations have already begun implementation of various forms of artificial intelligence (AI) technology into their operations (e.g., AI phone menus, AI transcription, etc.). Although the use of AI has its benefits, cybersecurity must be considered, because under HIPAA\u2019s Security Rule, you are required to ensure the security of all PHI&#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/\">Continue reading <span class=\"meta-nav\">&#8594;<\/span><\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":801,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eagle-staff"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Artificial Intelligence &amp; Cybersecurity | Eagle Associates News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence &amp; Cybersecurity | Eagle Associates News\" \/>\n<meta property=\"og:description\" content=\"Many health and dental care organizations have already begun implementation of various forms of artificial intelligence (AI) technology into their operations (e.g., AI phone menus, AI transcription, etc.). Although the use of AI has its benefits, cybersecurity must be considered, because under HIPAA\u2019s Security Rule, you are required to ensure the security of all PHI... Continue reading &#8594;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Eagle Associates News\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-23T15:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"jennifer@eagleassociates.net\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jennifer@eagleassociates.net\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/\"},\"author\":{\"name\":\"jennifer@eagleassociates.net\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\"},\"headline\":\"Artificial Intelligence &amp; Cybersecurity\",\"datePublished\":\"2026-02-23T15:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/\"},\"wordCount\":294,\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/AdobeStock_633413653-1-scaled.jpeg\",\"articleSection\":[\"eagle associates staff\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/\",\"name\":\"Artificial Intelligence &amp; Cybersecurity | Eagle Associates News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/AdobeStock_633413653-1-scaled.jpeg\",\"datePublished\":\"2026-02-23T15:56:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/AdobeStock_633413653-1-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/AdobeStock_633413653-1-scaled.jpeg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2026\\\/02\\\/artificial-intelligence-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Artificial Intelligence &amp; Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\",\"name\":\"Eagle Associates News\",\"description\":\"News and More from Eagle Associates, Inc.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\",\"name\":\"jennifer@eagleassociates.net\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"caption\":\"jennifer@eagleassociates.net\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence &amp; Cybersecurity | Eagle Associates News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence &amp; Cybersecurity | Eagle Associates News","og_description":"Many health and dental care organizations have already begun implementation of various forms of artificial intelligence (AI) technology into their operations (e.g., AI phone menus, AI transcription, etc.). Although the use of AI has its benefits, cybersecurity must be considered, because under HIPAA\u2019s Security Rule, you are required to ensure the security of all PHI... Continue reading &#8594;","og_url":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/","og_site_name":"Eagle Associates News","article_published_time":"2026-02-23T15:56:20+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg","type":"image\/jpeg"}],"author":"jennifer@eagleassociates.net","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jennifer@eagleassociates.net","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/"},"author":{"name":"jennifer@eagleassociates.net","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d"},"headline":"Artificial Intelligence &amp; Cybersecurity","datePublished":"2026-02-23T15:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/"},"wordCount":294,"image":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg","articleSection":["eagle associates staff"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/","url":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/","name":"Artificial Intelligence &amp; Cybersecurity | Eagle Associates News","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg","datePublished":"2026-02-23T15:56:20+00:00","author":{"@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d"},"breadcrumb":{"@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#primaryimage","url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg","contentUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2026\/02\/AdobeStock_633413653-1-scaled.jpeg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/eagleassociates.net\/news\/2026\/02\/artificial-intelligence-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eagleassociates.net\/news\/"},{"@type":"ListItem","position":2,"name":"Artificial Intelligence &amp; Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/eagleassociates.net\/news\/#website","url":"https:\/\/eagleassociates.net\/news\/","name":"Eagle Associates News","description":"News and More from Eagle Associates, Inc.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eagleassociates.net\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d","name":"jennifer@eagleassociates.net","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","caption":"jennifer@eagleassociates.net"}}]}},"_links":{"self":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":2,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/800\/revisions"}],"predecessor-version":[{"id":803,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/800\/revisions\/803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media\/801"}],"wp:attachment":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media?parent=800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/categories?post=800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/tags?post=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}