Most dental offices have one network. Every device in the practice, from the server running Dentrix to the Wi-Fi a patient connects to in the waiting room, shares the same network. That is a problem.
Network segmentation fixes it by dividing one network into separate zones. Each zone has its own access controls. Devices in one zone cannot freely communicate with devices in another. For a dental practice, this is both a security measure and a HIPAA requirement.

A dental office network carries two very different types of traffic. Clinical traffic includes patient records, X-rays, appointment data, billing information, and all the data your practice management and imaging software generate. Guest traffic includes whatever patients, visitors, and non-clinical staff devices bring onto your wireless network.
On a flat network, these two types of traffic share the same infrastructure. A compromised device on the guest network can attempt to reach clinical systems. An employee who connects a personal device to the same network as the server introduces risk. Even legitimate devices create interference and performance issues when all traffic competes on the same network.
Segmentation creates a wall between these zones. Clinical systems and guest devices share the internet connection but cannot reach each other.
This is the zone where your server, operatory workstations, front desk computers, and any device that accesses patient data lives. Access to this zone is restricted to authorized devices and users. No personal devices, no patient Wi-Fi, and no guest access belongs on this network.
Patients and visitors connect here. This network has internet access but cannot reach any clinical systems. It should also have bandwidth limits so patient devices cannot consume all available bandwidth and slow down clinical operations.
Some practices and most DSOs add a third zone for network management devices, security cameras, and access control systems. Separating this infrastructure from clinical and guest traffic adds another layer of isolation.

Network segmentation is configured through your firewall and managed switches. The firewall defines the rules about which traffic can pass between zones and which is blocked. Managed switches enforce those rules at the hardware level.
This is why business-class firewalls and managed switches are required for a properly configured dental practice network. Consumer-grade routers and unmanaged switches do not have the configuration capabilities needed to implement or enforce segmentation.
A wireless controller or business-class access point can create multiple Wi-Fi networks, such as EkimClinic and EkimGuest, that broadcast from the same physical access points but route traffic to different network zones. Staff connect clinical devices to the clinical network. Patients connect to the guest network. The access points handle the separation automatically.
HIPAA’s Security Rule requires covered entities to implement technical security measures to guard against unauthorized access to ePHI that is transmitted over an electronic communications network. Network segmentation is one of the primary technical controls that satisfies this requirement.
OCR investigations frequently identify flat networks as a technical security gap. A practice that can demonstrate a properly segmented network is in a stronger compliance position than one that cannot. For DSOs managing multiple locations, consistent network segmentation across all sites is a compliance standard that needs to be documented and verified.
HIPAA does not mandate segmentation by name, but it does require technical safeguards that control access to ePHI. Network segmentation is the most widely recommended technical control for satisfying this requirement in a dental office environment. OCR guidance and dental IT best practices consistently identify it as essential.
Only if your existing equipment is business-class with segmentation capability. A consumer router does not support proper VLAN configuration. A managed switch is required. If your current network uses consumer equipment, segmentation requires upgrading the hardware.
Ask your IT provider to confirm whether your clinical systems and patient Wi-Fi are on separate VLANs and whether the firewall has rules preventing traffic between those zones. If they cannot answer this question clearly, your network may not be properly segmented.
Yes. Ekim IT Solutions designs and configures segmented networks for dental practices across all 50 states. We provide on-site installation in New England and New York and remote configuration support for practices nationwide. Every network we build includes proper segmentation as a standard component.
Ekim IT Solutions works exclusively with dental practices. We serve New England and New York with on-site support and dental practices nationwide with remote support. Security, compliance, and everything in between so you can focus on patients.
Schedule a Fit Call: Find out in 15 minutes if we are the right fit for your practice.