Advisory

AHA Advisories provide urgent information for AHA members and the health care field, and actions they may need to take.

Hospitals and health systems are advised to remain alert and promptly report any unusual or suspicious cyberthreat activity. Please share the information following with your leadership, cybersecurity, information technology and security teams.
The issue of affordability, including health care affordability, is front and center this year and will be part of this year's congressional and administration discussions, as well as the mid-term elections.
The Centers for Medicare & Medicaid Services (CMS) Jan. 28 issued a proposed rule that would update the Medicare Conditions for Coverage for Organ Procurement Organizations (OPOs).
See an update that hospitals should share with their IT and cybersecurity teams.
The AHA invites members to participate in a Feb. 18 virtual briefing to learn about important issues affecting hospitals and health systems.
The Centers for Medicare & Medicaid Services (CMS) Feb. 9 released its 2027 proposed standards for the health insurance marketplaces, including the issuers and brokers who assist marketplace enrollees.
The Assistant Secretary for Technology Policy (ASTP)/Office of the National Coordinator for Health Information Technology (ONC) issued a proposed rule on Dec. 29, 2025, updating its Health Data, Technology and Interoperability (HTI) rules, referring to the proposal as HTI-5, as it is the fifth…
The issue of affordability, including health care affordability, is front and center this year and will be part of this year's congressional and administration discussions, as well as the mid-term elections.
The AHA supports policies and legislation that enable rural hospitals to care for their communities. The Rural Advocacy Agenda outlines some key areas of focus for our 2026 advocacy agenda.
The AHA has received credible reports of a widespread and ongoing phishing-as-a-service threat. Tycoon 2FA is a prolific PaaS platform that enables adversary-in-the-middle attacks that can capture session artifacts in real time, enabling attackers to bypass multi-factor authentication tools,…