Maintain logs of form versions, training dates, and risk analyses tied to systems that touch PHI.
Run tabletop exercises: “If this vendor were breached, which forms data would we need to account for?”
Continuous improvement beats scrambling when OCR letters arrive.