25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Practice Resources Agrees to $1.5 Million Data Breach Settlement
May30

Practice Resources Agrees to $1.5 Million Data Breach Settlement

The New York-based management service organization, Practice Resources LLC, has agreed to pay $1.5 million to resolve a class action lawsuit that was filed in response to a 2022 hacking incident that affected more than 942,000 individuals. Syracuse, NY-based Practice Resources provides billing and other professional services to healthcare organizations. On April 12, 2022, the company experienced a ransomware attack that involved unauthorized access to sensitive information such as names, addresses, dates of treatment, health plan numbers, Medicare/Medicaid numbers, and medical record numbers. The data breach affected patients of at least 28 of its healthcare clients, and the incident was reported to the HHS’ Office for Civil Rights as affecting 942,138 individuals. Several lawsuits were filed in response to the data breach, which were consolidated in the U.S. District Court for the Northern District of New York – In re Practice Resources LLC Data Security Breach Litigation. The plaintiffs alleged that their data was compromised in the cyberattack, and data theft could have been...

Read More
High Severity Vulnerability Identified in Santesoft Sante DICOM Viewer Pro
May30

High Severity Vulnerability Identified in Santesoft Sante DICOM Viewer Pro

A high severity vulnerability has been identified in Santesoft Sante DICOM Viewer Pro, a professional DICOM medical image viewer, anonymizer, converter, and DICOM CD/DVD creator. The memory corruption vulnerability is tracked as CVE-2025-5307, and is an out-of-bounds read issue, which means the product reads data before and after the beginning of the intended memory buffer. A local threat actor could exploit the vulnerability in a low complexity attack to disclose sensitive information and potentially execute arbitrary code on vulnerable versions of Sante DICOM Viewer Pro. The vulnerability has been assigned a CVSS v4 base score of 8.4 and a CVSS v3.1 base score of 7.8. and affects Sante DICOM Viewer Pro version 14.2.1 and prior versions. Santesoft has fixed the vulnerability and advises all users to upgrade to v14.2.2 or a later version. At the time of writing, there have been no known cases of exploitation of the vulnerability. The vulnerability was reported to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) by researcher Michael Heinzl. To minimize the risk of...

Read More
Malicious Insider Incident Results in $800,000 HIPAA Penalty for Florida Health System
May29

Malicious Insider Incident Results in $800,000 HIPAA Penalty for Florida Health System

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) has announced its 9th financial penalty of the year under the Trump administration, and its 15th financial penalty of the year to resolve alleged HIPAA violations. The Florida healthcare provider, BayCare Health System, agreed to settle the HIPAA violation case and paid a $800,000 financial penalty. BayCare Health will adopt a corrective action plan and be monitored by OCR for compliance for two years. OCR investigates all reported data breaches affecting 500 or more individuals to assess HIPAA compliance, as well as some smaller breaches, but in this case, an investigation was launched in response to an October 2018 complaint from a patient about unauthorized access to her printed and electronic medical record following a visit to BayCare Health’s St. Joseph Hospital in Tampa, Florida. After receiving treatment at the facility, the woman claimed to have been contacted by an unknown individual who had photographs of her printed medical records. She also received a video recording of the person scrolling...

Read More
NIST Proposes New Metric for Predicting Probability of Vulnerability Exploitation
May29

NIST Proposes New Metric for Predicting Probability of Vulnerability Exploitation

Patching software to fix known vulnerabilities is an endless process and one that is vital for cybersecurity; however, with so many vulnerabilities being discovered, it is a major challenge for security teams to keep on top of vulnerability management. In 2024, there was a 39% increase in Common Vulnerabilities and Exposures (CVEs), with 40,003 added to the National Vulnerability Database. For busy security teams, there is an inevitable delay in patching all instances of software to fix known exploited vulnerabilities and vulnerabilities that will likely be exploited in the wild, which gives threat actors a window of opportunity to conduct attacks. It is therefore important to ensure that patches are prioritized. Only a small number of disclosed vulnerabilities are ever exploited, so prioritizing patching can help to ensure the best use of resources to keep the window of opportunity as short as possible. One study suggests that only around 5% of vulnerabilities are exploited, while the monthly remediation rate at companies is around 16%. If the 16% of patched vulnerabilities...

Read More
Silent Ransom Group Targets U.S. Law Firms with Vishing Attacks
May28

Silent Ransom Group Targets U.S. Law Firms with Vishing Attacks

The Cyber Division of the Federal Bureau of Investigation (FBI) has issued a warning to U.S. law firms about targeted attacks by the Silent Ransom Group. Since Spring 2023, the group has been consistently targeting U.S. law firms, although it has also conducted attacks in many sectors, including healthcare. The Silent Ransom Group has been in operation since 2022 and engages in data theft and extortion, breaching company networks, exfiltrating sensitive data, and issuing ransom demands. The group threatens to sell the stolen data or publish it on its dark web data leak site if the ransom is not paid. The group is known to contact employees at the attacked company to pressure them into engaging in ransom negotiations. Law firms are being targeted as they hold large volumes of highly sensitive data, and are thought to be more likely to pay a ransom to prevent the sale or publication of stolen data. The Silent Ransom group primarily gains access to victims’ networks through callback phishing campaigns that impersonate companies such as Duolingo and Masterclass, and others that offer...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist