25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Critical Infrastructure Entities Warned About Medusa Ransomware as Victim Count Hits 300
Mar13

Critical Infrastructure Entities Warned About Medusa Ransomware as Victim Count Hits 300

A warning has been issued about the Medusa ransomware-as-a-service (RaaS) group, which has now claimed more than 300 victims in critical infrastructure sectors including healthcare, education, and manufacturing. The group has been active since June 2021 when it started as a closed group, before adopting the RaaS model, where affiliates are recruited to conduct attacks for a percentage of any ransom payments they generate. Around two years after the group formed, Medusa launched a data leak site where victims are named and stolen data is published if the ransom is not paid. This double extortion method, where the ransom must be paid to obtain the decryption keys and prevent the publication of stolen data, is common among RaaS groups, although in the case of Medusa, its core members have retained control of ransom negotiations. According to the joint cybersecurity alert from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the Medusa developers recruit initial...

Read More
Is Airtable HIPAA Compliant?
Mar12

Is Airtable HIPAA Compliant?

Airtable is HIPAA compliant for covered entities and business associates who subscribe to an Enterprise Scale plan and enter into a Business Associate Agreement with Airtable. However, covered entities and business associates are advised that limitations apply to how Airtable can be used in compliance with HIPAA. Airtable is a customizable business management platform with automation capabilities that helps organizations better manage data by enabling connections between siloed databases. The platform can be used – for example – for collaborative project management, inventory management, or data collection and analysis. Airtable can also function as a CRM solution due to numerous integration options. In healthcare, Airtable has many potential uses. It could be used to keep track of appointments and consultant availability, streamline care teams’ workflows, or be used to build relational databases that track patients’ healthcare journeys and automatically trigger actions (i.e., run scripts, send MS Teams notifications, etc.) when specific events occur. However, these uses...

Read More
Columbus Regional Healthcare Agrees to $1,175,000 Data Breach Settlement
Mar12

Columbus Regional Healthcare Agrees to $1,175,000 Data Breach Settlement

Columbus Regional Healthcare has agreed to a $1,175,000 settlement to resolve litigation stemming from a May 2023 data breach. The breach was detected on May 21, 2023, and the forensic investigation confirmed that hackers had access to parts of its network between May 19, 2023, and May 21, 2024, including systems that contained the personal and protected health information of 132,887 individuals. The file review was completed on December 28, 2023, and it was confirmed that the data exposed in the incident included names, addresses, birth dates, Social Security numbers, driver’s license information, passport numbers, financial account information, medical histories, and health insurance information. The affected individuals were notified about the data breach in January 2024, and complimentary credit monitoring services were offered to individuals who had their Social Security numbers compromised. Lawsuits were filed in response to the data breach, which were consolidated into a single lawsuit – In Re: Columbus Regional Healthcare System – in Columbus County, North...

Read More
Is HIPAA Training Required Annually?
Mar12

Is HIPAA Training Required Annually?

Yes, HIPAA training is required annually because it is a best practice to schedule HIPAA annual refresher training. This is required in case additional training has not been necessary due to a change in policies, the outcome of a risk assessment, the enforcement of a sanctions policy, or a corrective action plan following the notification of a data breach. Is HIPAA Training Required Annually? The HIPAA text does not provide a deadline for providing training and incorporates flexibility to make it easier for healthcare organizations to fit training into busy workflows. The HIPAA Privacy Rule states “A covered entity must train all members of its workforce on the policies and procedures with respect to protected health information,” and training should be provided “as necessary and appropriate for the members of the workforce to carry out their functions within the covered entity.” In addition to initial training, a covered entity must provide training when “functions are affected by a material change in the policies or procedures.” That means further training is required when...

Read More
58% of Ransomware Attacks Involve Compromised Perimeter Security Appliances
Mar12

58% of Ransomware Attacks Involve Compromised Perimeter Security Appliances

A new report from the cyber insurance and security services provider Coalition has revealed the most common initial access vectors in ransomware attacks. Based on an analysis of claims, Coalition determined the most commonly exploited technology was compromised perimeter security devices such as a virtual private network or firewall, which were involved in almost 6 out of 10 ransomware attacks. The most commonly compromised products were perimeter security appliances from Fortinet, Cisco, SonicWall, and Palo Alto Networks. Around 2 out of 10 attacks involved remote desktop software, with Microsoft’s Remote Desktop Protocol (RDP) accounting for 80% of attacks involving this type of technology. Email was the third most exploited technology, with the majority of email-related compromises due to social engineering attempts such as phishing. The most common attack vector was compromised credentials, typically for RDP and VPNs, which provide threat actors with privileged access to internal networks. An analysis of activity logs revealed 42% of attacks involved brute force tactics, where...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist