25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Q3 Sees 8% Fall in Data Compromises; 77% Reduction in Victims
Oct16

Q3 Sees 8% Fall in Data Compromises; 77% Reduction in Victims

This year was on track to set a new record for data compromise incidents; however, there has been some good news – data compromises are down 8% from Q2, 2024, according to the latest data from the Identity Theft Resource Center (ITRC). In Q3, 2024, there were 672 publicly reported data compromises, which bring the running total for the year to 2,242 data compromise incidents – 70% of the total for all of 2023. That makes it unlikely that 2024 will set a new record for data compromises, although ITRC predicts that the annual compromise rate will be only slightly below last year’s record. The number of individuals affected by data compromise incidents in Q3, 2024 fell by 77% from the previous quarter, with 241,889,316 individuals confirmed as having their personal data compromised. Out of the 672 known compromises, 615 were data breaches affecting a total of 141,022,573 individuals and 6 were data exposure incidents involving the data of more than 100 million individuals. The latter includes a misconfiguration at the data broker MC2 Data, which primarily supplies data for...

Read More
Data Breaches Confirmed by Tri-City Healthcare District; TheraCom
Oct16

Data Breaches Confirmed by Tri-City Healthcare District; TheraCom

Tri-City Healthcare District, which includes Tri-City Medical Center in Oceanside, California, has recently informed the Maine Attorney General about a data breach affecting 108,149 individuals, including 14 Maine residents. Individual notifications were mailed to the affected individuals on October 11, 2024, informing them that unauthorized access to its computer network was identified on November 9, 2023. The forensic investigation confirmed that an unknown third party accessed files on its network on November 8, 2023, and retained access to its network until the following day when the intrusion was detected and blocked. The review of the affected files was completed on September 27, 2024, and confirmed that the files contained information such as names, addresses, dates of birth, Social Security numbers, medical treatment/diagnosis information, dates of service, health insurance provider names, health insurance claim information, and/or treatment costs. No evidence has been found to indicate any misuse of patient data; however, as a precaution, the affected individuals have been...

Read More
Rhysida Ransomware Group Claims Responsibility for AXIS Health System Attack
Oct16

Rhysida Ransomware Group Claims Responsibility for AXIS Health System Attack

AXIS Health System, a Colorado-based network of behavioral health facilities, has confirmed via its website that it has experienced a cyber incident. Few details have been released about the nature of the attack other than its incident response protocol has been initiated and an investigation is underway to determine the nature and scope of the incident. “If it is determined that patient data was impacted, affected individuals will be notified directly by mail,” explained AXIS Health in its website notice. Patient data does appear to have been stolen in the attack, according to the Rhysida ransomware group. Rhysida is a ransomware-as-a-service group that is known to attack healthcare organizations. An H1 2024 analysis by Barracuda Networks indicates that Rhysida was behind 8% of known ransomware attacks, between August 2023 and July 2024, and 38% of the group’s victims were healthcare organizations.  Recent attacks include BayHealth Healthcare System in Delaware, Community Care Alliance in Rhode Island, Ann & Robert H. Lurie Children’s Hospital in Chicago, and Prospect Medical...

Read More
Gryphon Healthcare Notifies 400,000 Patients About Recent Cyberattack
Oct16

Gryphon Healthcare Notifies 400,000 Patients About Recent Cyberattack

Gryphon Healthcare has recently confirmed a security incident involving unauthorized access to files containing the protected health information (PHI) of almost 400,000 individuals. Gryphon Healthcare is a Houston, TX-based provider of revenue cycle, coding, compliance, consultancy, and management services to healthcare providers such as hospitals, EMS providers, emergency departments, independent labs, medical imaging centers, ambulatory surgery centers, and physician practices. The security incident occurred at a partner for whom Gryphon Healthcare provides medical billing services. Gryphon Healthcare learned about the third-party incident on August 13, 2024, and following a comprehensive review of the affected files determined that the PHI of 393,358 patients of its healthcare clients had been exposed and potentially obtained by an unauthorized individual. Further information on the nature of the attack, such as whether ransomware was involved, was not disclosed. It is also unclear how many of its healthcare provider clients were affected. The file review was completed on...

Read More
Threat Actors Actively Exploiting Critical Fortinet; Veeam Backup & Replication Vulnerabilities
Oct15

Threat Actors Actively Exploiting Critical Fortinet; Veeam Backup & Replication Vulnerabilities

Ransomware actors have been observed exploiting a critical vulnerability in Veeam Backup & Replication, a data protection and recovery solution for virtual, physical, network-attached storage, and cloud-native environments. The deserialization of untrusted data vulnerability – CVE-2024-40711 – can lead to remote code execution and has a CVSS severity score of 9.8. According to Sophos, ransomware groups have been observed using compromised VPN credentials to access VPN gateways without multifactor authentication enabled, and then exploiting CVE-2024-40711 to create new local administrator accounts to deploy Akira and Fog ransomware. Sophos has tracked several attacks in the past month that exploited the vulnerability. While ransomware deployment was not always successful, in one of the attacks the threat actor successfully dropped Frog ransomware on an unprotected Hyper-V server and used rclone to exfiltrate data. The vulnerability affects Veeam Backup & Replication version 12.1.2.172, and potentially also unsupported versions. Veeam released a patch to fix the...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist