25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

CorrectCare Integrated Health Data Breach Lawsuit Settled for $6.49 Million
Sep23

CorrectCare Integrated Health Data Breach Lawsuit Settled for $6.49 Million

A class action lawsuit against CorrectCare Integrated Health LLC (CorrectCare) over a 2022 data breach that affected around 600,000 individuals has been settled for $6.49 million. The settlement has recently been granted final approval by the court. CorrectCare is a Kentucky-based third-party administrator that facilitates access to medical providers and manages the payment of medical claims for inmates at correctional facilities. In July 2022, CorrectCare identified a misconfiguration on its web server that allowed two file directories to be accessed over the Internet without authentication. The misconfiguration meant sensitive data was exposed over the Internet from January 22, 2022, to July 7, 2022, which included the data of individuals who received treatment between January 1, 2012, and July 7, 2022. The exposed data included names, dates of birth, inmate numbers, and limited health information, including diagnosis codes, CPT codes, treatment providers, dates of treatment, and for some individuals, Social Security numbers. A class action lawsuit was filed by the law firm Shub...

Read More
August 2024 Healthcare Data Breach Report
Sep23

August 2024 Healthcare Data Breach Report

There was a slight increase in large healthcare data breaches in August, reversing a four-month trend of falling data breaches. In August, 49 data breaches of 500 or more healthcare records were reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR)., Despite that increase, data breaches were still well below the average monthly breaches in the first half of the year. While there was an 8.9% month-over-month increase in reported breaches, there were 21% fewer breaches than the 12-month average of 62 data breaches a month and 32.9% fewer breaches than in August 2023. There was a sizeable month-over-month increase in the number of compromised healthcare records, which increased by 592.8% from around 1.4 million breached records in July to 9,680,551 breached records in August, reversing a 3-month trend of decreasing breach severity. August was the second-worst month of the year so far for breached healthcare records, but a considerable improvement on the 23 million breached healthcare records in August 2023. Over the past 12 months, an average...

Read More
Vanilla Tempest (Vice Society) Threat Group Using INC Ransomware to Attack Healthcare Orgs
Sep20

Vanilla Tempest (Vice Society) Threat Group Using INC Ransomware to Attack Healthcare Orgs

Microsoft has issued a warning about a threat group it tracks as Vanilla Tempest, which has been observed using INC ransomware to target the United States healthcare sector for the first time. INC ransomware is a ransomware-as-a-service (RaaS) operation that has proven popular with cybercriminals. In Q2, 2024, INC ransomware was the joint 5th most common ransomware variant, according to Coveware. INC ransomware emerged in July 2023 and primarily attacks the healthcare, education, and government sectors. INC ransomware has been used in recent attacks on National Health Service (NHS) Scotland (May 2024) and McLaren Health Care (Aug 2024). Vanilla Tempest (aka DEV-0832, Vice Society) is a Russian-speaking threat group that has been active since the summer of 2021. Rather than using its own unique encryptor, Vanilla Tempest has deployed versions of other ransomware variants including Hello Kitty/Five Hands and Zeppelin. Latterly, the group has also conducted attacks using the Blackcat and Rhysida ransomware variants. The group engages in double extortion, stealing sensitive data and...

Read More
Valid Credentials Most Common Initial Access Vector in Cyberattacks on Critical Infrastructure
Sep18

Valid Credentials Most Common Initial Access Vector in Cyberattacks on Critical Infrastructure

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published the results of an analysis of risk and vulnerability assessments (RVAs) at federal civilian executive branch (FCEB) agencies, state, local, tribal, and territorial (SLTT) stakeholders, and high-priority private and public critical infrastructure operators. The report provides insights into the most common vulnerabilities and attack paths cyber threat actors use to access internal networks. Malicious actors use a variety of methods to breach networks; however, the most common attack path involves valid accounts, which were used in 41% of successful attacks. RVA analyses revealed cracking password hashes was common and was successful in 89% of assessments conducted by the U.S. Coast Guard (USCG) to access Domain Administrator accounts. Accounts may be accessed that are internal or external to the network, often by using default credentials, brute forcing weak passwords, or by using stolen administrator accounts, including valid administrative credentials that have been purchased from initial access...

Read More
Richland County, WI Notifies 76,000 Individuals About October 2023 Cyberattack
Sep18

Richland County, WI Notifies 76,000 Individuals About October 2023 Cyberattack

Richland County in Wisconsin has started notifying 76,365 individuals that some of their protected health information was exposed in a September 2023 cyberattack. According to the substitute breach notification, Richland County identified unauthorized access to its network on or around October 4, 2023. After securing its systems to prevent further unauthorized access, an investigation was launched to determine the nature and scope of the unauthorized activity. The forensic investigation confirmed that there had been unauthorized access to its internal systems from September 28, 2024, to October 26, 2023, and during that time, files may have been accessed and/or acquired by an unauthorized individual. Based on the information disclosed in its website notice, it would appear that unauthorized access continued for 22 days after the breach was detected. The review of the affected files has taken around 10 months to complete. On August 1, 2024, Richland County confirmed that the impacted files included personal and protected health information. The types of data involved varied from...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist