25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

APT Group Actively Exploiting Windows MSHTML Platform Zero Day Flaw
Sep17

APT Group Actively Exploiting Windows MSHTML Platform Zero Day Flaw

A vulnerability patched by Microsoft on September Patch Tuesday is being exploited to deliver information stealing malware. The Microsoft Windows MSHTML Platform spoofing vulnerability is tracked as CVE-2024-43461 and has a CVSS base score of 8.8 (high severity). The vulnerability is rated as important by Microsoft, which stated that the vulnerability had not been exploited in attacks. Microsoft has now updated its advisory to confirm that the vulnerability has been exploited before July 2024 in an exploit chain with a second MSHTML spoofing vulnerability, CVE-2024-38112, a patch for which was released in its July 2024 security updates to break the attack chain. Trend Micro Zero Day Initiative’s Peter Girnus was aware that the flaw had been exploited but assumed that the patch to fix the CVE-2024-38112 vulnerability had successfully killed the attack chain and prevented exploitation; however, when the CVE-2024-38112 patch was reversed, he realized the issue had not been fixed and alerted Microsoft. The vulnerability allows an attacker to cause the browser to display erroneous data...

Read More
What is the Anti-Kickback Law in Healthcare?
Sep17

What is the Anti-Kickback Law in Healthcare?

The anti-kickback law in healthcare is a federal law that prohibits individuals and organizations from offering, paying, soliciting, or receiving anything of value in return for a direct or indirect business transaction reimbursable by a federal healthcare program. The law also applies to individuals and organizations who facilitate a prohibited transaction on behalf of another. The anti-kickback law first appeared as a provision of the Social Security Amendments Act of 1972 (§242). It has since been moved to become its own statute (42 USC §1320a-7b(b)). The statute itself has been extended to expand the definition of kickback and increase the number of scenarios in which the law applies. As the number of scenarios has increased, so have the number of exceptions (“safe harbors”) to the anti-kickback law in healthcare. What is a Kickback in Healthcare? A kickback in healthcare is defined as a remuneration to induce or reward referrals or business that will ultimately be paid for by a federal healthcare program. Remuneration can be for any healthcare service, drug, or medical...

Read More
7,000-Record Data Breaches Reported by Seneca Nation Health System & Catholic Charities
Sep17

7,000-Record Data Breaches Reported by Seneca Nation Health System & Catholic Charities

Seneca Nation Health System has reported a cyberattack to the HHS’ Office for Civil Rights that involved the protected health information of 7,633 patients. The Salamanca, NY-based non-profit public health system does not currently have a breach notice on its website and the information displayed on the HHS’ Office for Civil Rights breach portal is limited, stating that this was a hacking/IT incident involving a network server. The breach report appears to be a ransomware attack by the Inc Ransom ransomware group that was added to its data leak site in May 2024. This is not the first ransomware attack on Seneca Nation Health System, as it experienced an attack in 2019 that prevented access to its charts and scheduling system, although in that attack no patient data was compromised. A cyberattack was also experienced in 2022 that involved the protected health information of up to 12,000 individuals. Catholic Charities CYO of The Archdiocese of San Francisco Catholic Charities CYO of the Archdiocese of San Francisco has recently announced that it has experienced a network security...

Read More
Email Breach at Guam Seventh-Day Adventist Clinic Affects 56,000 Individuals
Sep17

Email Breach at Guam Seventh-Day Adventist Clinic Affects 56,000 Individuals

Email accounts have been compromised at Guam Seventh-Day Adventist Clinic and Mount Carmel Behavioral Health. The attack on Guam Seventh-Day Adventist Clinic involved the protected health information of 56,635 individuals and result in a breach of HIPAA email rules. Guam Seventh-Day Adventist Clinic Guam Seventh-Day Adventist Clinic in Tamuning, Guam, has recently notified 56,635 individuals about a breach of a limited number of employee email accounts. The email accounts were breached between January 23, 2023, and February 3, 2023. A breach notice was uploaded to its website to inform patients about the breach; however, notifications are only now being mailed due to the time taken to investigate the incident. On August 6, 2024, the clinic confirmed that personal and protected health information had been exposed and potentially acquired by unauthorized individuals, although no misuse of the affected information has been identified. The types of data involved varied from individual to individual and may have included names along with one or more of the following: address, phone...

Read More
Email Accounts Compromised in Atrium Health Phishing Attack
Sep16

Email Accounts Compromised in Atrium Health Phishing Attack

Charlotte, NC-based Atrium Health, a healthcare provider with 40 hospitals and more than 1,400 care locations in North Carolina, South Carolina, Georgia, and Alabama, has discovered unauthorized access to several employee email accounts. The unauthorized email account access was detected on April 29, 2024. Its email environment was secured, and a forensic investigation was conducted to determine the nature and scope of the unauthorized activity. The investigation confirmed that an unauthorized third party accessed a limited number of employee email accounts as a result of a phishing campaign. The phishing emails appeared to have been sent by a trusted source and several employees responded and inadvertently disclosed their account credentials, allowing their accounts to be accessed by an unauthorized individual for a short period between April 29 and April 30, 2024. The account review was completed on July 17, 2024, and confirmed that patients’ protected health information was present in the accounts. It was not possible to determine whether patient data was viewed or...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist