25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Feds Issue Secure by Design Guidance for Software Purchasers
Aug09

Feds Issue Secure by Design Guidance for Software Purchasers

Cybercriminals and nation-state threat actors are targeting software vendors. A successful attack on a vendor could see the threat actor gain access to all their clients’ networks, providing a massive return for the same amount of effort as attacking a single customer. While some software vendors have taken great strides towards making their infrastructure and software secure, with others, much of the burden of cybersecurity falls on their customers. In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), and their international partners published secure by design guidance for software manufacturers which explains the principles and approaches for secure by design software to help manufacturers incorporate cybersecurity during the design phase, ensuring out-of-the-box protections for software users that last for the entire product lifecycle. This week CISA and the FBI published a companion secure by design guide for software customers to help them understand a software manufacturer’s approach...

Read More
CISA, FBI Issue Updated Warning Confirming Royal Ransomware Has Rebranded as BlackSuit
Aug08

CISA, FBI Issue Updated Warning Confirming Royal Ransomware Has Rebranded as BlackSuit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning about the BlackSuit ransomware group, which CISA and the FBI have confirmed today is a rebrand of the Royal ransomware – A group responsible for many attacks on healthcare organizations. CISA and the FBI first issued a warning about the Royal ransomware group in March 2023 and updated the alert in November 2023 to include new tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs). The latest update confirms that, not for the first time, the ransomware group has rebranded. Members of the group are believed to have been part of the Conti ransomware operation, a highly professional and extremely prolific ransomware group that ceased operations in the summer of 2022 and split into several smaller groups. Royal Ransomware first appeared in September 2022, but the members of the group are believed to have split from Conti in early 2022 when they started out on their own under the name Zeon. Initially, the group used third-party...

Read More
HHS Updates Civil Monetary Penalty Amounts for HIPAA Violations
Aug08

HHS Updates Civil Monetary Penalty Amounts for HIPAA Violations

The Department of Health and Human Services (HHS) has applied the annual inflation update to its civil monetary penalty (CMP) amounts, per the Federal Civil Penalties Inflation Adjustment Act Improvements Act of 2015. In December each year, the Office of Management and Budget (OMB) sets the annual inflation multiplier for all government agencies, which is calculated from the Consumer Price Index for all Urban Consumers (CPI-U) for October 2023. OMB requires the adjustment to be applied to each HHS agency’s CMPs by January 15th of each year. The HHS is usually one of the last government departments to apply the updates to its CMP amounts, with the update often applied several months after the January deadline. The HHS has missed the OMB deadline every year since 2017, although was only a few days late in 2020. Last year the update was not applied until October 6, 2024. On August 8, 2024, the HHS published confirmation in the Federal Register that the inflation multiplier has been applied, which will see CMP amounts increased by the OMB’s multiplier of 1.03241 across all HHS...

Read More
CrowdStrike Confirms Root Cause of Falcon Sensor Outage; Healthcare Losses Anticipated to be $1.94B
Aug08

CrowdStrike Confirms Root Cause of Falcon Sensor Outage; Healthcare Losses Anticipated to be $1.94B

As promised, CrowdStrike has published the root cause analysis of the faulty Falcon Sensor software update that caused Windows devices around the world to crash. CrowdStrike had previously published the preliminary findings from its investigation, which confirmed that this was a Channel File 2971 incident caused by a faulty update involving a new Template Type. The purpose of the update was to improve visibility into novel attack types. The new Template Type had previously been used without incident; however, on July 19, 2024, despite passing multiple levels of testing, the update triggered an out-of-bounds memory read issue, causing Windows devices to get caught in a loop and display the Blue Screen of Death. CrowdStrike has now confirmed that several shortcomings have been identified that led to the crash, the most significant of which was a parameter mismatch in its rapid response content update. Falcon Sensor was expecting to receive 20 input fields but instead received 21, triggering an out-of-bounds memory read. The update on July 19, 2024, was the first IPC Template Type to...

Read More
Noncompliance with Performance Standards Contributed to Case Flow Delays at Alaska Medicaid Fraud Control Unit
Aug08

Noncompliance with Performance Standards Contributed to Case Flow Delays at Alaska Medicaid Fraud Control Unit

A performance review of the Alaska Medicaid Fraud Control Unit by the Department of Health and Human Services’ Office of Inspector General (HHS-OIG) has uncovered multiple areas of concern, where the Units’ performance fell short of the requirements of a Medicaid Fraud Control Unit (MFCU) grant award. MFCUs investigate Medicaid provider fraud and patient abuse/neglect and prosecute cases under state law or refer those cases to other prosecuting offices. Unless there is a waiver, each state must have an MFCU. Currently all 50 states, DC, Puerto Rico, and the U.S. Virgin Islands operate MFCUs. Each MFCU receives an annual grant award which covers 90% of expenditures for new units and 75% of expenditures for all other units, with the shortfall made up with collections from their enforcement activities. HHS-OIG has oversight of MFCUs and conducts reviews to assess performance against the requirements of the grant awards and recertify the Units. HHS-OIG conducted a review of the Alaska MFCU in 2016 and identified a number of issues. Case files lacked documentation of periodic...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist