25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

What Does DME Stand For in Healthcare?
Aug07

What Does DME Stand For in Healthcare?

DME in healthcare stands for durable medical equipment – defined by CMS as equipment that is used for medical purposes by an individual who is sick or injured and that can withstand at least three years of repeated or frequent use. However, in the context of healthcare compliance, it can be more important to understand the HIPAA status of DME suppliers. One of the reasons it is important to understand what does DME stand for in healthcare is that suppliers of durable medical equipment qualify as healthcare providers under §1395x(s) of the Public Health and Welfare Code. This means that, if a supplier of DME conducts electronic transactions covered by Part 162 of the Administrative Simplification Regulations (i.e., as a Medicare-enrolled DMEPOS supplier), they qualify as a HIPAA covered entity. If a supplier of DME qualifies as a HIPAA covered entity, this has an impact on when it is permissible for a healthcare provider (who also qualifies as a HIPAA covered entity) to disclose Protected Health Information (PHI) to the DME supplier without a HIPAA authorization. It may also have an...

Read More
NHS Software Provider Facing £6M Fine Over Ransomware Attack
Aug07

NHS Software Provider Facing £6M Fine Over Ransomware Attack

An IT and software services provider in the United Kingdom is facing a £6.09 million ($7.74 million) financial penalty over an August 2022 ransomware attack that disrupted the National Health Service (NHS) and other healthcare and social care services in England. The UK’s data watchdog, the Information Commissioners Office (ICO), investigated the attack and has disclosed the provisional findings of the investigation and the proposed financial penalty. Advanced Computer Software Group, which provides IT and software services to the NHS and other organizations in the UK, was determined to have failed to implement sufficient measures to protect the personal information of 82,946 patients, whose data was stolen in the ransomware attack. The stolen data included names, contact information, and medical records. Almost 900 of the affected individuals were receiving healthcare services at home and had given their providers information about how to access their properties, and that information was also stolen in the attack. The attack caused considerable disruption, including to the NHS 111...

Read More
BEC Emails Increase 20% YoY; AI Used in 40% of Attacks
Aug07

BEC Emails Increase 20% YoY; AI Used in 40% of Attacks

There has been a surge in business email compromise attacks in the past year and cybercriminals are increasingly using AI tools to craft their malicious emails, according to data from Vipre Security Group. Business email compromise (BEC) is a form of social engineering involving spoofed or compromised email accounts, with the email accounts used for the scam often compromised through phishing. These attacks may seek sensitive information, but most commonly the aim is to trick individuals with responsibility for wire transfers into making fraudulent transfers to an attacker-controlled account. For example, a vendor’s email account is compromised and used to send messages to clients and ask them to change bank account information for an upcoming payment. BEC is one of the costliest types of cybercrime. According to the Federal Bureau of Investigation (FBI) Internet Crime Report, $2.9 billion was lost to BEC scams in 2023 and 21,489 complaints about BEC attacks were received by its Internet Crime Complaint Center (IC3). Despite the increase in ransomware attacks, losses to BEC attacks...

Read More
Health-ISAC/AHA Issue Warning Following Ransomware Attacks on Mission-Critical Suppliers
Aug06

Health-ISAC/AHA Issue Warning Following Ransomware Attacks on Mission-Critical Suppliers

Health-ISAC and the American Hospital Association (AHA) have issued a joint threat bulletin following three ransomware attacks by Russian ransomware groups on blood suppliers, which have caused shortages of blood and blood products that have massively disrupted patient care. The most recent attack occurred on July 30, 2024, on OneBlood, a Florida-based provider of blood to around 250 hospitals in Alabama, Florida, Georgia, and North and South Carolina. The attack prompted the Florida Hospital Association to recommend hospitals that receive blood from OneBlood activate their critical blood shortage protocols. The RansomHub threat group is thought to have been behind the attack. In early June, the Qilin ransomware group conducted an attack on Synovis, a provider of pathology services to the UK’s National Health Service, which caused massive disruption with more than 800 operations and 700 outpatient appointments canceled. The attack resulted in major blood shortages, with O-negative and O-positive blood donations destroyed as it was not possible to match them to electronic health...

Read More
Ransomware Group Targets IT Workers by Impersonating Legitimate Scanning Tool
Aug06

Ransomware Group Targets IT Workers by Impersonating Legitimate Scanning Tool

The Hunters International threat group is targeting IT workers by impersonating a legitimate IP and port scanning tool to deliver malware to gain initial access to networks. Hunters International is a ransomware group that first emerged in October 2023. The group has been linked with the Hive ransomware group, which was the subject of a law enforcement operation and shut down in January 2023. While security researchers have suggested Hunters International was a rebrand of Hive due to a 60% code overlap with Hive, the group claims to have purchased the Hive code and that it is an independent group. Hunter’s International is not the most prolific ransomware group but has conducted more than 130 attacks so far this year. As the group’s name suggests, attacks are conducted worldwide, with the threat actor claiming victims in around 30 countries. The group primarily hunts for data, which is exfiltrated from victims’ networks. Threats are issued to publish the stolen data if a ransom is not paid, with the attacks often including file encryption. Hunters International poses a significant...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist