25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

What is FISMA Compliance?
Jul22

What is FISMA Compliance?

FISMA compliance is compliance with applicable standards and guidelines developed by the National Institute of Standards and Technology (NIST) following the passage of the Federal Information Security Management Act of 2002 (FISMA). FISMA compliance is mandatory for federal agencies, state and local government agencies in receipt of federal funding, and service providers working with federal, state, and local government agencies, When FISMA was passed in 2002, it required all federal agencies to develop, document, and implement an agency-wide program to provide information security for the information and systems that support the operations and assets of the agency. The requirements also applied to information and systems provided or managed by third party service providers, and was later extended to include state and local government agencies in receipt of federal funding. To support covered entities in meeting the FISMA compliance requirements, FISMA authorized NIST to develop standards and guidelines to protect federal information and information systems. NIST subsequently...

Read More
Cyberattack on The Medibase Group Affects 35,000 Patients
Jul22

Cyberattack on The Medibase Group Affects 35,000 Patients

Cyberattacks have recently been announced by the Medibase Group, Therapeutic Health Services, and the law firm Smith, Gambrell & Russell. The Medibase Group The Medibase Group, Inc., a Woodstock, GA-based provider of software solutions, technical assistance, and business office solutions to healthcare delivery organizations, has experienced a cyberattack that exposed the protected healthcare information of 35,106 patients of its healthcare provider clients. The cyberattack occurred on or around January 26, 2024, and involved unauthorized access to one of Medibase’s systems. Prompt action was taken to contain the attack, and a leading security and forensics company was engaged to assist with the investigation. The investigation confirmed that the attack was limited to the Medibase system, and no client systems were compromised. The review of the affected files revealed they contained full names, Social Security numbers, dates of birth, admission/discharge dates, outstanding balance amounts, and health insurance information. While data theft is possible, Medibase believes the...

Read More
Two LockBit Ransomware Affiliates Plead Guity and Face Up to 70 Years in Prison
Jul22

Two LockBit Ransomware Affiliates Plead Guity and Face Up to 70 Years in Prison

The Department of Justice has announced that two foreign nationals have pleaded guilty to charges related to their participation in the LockBit ransomware operation and for using ransomware to attack businesses in the United States and worldwide. The LockBit ransomware-as-a-service (RaaS) operation emerged in 2020 and rapidly became the most prolific ransomware group worldwide. LockBit ransomware has been used to attack more than 2,500 victims, including 1,800 in the United States, and has generated more than $500 million in ransom payments. In February 2024, an international law enforcement operation (Operation Chronos) seized the infrastructure of the group, including data leak sites, servers, around 14,000 accounts involved with data exfiltration, and around 200 cryptocurrency accounts that were used by the group and its affiliates. The group survived the disruption but has since operated at a reduced capacity. Ruslan Magomedovich Astamirov, 21, a Russian national of the Chechen Republic in Russia, and Mikhail Vasiliev, 34, a dual Canadian and Russian national of Bradford,...

Read More
Faulty CrowdStrike Software Update Causing Major Disruption at U.S. Healthcare Organizations
Jul20

Faulty CrowdStrike Software Update Causing Major Disruption at U.S. Healthcare Organizations

After the massive disruption and financial difficulties caused by the Change Healthcare ransomware attack, the last thing healthcare providers need right now is further disruption; however, many hospitals have been forced to cancel appointments and delay services due to a faulty software update that has disabled their Windows devices. While the update has affected Windows devices, the issue was a faulty software update from the Cybersecurity company CrowdStrike that affects users of its Falcon threat detection platform. It was supposed to be just another routine software update; however, the bug crashed Windows devices and triggered the dreaded blue screen of death, preventing Windows devices from rebooting and rendering them inoperable. Mac and Linux systems were not affected by the update. “I want to sincerely apologize directly to all of you,” said CrowdStrike CEO, George Kurtz. “All of CrowdStrike understands the gravity and impact of the situation.” Kurtz stressed that there was no unauthorized access to systems, the problem has been identified, and the...

Read More
June 2024 Healthcare Data Breach Report
Jul19

June 2024 Healthcare Data Breach Report

In June 2024, 47 data breaches of 500 or more healthcare records were reported to the HHS’ Office for Civil Rights (OCR), the fewest number of breaches since October 2023. Data breaches were down 9.6% from May 2024, and 30.9% down from June 2023, and were well below the 12-month average of 64 data breaches a month. For the second consecutive month, the number of breached records has fallen. Across the 47 breaches reported in June, the protected health information of 3,837,356 individuals was exposed, stolen, or impermissibly disclosed. June’s compromised record total is the second lowest monthly total in 2024, 54.7% lower than May 2024, and well below the 12-month average of 11,637,320 breached records a month. It is likely to be a very different story next month, as Change Healthcare will be mailing breach notification letters to the individuals affected by its February 2024 ransomware attack from July 20, 2024, which means OCR will soon be notified about the extent of the breach. The CEO of Change Healthcare’s parent company, UnitedHealth Group, told a senate hearing that the...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist