25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Hackers Start Attempting Exploitation of Critical MOVEit Transfer Vulnerability
Jun27

Hackers Start Attempting Exploitation of Critical MOVEit Transfer Vulnerability

Progress Software has recently disclosed two flaws in its MOVEit Transfer managed file transfer solution, and one flaw in MOVEit Gateway. The first attempts at exploitation were detected within a day of the public disclosures. All three of the flaws are authentication bypass issues and successful exploitation would allow unauthorized individuals to gain access to sensitive data. The MOVEIt Transfer flaws affect the following MOVEit versions: 2023.0.0 before 2023.0.11 2023.1.0 before 2023.1.6 2024.0.0 before 2024.0.2 The most serious MOVEit Transfer vulnerability is a critical flaw tracked as CVE-2024-5805 which has a CVSS score of 9.1. The second flaw is tracked as CVE-2024-5806 and is rated high-severity with a CVSS score of 7.4. The second vulnerability is in a third-party component of MOVEit Transfer and a patch for that vulnerability has not yet been released. Progress Software said it notified customers about the flaws on June 11, 2024, and patched the CVE-2024-5805 vulnerability in versions 2023.0.11, 2023.1.6, and 2024.0.2, which are available for download on the Progress...

Read More
Data Compromised in Cyberattacks on LivaNova and Neurobehavioral Medicine Consultants
Jun27

Data Compromised in Cyberattacks on LivaNova and Neurobehavioral Medicine Consultants

Cyberattacks have been reported by the medical device manufacturer LivaNova (129,219 individuals) and Neurobehavioral Medicine Consultants in Ohio (18,182 individuals). LivaNova The Italian American medical device manufacturer LivaNova has notified 180,000 individuals* about the exposure of their personal and protected health information (PHI) in a cyberattack. Suspicious activity was identified within its network on November 19, 2023. Action was immediately taken to secure its systems and third-party cybersecurity experts were engaged to assist with the investigation and remediation efforts. The investigation confirmed that an unauthorized third party gained access to its network on or around October 26, 2023, and retained access until the intrusion was identified on November 19. The nature of the cyberattack was not disclosed; however, LivaNova said that it disrupted parts of its IT systems and access was gained to parts of the network that contained patient information. The file review confirmed that the following types of information were exposed in the incident: name; contact...

Read More
Feds Warn of Phishing and Social Engineering Campaign Targeting Healthcare Organizations
Jun26

Feds Warn of Phishing and Social Engineering Campaign Targeting Healthcare Organizations

A joint cybersecurity advisory has been issued by the Federal Bureau of Investigation (FBI) and the Department of Health and Human Services (HHS) about an ongoing social engineering campaign targeting the healthcare and public health (HPH) sector. The campaign has been running since August 2023 and seeks access to email account credentials to divert automated clearinghouse (ACH) payments to U.S. bank accounts under the threat actor’s control. The threat actor targets email accounts and once access has been gained, pivots to targeting login credentials that allow them to make changes to accounts involved in reimbursement payments to insurance companies, Medicare, and other entities. Two methods have been identified for initial access to email accounts. Phishing emails are sent that direct the recipient to a spoofed webpage where credentials are harvested. The domains used for this campaign closely resemble the domains used by the targeted organization, differing by one character. An alternative method involves vishing calls to the targeted organization’s IT helpdesk. Social...

Read More
Email Accounts Compromised at Aultman Hospital & Benefit Management LLC
Jun26

Email Accounts Compromised at Aultman Hospital & Benefit Management LLC

On April 24, 2024, Aultman Hospital in Canton, OH, identified phishing emails being sent from an employee’s email account. The account was immediately secured, and an investigation was launched which confirmed that the employee’s email account had been compromised without their knowledge between April 22 and April 24, 2024. The investigation included an analysis of the email system, and it was confirmed that the incident was limited to the email account of a single employee and that the attacker had not gained access to any other IT systems. Aultman Hospital suspects the aim of the attack was a phishing email scheme to compromise email accounts rather than to access emails and attachments in accounts; however, it was not possible to rule out unauthorized access to emails and email attachments. A manual review was conducted of the emails and attachments that confirmed they contained patient information. The information exposed varied from individual to individual and many have included one or more of the following: Patient names, addresses, dates of birth, medical record numbers,...

Read More
Healthcare Scores a B for Cybersecurity
Jun25

Healthcare Scores a B for Cybersecurity

SecurityScorecard has given the U.S. healthcare industry a B+ rating for cybersecurity for the first half of 2024 with the industry performing better than expected, despite major breaches being reported, including what could turn out to be the mother of all healthcare breaches – the ransomware attack on Change Healthcare that could potentially affect 1 in 3 Americans. As the researchers pointed out, a cyberattack on a large healthcare organization has the potential to cripple the entire healthcare system, as the ransomware attack on Change Healthcare demonstrated. Given the magnitude of the attack and the extent of the disruption caused, SecurityScorecard’s STRIKE threat intelligence team sought to identify overall cyber hygiene at large healthcare organizations and the biggest security risks that those organizations face. SecurityScorecard’s researchers examined the security ratings at the top 500 publicly traded healthcare companies in the United States, including healthcare providers, pharma and biotech firms, insurance and billing companies, and medical device manufacturers and...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist