25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

More Than 70,000 Adventist Health Tulare Patients Affected by Business Associate Breach
Jun12

More Than 70,000 Adventist Health Tulare Patients Affected by Business Associate Breach

A business associate of Adventist Health Tulare has identified unauthorized access to the information of 70,000 patients, and Columbia University Irving Medical Center has discovered patient data has been exposed on the internet. Adventist Health Adventist Health has recently announced that the protected health information of more than 70,000 patients of Adventist Health Tulare in California has been accessed by an unauthorized individual. The security breach occurred at a business associate, Signature Performance, which was used to collect payments for services. Adventist Health said Signature Performance identified suspicious activity within its network, and the forensic investigation confirmed that patient information had been accessed; however, Adventist Health said the data was not used for illegal activity. It is unclear how that determination was made. Notification letters are being mailed to the affected individuals by Signature Performance, and the notification letters will state for each individual the types of information involved. A toll-free number has been established...

Read More
High Severity Flaws Identified in MicroDicom DICOM Viewer
Jun12

High Severity Flaws Identified in MicroDicom DICOM Viewer

Two high-severity vulnerabilities have been identified in MicroDicom DICOM Viewer medical image viewer, one of which could lead to the execution of arbitrary code and the other could allow an attacker to retrieve sensitive files, add new medical images, or overwrite existing medical images on the MicroDicom DICOM Viewer system. CVE-2024-33606 is due to the use of a handler for a custom URL scheme that does not properly restrict which actors can invoke the handler using the scheme. The lack of proper authorization would allow an attacker to retrieve sensitive files containing patients’ protected health information, add new images, or replace existing images, potentially causing harm to patients. User interaction is required for an attacker to exploit the flaw. The vulnerability has been assigned a CVSS v4 severity score of 8.6 (CVSS v3.1 8.8). CVE-2024-28877 is a stack-based buffer overflow vulnerability that could lead to arbitrary code execution, although user interaction is required to exploit the flaw.  The vulnerability has been assigned a CVSS v4 severity score of 8.7/10 (CVSS...

Read More
Snowflake Customers Attacked in Ongoing Extortion Campaign
Jun12

Snowflake Customers Attacked in Ongoing Extortion Campaign

A financially motivated threat actor tracked as UNC5537 has been conducting a campaign targeting Snowflake customer databases. At least 165 Snowflake customers are thought to have been affected. Snowflake is a multi-cloud data warehousing platform that customers use to store and analyze large volumes of structured and unstructured data. According to the Google-owned cybersecurity firm Mandiant, the threat actor has been systematically compromising customer accounts using stolen credentials, with the earliest evidence of account compromise detected on April 14, 2024. When access is gained to the accounts, data is exfiltrated and demands are issued for payment to prevent the sale of the stolen data. Mandiant has notified 165 customers that they are exposed, but Snowflake has yet to confirm how many of its customers have been affected. Pure Storage has confirmed that an instance used for customer support was compromised, although no compromising customer data was accessed. While Snowflake accounts are being targeted, no evidence has been found to indicate that there has been a breach...

Read More
Microsoft & Google Offering Free and Discounted Cybersecurity Services to Rural Hospitals
Jun11

Microsoft & Google Offering Free and Discounted Cybersecurity Services to Rural Hospitals

Under the Biden administration’s Health Sector Cyber Initiative, Microsoft and Google have committed to providing critical access and rural hospitals with free and heavily discounted services to help them improve HIPAA cybersecurity. Cyber threat actors are targeting the healthcare industry and attacks are increasing. In 2023, the healthcare sector suffered more ransomware attacks than any other critical infrastructure sector, with attacks up 130% from the previous year, and healthcare cyberattacks increased by 128% from 2022 to 2023. To combat these attacks, resilience needs to be improved across the healthcare sector; however, many hospitals simply do not have the funds to invest in cybersecurity, and that is especially true for rural hospitals. Successful cyberattacks on rural hospitals can be devastating, especially for smaller, independent critical access and rural emergency hospitals. A critical access hospital is a designation given to rural hospitals by the Centers for Medicare and Medicaid Services (CMS) when they are more than 35 miles from the nearest hospital or more...

Read More
Security Vulnerabilities Identified in VA-OIG Audit of Bedford VA Healthcare System
Jun11

Security Vulnerabilities Identified in VA-OIG Audit of Bedford VA Healthcare System

An audit of Bedford VA Healthcare System in Massachusetts by the Department of Veteran Affairs Office of Inspector General (VA-OIG) identified several security failures that are putting systems and veterans’ data at risk. The Federal Information Security Modernization Act of 2014 (FISMA) requires the VA-OIG to conduct annual security audits to determine if facilities are meeting federal security requirements. The Bedford VA Healthcare System was selected for an audit as it had not been visited as part of the annual FISMA audit. The VA-OIG inspection focused on three security control areas: configuration management, security management, and access controls, and deficiencies were identified in each of those areas. VA-OIG determined that 87% of network devices used operating systems that did not meet federal minimum security requirements including 4% of devices that had reached end of life, were no longer supported by the vendor, and did not receive security patches to fix vulnerabilities. Those devices had 12 unpatched vulnerabilities that are included in the Cybersecurity and...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist