25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

PHI Compromised in City of St. Cloud Cyberattack
Jun04

PHI Compromised in City of St. Cloud Cyberattack

Data breaches have recently been announced by Omni Healthcare Financial Holdings, McLean Hospital, Senior Lifestyle, Woodfords Family Services, and the City of St. Cloud in Florida. City of St. Cloud, Florida The City of St. Cloud in Florida has warned residents to be vigilant against identity theft and fraud after a March 2024 cyberattack that rendered its phone lines and online payment systems unavailable. The attack was detected on the morning of March 25, 2024, and third-party cybersecurity specialists were engaged to investigate the attack. They confirmed that the compromised systems contained residents’ names, addresses, birth dates, Social Security numbers, driver’s licenses, medical information, health insurance information, and financial account information, all of which may have been accessed or acquired in the attack. At this stage of the investigation, it is still unclear exactly how many individuals have been affected. Notification letters will be mailed when the investigation concludes. To meet the breach reporting requirements of the HIPAA Breach Notification Rule,...

Read More
Ransomware Victim Count Increased by 75% in 2023
Jun04

Ransomware Victim Count Increased by 75% in 2023

A new report from the Google-owned cybersecurity firm Mandiant has confirmed that there was a significant rise in ransomware activity in 2023 compared to 2022 and that the slight fall in ransomware and extortion activity in 2022 was an anomaly that was due, in part, to the invasion of Ukraine and the leaked Conti chats. Mandiant has been tracking the activities of ransomware groups and reports a 75% increase in the number of victims that were added to the groups’ data leak sites in 2023, which peaked in Q3, 2023 when almost 1,400 new victims were listed. The percentage of cyberattacks involving ransomware that Mandiant has investigated increased by 20% in 2023.  Mandiant’s findings are consistent with other reporting, such as a report from Chainalysisthat showed a record amount was paid to ransomware groups in 2023, with payments topping $1 billion for the first time. In 2023, law enforcement agencies around the world stepped up their efforts to disrupt the operations of ransomware groups, including international law enforcement operations against two of the most prolific...

Read More
Mercy Health Agrees to Pay $1.8 Million to Settle Insider Data Breach Lawsuit
Jun04

Mercy Health Agrees to Pay $1.8 Million to Settle Insider Data Breach Lawsuit

Mercy Health has agreed to a $1.8 million settlement to resolve all claims related to a 2020 HIPAA compliance data breach that affected 11,187 individuals. In contrast to the majority of class action data breach lawsuits, legal action was taken over an insider data breach rather than a cyberattack. Mercy Health, a health system serving patients in northern Illinois and southern Wisconsin, learned on October 7, 2020, that an employee had accessed patients’ medical records on multiple occasions when there was no legitimate work reason for doing so. The compromised patient information included names, addresses, dates of birth, other demographic information, medical record numbers, treatment and other clinical information and/or radiological images, and for a subset of individuals, health insurance numbers. Mercy Health notified the affected individuals in December 2020 and confirmed that the employee no longer works for Mercy Health and enhancements had been made to prevent similar incidents in the future. Mercy Health offered the affected patients free credit monitoring...

Read More
HHS Shares Best Practices for Preventing and Responding to Healthcare DDoS Attacks
Jun03

HHS Shares Best Practices for Preventing and Responding to Healthcare DDoS Attacks

The HHS Health Sector Cybersecurity Coordination Center has shared a guide to Distributed Denial of Service (DDoS) attacks that includes best practices for preventing and limiting the severity of DDoS attacks and recommendations for the attack response. A DDoS attack is a type of denial of service (DoS) attack that attempts to overwhelm systems by sending high volumes of requests to render that system unavailable to legitimate users. In contrast to a standard denial of service (DoS) attack where the traffic usually comes from a single system, in a DDoS attack the traffic originates from multiple sources and involves much higher numbers of requests. DDoS attacks are typically conducted using a botnet, which is a network of internet-enabled devices that have been infected with malware or are otherwise under the control of the botnet operator.  Those devices can be personal computers, servers, mobile devices, and internet-of-things (IoT) devices, with the latter allowing huge botnets to be created capable of conducting massive DDoS attacks. While attacks can render systems...

Read More
HIPAA Compliant Email for Therapists
Jun03

HIPAA Compliant Email for Therapists

HIPAA compliant email for therapists is a complex subject to discuss because some therapists do not qualify as HIPAA covered entities, other are employees of HIPAA covered entities with no administrative responsibility for HIPAA compliance, and multiple exceptions apply to therapists that do qualify as HIPAA covered entities in their own right.   When discussing HIPAA compliant email for therapists, the first consideration is the therapist’s “HIPAA status”. If a therapist bills patients directly or does not conduct electronic healthcare transactions for which the Department of Health and Human Services (HHS) has adopted standards under Part 162 of the HIPAA Administrative Simplification Regulations, they do not qualify as a HIPAA covered entity. However, while HIPAA compliance for email may not be a consideration for a therapist that does not qualify as a HIPAA covered entity, it may be necessary to implement HIPAA-esque measures if the therapist operates in a state that has adopted similar privacy or data security regulations, or provides remote services for citizens of a state...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist