25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Critical NextGen Healthcare Mirth Connect Vulnerability Under Active Exploitation
May23

Critical NextGen Healthcare Mirth Connect Vulnerability Under Active Exploitation

On May 20, 2024, The Cybersecurity and Infrastructure Security Agency (CISA) added a critical NextGen Healthcare Mirth Connect remote code execution vulnerability to its Known Exploited Vulnerability (KEV) Catalog. Mirth Connect is an open-source integration engine that is used in healthcare to support interoperability and enables healthcare data to be securely and efficiently exchanged between different systems and applications through standardized formats and protocols such as HL7, DICOM, and FHIR. The deserialization of untrusted data vulnerability is tracked as CVE-2023-43208 and has a CVSS v3.1 base score of 9.8 out of 10. The vulnerability affects all versions before 4.4.1 and allows unauthenticated remote code execution and is due to the incomplete patching of CVE-2023-37679. According to security researchers at Horizon3.ai, the vulnerability does not require any credentials, is easy to exploit, and allows a threat actor to fully compromise a vulnerable Mirth Connect Server. The company’s NodeZero pentesting product has been used to successfully exploit the vulnerability...

Read More
Ransomware Attack on Texas Ophthalmology Practice Exposes Data of 80,000 Patients
May23

Ransomware Attack on Texas Ophthalmology Practice Exposes Data of 80,000 Patients

A Texas ophthalmology practice has experienced a ransomware attack that resulted in the encryption of files on its computer systems. The attack affected Victoria Surgery Center, Victoria Eye Center, and Victoria Vision Center and involved the personal and protected health information of 80,122 individuals. The attack was detected on March 21, 2024, when the file encryption made certain computer systems inaccessible. Third-party forensics specialists were engaged to assist with the investigation and help secure systems, restore access to patient information, and determine the extent to which patient information was involved. The investigation confirmed that there had been unauthorized access to systems and that certain files containing patient data were accessed in the attack. The file review has recently been completed and confirmed that names, addresses, and medical identification were compromised. The affected individuals have now been notified and offered 12 months of credit monitoring and identity theft protection services. Steps have been taken to prevent similar incidents in...

Read More
15 State Attorneys General Ask Congress to Respect State Privacy Laws
May23

15 State Attorneys General Ask Congress to Respect State Privacy Laws

The American Privacy Rights Act (APRA), the successor of the American Data Privacy and Protection Act (ADPPA), has been criticized by 15 State Attorneys General who are urging Congress not to proceed with the proposed federal data privacy law in its current form. A draft of the APRA was released in April 2024 that addressed some of the problems with the ADPPA that prevented the bill from progressing. While the APRA could win over some of the critics of the ADPPA, one of the main sticking points was the preemption of state laws and that issue has not been properly addressed in the APRA. If the APRA is passed, residents of states with weak privacy protections would benefit and get new rights and protections for their personal data, but states with strong data privacy laws would see their protections watered down. One of the states with the strongest privacy protections is California. California was the first state to enact a comprehensive privacy law in 2018, and since then, 17 other states have followed suit and introduced laws that give consumers better rights over their personal...

Read More

Patient Data Exposed in Laptop Theft Incidents

Incidents involving the theft of portable electronic devices containing protected health information are now relatively rare, but two incidents were reported this month. Former Multnomah County Health Department Employee Failed to Return Laptop Containing Patient Information Multnomah County Health Department in Portland, OR, has notified 1,092 Multnomah County Health Center patients that some of their protected health information has been exposed. On March 4, 2024, the Health Department dismissed an employee who failed to return their Health Department laptop. When employees are dismissed, their network account, email, and access to clinical systems and electronic medical records are terminated, as was the case with this dismissal; however, some patient data was stored on the laptop. While employed, the former employee was authorized to view the information, but that authorization ended when the employee was terminated. On April 24, 2024, the Health Department’s anti-malware system generated an alert about suspicious activity on the unreturned laptop indicating the laptop was...

Read More
Superior Air-Ground Ambulance Service Data Breach Affects 858K Individuals
May22

Superior Air-Ground Ambulance Service Data Breach Affects 858K Individuals

Superior Air-Ground Ambulance Service, a leading ambulance and EMS provider serving Illinois, Indiana, Michigan, Ohio, and Wisconsin, has confirmed that the protected health information of 858,238 patients was exposed or stolen in a cyberattack in May 2023. Suspicious activity was identified in its IT systems in May 2023 and action was immediately taken to isolate those systems and an investigation was launched to identify the source of the activity. On June 23, 2023, it was confirmed that there had been unauthorized access to its network between May 15 and May 23, 2023, and during that time, an unauthorized actor copied files from its network. Superior Air-Ground Ambulance Service then conducted a comprehensive and time-intensive review of the affected files to determine the individuals affected and the types of data that had been exposed or stolen. After that process was completed, Superior Air-Ground Ambulance Service worked on obtaining up-to-date contact information to allow notification letters to be sent. Due to the number of individuals involved, that process has taken a...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist