25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

WebTPA Data Breach Affects 2.4 Million Health Insurance Policyholders
May20

WebTPA Data Breach Affects 2.4 Million Health Insurance Policyholders

WebTPA, a Texas-based provider of administration services to health insurance and benefit plans has recently started notifying 2,429,175 benefit plan members that some of their protected health information (PHI) may have been stolen in a hacking incident more than a year ago. WebTPA, a subsidiary of GuideWell Mutual Holding Corporation, explained in its notification letters that a network intrusion was detected on December 28, 2023. The network was immediately secured to prevent further unauthorized access and an investigation was launched to determine the nature and extent of the security breach. Assisted by third-party cybersecurity experts, WebTPA determined that an unauthorized actor potentially obtained benefit plan members’ PHI between April 18 and April 23, 2023. WebTPA promptly notified the affected benefit plans and insurance companies about the intrusion and then worked to determine the number of individuals affected and the types of data involved. The information compromised in the security incident varied from individual to individual and may have included names...

Read More
11 Vulnerabilities Identified in GE HealthCare Ultrasound Products
May17

11 Vulnerabilities Identified in GE HealthCare Ultrasound Products

Almost a dozen vulnerabilities have been identified in GE HealthCare Vivid Ultrasound machines that could be exploited by threat actors to access and alter patient data, and potentially install ransomware locally to render the devices unavailable. The vulnerabilities were identified by researchers at the Operational Technology (OT) vendor Nozomi Networks during a review of the GE HealthCare Vivid Ultrasound family and the companion software that is used to review the generated medical data. The main focus of the review was the Vivid T9 ultrasound system, its pre-installed Common Service Desktop web application, and the EchoPAC software. The researchers identified 11 vulnerabilities that affect several systems and software products. The vulnerabilities were reported to GE HealthCare which issued a statement saying that existing controls mitigate the risks of exploitation of the flaws to an acceptable level, provided standard cybersecurity practices are followed, such as restricting physical access to the devices. Patches have been made available to fix the vulnerabilities which can...

Read More
How Long Is HIPAA Training Good For?
May16

How Long Is HIPAA Training Good For?

HIPAA training is usually good for one year. The industry best practice is to provide annual HIPAA training unless something changes in the organization.  HIPAA training is good for as long as a HIPAA risk assessment does not identify a need for further training, for as long as there is not a material change to internal HIPAA policies and procedures, until HIPAA training is required as a sanction for a HIPAA violation, or until HHS’ Office for Civil Rights mandates HIPAA training as part of a corrective action plan. The HIPAA Privacy Rule Training Requirements Under the HIPAA Privacy Rule, training is mandated for all workforce members of covered entities and business associates who handle or have access to PHI, ensuring they understand how to maintain the confidentiality and security of this sensitive information. This includes education on the proper use and disclosure of PHI, the rights of individuals under HIPAA, and the entity’s privacy policies and procedures. The HIPAA Journal is the market leader in HIPAA training and has a reputation for providing the best HIPAA...

Read More
OCR HIPAA Audit Program to Commence in 2024
May16

OCR HIPAA Audit Program to Commence in 2024

The Health Information Technology for Economic and Clinical Health Act (HITECH) Act of 2009 requires the HHS’ Office for Civil Rights to conduct periodic audits of HIPAA-regulated entities to assess compliance with the HIPAA Rules. OCR Director Melanie Fontes Rainer has confirmed that audits will be taking place this year and will focus on HIPAA Security Rule compliance. The HIPAA audit program was slow to commence, with the first round of audits conducted in 2012. There was then a long break before the second round of audits, which were conducted between 2016 and 2017, the findings of which were published by OCR in 2020. While OCR has been considering a permanent HIPAA audit program, multiple OCR directors have struggled to implement such a program due to a lack of resources. OCR’s budget has remained flat for years even though OCR’s workload has been increasing. OCR investigates all breaches of 500 or more records, which were reported at a rate of around 200 a year in 2010 and 2011. In 2014 more than 300 breaches were reported, and breaches more than doubled between 2017 and 2023...

Read More
Microsoft Patches Zero-Day Vulnerability Exploited to Deliver QakBot and Other Malware
May16

Microsoft Patches Zero-Day Vulnerability Exploited to Deliver QakBot and Other Malware

Microsoft has released a patch to fix a zero-day Windows vulnerability – CVE-2024-30051 – exploited in attacks delivering QakBot malware. Healthcare organizations should prioritize this patch as QakBot has been used in many attacks on the healthcare sector. QakBot, aka QBot, was first identified in 2008 and was initially a banking trojan that was used to steal banking information and credentials. The malware has evolved over the years into a malware delivery service, with the operators acting as an initial access broker, selling access to infected companies to other threat actors, including ransomware groups. A law enforcement operation last summer successfully dismantled the QakBot botnet and took down its infrastructure; however, it was rebuilt and remains in operation. Several threat groups are known to work with the QakBot operators, including the Black Basta ransomware group. A joint cybersecurity alert was recently issued by CISA and partners warning critical infrastructure entities about Black Basta ransomware attacks. Black Basta has been linked with the recent...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist