25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Microsoft Patches Zero-Day Vulnerability Exploited to Deliver QakBot and Other Malware
May16

Microsoft Patches Zero-Day Vulnerability Exploited to Deliver QakBot and Other Malware

Microsoft has released a patch to fix a zero-day Windows vulnerability – CVE-2024-30051 – exploited in attacks delivering QakBot malware. Healthcare organizations should prioritize this patch as QakBot has been used in many attacks on the healthcare sector. QakBot, aka QBot, was first identified in 2008 and was initially a banking trojan that was used to steal banking information and credentials. The malware has evolved over the years into a malware delivery service, with the operators acting as an initial access broker, selling access to infected companies to other threat actors, including ransomware groups. A law enforcement operation last summer successfully dismantled the QakBot botnet and took down its infrastructure; however, it was rebuilt and remains in operation. Several threat groups are known to work with the QakBot operators, including the Black Basta ransomware group. A joint cybersecurity alert was recently issued by CISA and partners warning critical infrastructure entities about Black Basta ransomware attacks. Black Basta has been linked with the recent...

Read More

Hypertension-Nephrology Associates Warn Patients of Data Theft Incident

Hypertension-Nephrology Associates in Michigan has recently announced that it was the target of a cyberattack in January 2024. An unknown threat actor dropped a ransom note on its computer system demanding payment to prevent the publication of patient data that was stolen in the attack. The healthcare industry continues to be targeted by ransomware gangs that steal data and encrypt files, demanding payment for the keys to decrypt files and to prevent the release of stolen data; however, many threat actors skip file encryption and conduct extortion-only attacks, as was the case in the attack on Hypertension-Nephrology Associates. After discovering the ransom note, an investigation was launched to verify the threat actor’s claims. Third-party cybersecurity experts were engaged to assist with the investigation and confirmed that the threat actor had access to its systems between January 20, 2024, and February 6, 2024. During that time, files containing patients’ protected health information were exfiltrated from its systems. A comprehensive review was conducted of the...

Read More
Is Proton Mail HIPAA Compliant?
May15

Is Proton Mail HIPAA Compliant?

Proton Mail is HIPAA compliant and can be used by covered entities and business associates to send encrypted emails containing PHI to other Proton users, share files via Proton Drive, and take advantage of the sharable Proton Calendar. However, there can be compliance issues when sending emails to non-Proton Mail users.   Proton Mail offers mail, storage, and VPN services, and claims to be “the world’s largest end-to-end encrypted email service”. The “end-to-end” part of the claim does a lot of heavy lifting because emails are only fully encrypted between Proton Mail users. If you send an encrypted email to a (say) Outlook user, you have to set a password for the recipient to open the email. Nonetheless, Proton Mail is an attractive option for businesses operating in regulated industries because of its zero-knowledge model and advanced privacy protections. It is also fairly easy to configure (compared to – for example – Microsoft365) and it is possible to “bridge” accounts between the Proton Mail client and third-party email service providers. Do Covered Entities Need...

Read More
Singing River Health System: 895,000 Individuals Affected by August 2023 Ransomware Attack
May15

Singing River Health System: 895,000 Individuals Affected by August 2023 Ransomware Attack

Singing River Health System in Mississippi suffered a Rhysida ransomware attack in August 2023, which was initially reported to the HHS’ Office for Civil Rights as affecting 501 individuals, as the number of affected individuals had yet to be determined. In December 2023, the total was revised to 252,890 individuals; however, the data breach has turned out to be much worse than previously thought. In a recent notification to the Maine Attorney General, Singing River Health System provided a revised victim count of 895,204 individuals. Click for further information. “SMEs like Singing River Health System are the most vulnerable to cyber-attacks. Unlike large enterprises with massive cybersecurity budgets and dedicated cybersecurity teams, SMEs are exposed to the same threats with a fraction of the resources,” Dror Liwer, co-founder of cybersecurity company Coro told The HIPAA Journal. “In a recent study we conducted with 500 SME cybersecurity professionals, 73% said they missed or ignored critical alerts. That’s not because they don’t want to do their jobs, but because...

Read More
OSHA Cites Circles of Care for Failing to Protect Employees from Patient Violence
May15

OSHA Cites Circles of Care for Failing to Protect Employees from Patient Violence

The Department of Labor’s Occupational Safety and Health Administration (OSHA) has cited Circles of Care for failing to protect its employees from patient violence. This is the third time in the past 5 years that Circles of Care has been investigated by OSHA after workers were seriously injured or killed due to violent attacks by patients. Circles of Care is a Florida-based operator of multiple psychiatric and rehabilitation facilities that provides mental health, alcohol, drug abuse, and related services. OSHA previously investigated Circles of Care on two occasions in 2020, once after the fatal shooting of a counselor by a former patient and another after an alleged assault at its Harbor Pines facility in Melbourne in 2020. The latest OSHA investigation was launched on November 7, 2023, to assess compliance after an employee was hospitalized following a violent attack by a patient two days previously. A patient attacked a mental health technician at a nurse’s workstation at its Sheridan West Unit in Melbourne using a mental hole punch, causing injuries to the face, neck,...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist