25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Protect Hospital Computers from Malware

What is Malware? Before explaining how to protect hospital computers from malware, it is advisable to resolve any confusion about what “malware” actually is. Malware is an abbreviation of “malicious software” – a term used to describe any hostile or intrusive software that disrupts computer operations, gains administrator access to computer systems, gathers sensitive information about the computer user or displays unwanted advertising. Legally described as a “computer contaminant”, malware is an umbrella term for computer viruses, adware, spyware, ransomware, worms and trojans – trojans typically being disguised as, or embedded in, non-malicious software. Malware is often detected by security software once it has been installed. However, by the time the computer contaminant is discovered, it is often too late and the consequences of failing to protect hospital computers from malware have already begun to manifest. What Are the Risks to Hospital Computers from Malware? The risks to hospital computers from malware vary according to the type of malware it is and its level...

Read More
Healthcare Data Breaches Due to Phishing
Jan06

Healthcare Data Breaches Due to Phishing

Due to way in which breaches of unsecured PHI are notified to HHS’ Office for Civil Rights, it is difficult to ascertain the true scale of healthcare data breaches due to phishing, as an interaction with a phishing email may have been a precursor for the notifiable event. However, there is evidence to suggest healthcare data breaches due to phishing are on the increase. Phishing is a leading cause of healthcare data breaches and attacks appear to be increasing. According to the 2022 IBM X-Force Threat Intelligence Index, phishing is the leading infection vector in cyberattacks. In 2021, four out of 10 attacks started with phishing, which is an increase of 33% from 2021. The Anti-Phishing Working Group (APWG) said phishing attacks have doubled since 2020. Phishing attacks provide cyber threat actors with an easy way to reach their intended targets and the attacks work because a small but significant number of emails attract a click. According to the 2022 Verizon Data Breach Investigations (DBIR) Report, phishing simulation data shows that 2.9% of phishing emails are clicked, on...

Read More
Interoperability in Healthcare
Jan05

Interoperability in Healthcare

Interoperability in healthcare means making sure information technology systems and software solutions work together seamlessly to exchange, interpret, and use data. Interoperability ensures that health data collected in one system can be made available for use in another, which can be achieved through the adoption of standards and use of data exchange models. When there is interoperability in healthcare, data can be shared internally with all people who need access to healthcare information and also externally with other healthcare providers and authorized third parties, irrespective of the systems or software they use. Unfortunately, many software solutions are developed in silos which makes it difficult for data to easily be transferred to other solutions and systems. When data exchange is possible, it often involves come manual processes, data transfer is slow, and communications are often disjointed. Interoperability in healthcare should see healthcare information systems working seamlessly together, within and across organizational boundaries. It should be possible for...

Read More
Is Google Slides HIPAA Compliant?
Jan05

Is Google Slides HIPAA Compliant?

Google Slides is HIPAA compliant and can be used to create slides and presentations containing Protected Health Information provided the service is used as part of a Google Workspace plan covered by a Business Associate Addendum and configured to restrict document sharing. It will also be necessary to include the compliant use of Google Forms in workforce training. Google Slides is a presentation editor that allows users to create slide shows, training materials, and project presentations. Because of its ease of use, Google Slides is an ideal option for users who do not regularly create slide shows or presentations and do not have a software package that offers the same functionality. Google Slides is available free of charge for personal use but personal users cannot use Google Slides in compliance with HIPAA. Using Google Slides in Compliance with HIPAA HIPAA covered entities and business associates that want to take advantage of Google Slides’ functionality can do so without any HIPAA compliance concerns provided Protected Health Information (PHI) is not used or disclosed in the...

Read More

Parathon by JDA eHealth Systems Confirms July 2023 Cyberattack

Parathon by JDA eHealth Systems, a revenue cycle management company in Naperville, Illinois, has recently notified state attorneys general that it suffered a cyberattack on July 27, 2023. In its December 22, 2023, notification to the Montana Attorney General, Parathon explained that unauthorized individuals were able to access the protected health information of patients of its clients. The types of information involved varied from individual to individual and may have included names in combination with one or more of the following: address, date of birth, and/or protected health information, including but not limited to diagnosis, claims information, and health insurance information. The notification does not state whether files were encrypted in the attack, but Parathon said data was stolen and a ransom payment was demanded. Parathon said, “We have taken all efforts possible to mitigate any further exposure of your personal information and related identity theft.” The Akira threat group claimed responsibility for the attack and added Parathan to its data leak site but has since...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist