25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

When Was OSHA Founded?
Oct24

When Was OSHA Founded?

OSHA was founded on April 28, 1971 –  four months after President Nixon had signed the Occupational Safety and Health Act (the OSH Act). The Act had the objective of ensuring safe and healthy conditions for working individuals by adopting, developing, and enforcing safety standards, and by assisting states with their own safety initiatives. OSHA’s Foundation Years Although OSHA opened its doors in April 1971, the foundation for its activities came from a much earlier time. Since 1922, the Bureau of Labor Standards had been the federal agency responsible for workplace safety and health; and, in addition to many industry-specific safety and health regulations already in existence, a number of states had adopted their own workplace safety standards. OSHA had a strong foundation from which to develop and plenty of funding to support its development. By 1972, the Administration had approved State OSHA Plans in South Carolina, Oregon, and Montana, published its first original standard – lowering the permissible limit for worker exposure to asbestos – and established the...

Read More
Is Microsoft Outlook HIPAA Compliant?
Oct24

Is Microsoft Outlook HIPAA Compliant?

Microsoft Outlook is HIPAA compliant provided that organizations subscribe to an Office 365 or Microsoft 365 enterprise plan that supports HIPAA compliance, that the service is configured to be used compliantly, and that users are trained to use Microsoft Outlook in compliance with HIPAA. Software is never HIPAA compliant by default as HIPAA compliance is not so much about what technology is used, but how it is used. That said, software and email services can support HIPAA compliance. In order for an email service to support HIPAA compliance, it must include a range of security features to ensure that any information uploaded to and transmitted through the service can be done so securely, without risking the exposure or the interception of sensitive data. The platform provider must also be prepared to sign a Business Associate Agreement with HIPAA-covered entities, and by doing so, agree to comply with the requirements of the HIPAA Privacy, Security, and Breach Notification Rules. Microsoft has a standard Business Associate Agreement which covers Office 365 and Microsoft 365...

Read More
QR Codes Increasingly Used in Phishing Attacks
Oct24

QR Codes Increasingly Used in Phishing Attacks

Malware phishing attacks, where phishing emails are used to trick end users into downloading and executing malicious code, have been an effective way of gaining access to internal networks for many years. Malware phishing is the initial infection vector in a large number of cyberattacks, many of which often end with ransomware being deployed. The tactics, techniques, and procedures (TTPs) used by threat actors in phishing attacks are constantly changing, and a new trend has emerged where QR (quick response) codes are used for malware phishing. According to Hoxhunt, 22% of phishing attacks in October 2023 used QR codes. QR codes are machine-readable images that consist of a matrix that transmits information. The codes were invented by a Japanese automobile manufacturing company in 1994 as a way of connecting the digital and physical world. They were initially used to track vehicle parts during manufacturing processes; however, the use of QR codes has grown considerably thanks to the widespread use of smartphones. QR codes are commonly used to direct users to websites. A mobile phone...

Read More

Feds Issue Guidance on Stopping the Phishing Attack Cycle at Phase One

Phishing is one of the most common methods used by malicious actors to gain initial access to internal networks. Phishing is a form of social engineering where victims are tricked into disclosing their credentials or visiting a malicious website where malware is downloaded. Stolen credentials are used to access accounts and sensitive data, and the malware downloaded gives threat actors persistent access to internal networks and allows them to perform a range of nefarious activities. A large percentage of HIPAA compliance data breaches on the Office for Civil Rights (OCR) breach portal started with a response to a phishing email. Defending against phishing attacks can be challenging. While cybersecurity solutions such as spam filters and secure email gateways can be implemented, phishing emails often bypass these defenses and land in inboxes. Network defenders often blame successful phishing attacks on users who opened the emails, followed links, or disclosed their credentials, but the emails can be difficult to identify, and it is impossible to completely prevent human error even...

Read More

Ragnar Locker Ransomware Infrastructure Taken Down and Suspected Developer Arrested

Europol has announced that it has taken down the infrastructure that was used to support Ragnar Locker ransomware attacks and a suspect believed to be one of the group’s developers has been arrested. The Ragnar group started conducting attacks using Ragnar Locker ransomware in December 2019. The group is known to have attacked at least 168 organizations, including the Italian drinks giant Campari and the Japanese gaming firm Capcom, as well as many critical infrastructure entities. Ragnar Locker was one of the first big game hunting ransomware groups to steal data to pressure victims into paying ransoms in addition to encrypting files. In contrast to many ransomware groups, Ragnar Locker was not a ransomware-as-a-service (RaaS) operation and instead collaborated with external penetration testers to gain initial access to victims’ networks. Europol said raids and searches were conducted of multiple properties in Czechia, Spain, and Latvia between October 16 and October 20, and five individuals who are believed to be associated with the group have been interviewed in Spain and...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist