25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Amerita Confirms 219,700 Patients Affected by PharMerica Cyberattack

The Kansas-based pharmaceutical and infusion product provider Amerita has recently notified 219,707 individuals that some of their protected health information was exposed in a cyberattack on the computer network of Amerita and its parent company, PharMerica. According to the notification letters, suspicious activity was detected in its computer systems on March 13, 2023. The forensic investigation confirmed that unauthorized individuals had access to its network from March 12 to March 13, 2023, and during that time, files may have been obtained from its systems. Amerita confirmed that the information potentially compromised in the incident included names, addresses, medical histories, diagnoses, medications, and health insurance information. No evidence was found to suggest Social Security numbers and driver’s license numbers were compromised. Amerita and PharMerica have enhanced their technical security measures to prevent similar incidents in the future. Amerita did not state the exact nature of the attack in its notification letters; however, this appears to have been a...

Read More

OCR; ONC Release Updated Security Risk Assessment Tool

The HHS’ Office for Civil Rights (OCR) and the Office of the National Coordinator for Health Information Technology (ONC) have released an updated version of their Security Risk Assessment (SRA) Tool. The risk analysis is one of the most important requirements of the HIPAA Security Rule. HIPAA-regulated entities are required to conduct a risk analysis to identify and assess all potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI). If a thorough and accurate organization-wide risk analysis is not conducted, risks and vulnerabilities are likely to remain unaddressed and can be exploited by malicious actors to gain access to ePHI. Despite its importance, many HIPAA-regulated entities fail to comply with this requirement and the HIPAA Security Rule. Risk analysis failures are one of the most common HIPAA violations uncovered by OCR in its data breach investigations and HIPAA compliance reviews. The SRA tool is a downloadable desktop application that was developed by ONC in collaboration with OCR to...

Read More
Russian National Indicted for Scripps Health Ransomware Attack; 11 TrickBot/Conti Actors Sanctioned
Sep13

Russian National Indicted for Scripps Health Ransomware Attack; 11 TrickBot/Conti Actors Sanctioned

The indictments of multiple members of the TrickBot/Conti Ransomware groups have recently been unsealed and 11 members of these cybercriminal operations have been sanctioned by the United States and the United Kingdom. A federal grand Jury in the Southern District of California indicted and charged Russian national, Maksim Galochkin, his role in a cyberattack on Scripps Health in May 2021. Galochkin and his co-conspirators are alleged to have conducted more than 900 attacks worldwide using Conti ransomware, including the attack on Scripps Health. A federal grand jury in the Northern District of Ohio indicted Galochkin and co-conspirators Maksim Rudenskiy, Mikhail Mikhailovich Tsarev, Andrey Yuryevich Zhuykov, Dmitry Putilin, Sergey Loguntsov, Max Mikhaylov, Valentin Karyagin, and Maksim Khaliullin, over the use of TrickBot malware to steal funds and confidential information from businesses and financial institutions in the United States since 2015. A federal grand jury in the Middle District of Tennessee returned an indictment charging Galochkin and co-conspirators Rudenskiy,...

Read More

UnitedHealthcare Services Sued for MOVEit Transfer Data Breach

A class action lawsuit has been filed against the student healthcare insurer UnitedHealthcare Services, which does business as UnitedHealthcare Student Resources, over its MOVEit Transfer data breach in May 2023. The lawsuit names Kelly Abramowitz as the plaintiff and alleges the health insurer failed to implement appropriate security measures to ensure the protected health information of plan members’ data. Hundreds of organizations fell victim to the attacks, which mass exploited a zero-day vulnerability in Progress Software’s MOVEit Transfer file transfer solution. Progress Software released a patch to fix the vulnerability on May 31, 2023; however, the Clop ransomware group had already exploited the vulnerability and exfiltrated sensitive data. Ransom demands were issued, and payment was required to prevent the publication of stolen data on the group’s data leak site. The attack on UnitedHealthcare resulted in the theft of names, dates of birth, addresses, phone numbers, email addresses, plan identification numbers, student identification numbers, healthcare information, claims...

Read More

Akira Ransomware Group Targeting the Healthcare and Public Health Sector

The HHS’ Health Sector Cybersecurity Coordination Center (HC3) has issued a health and public health (HPH) sector alert about a new ransomware group called Akira, which has been in operation since March 2023. Akira is a ransomware-as-a-service (RaaS) group that recruits affiliates to conduct attacks in exchange for a percentage of the profits they generate. The group mostly attacks small- to medium-sized businesses, although sets substantial ransom payments, which are typically between $200,000 and $4 million. The group has claimed at least 60 victims in a little over 5 months of operation, including organizations in the HPH sector. The group engages in double extortion tactics, where valuable data are identified and exfiltrated before files are encrypted. The group issues a ransom demand, payment of which is required for the keys to decrypt files and to prevent the release of stolen data. Victims are required to contact the group via their TOR site to negotiate the ransom payment. Victims who pay the ransom are offered a security report that explains the vulnerabilities the group...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist