25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Senators Demand Answers on Amazon Clinic’s Uses of Customer Data

Two Democratic senators have demanded answers from Amazon about how it uses the data of customers of Amazon Clinic after an investigation by the Washington Post revealed individuals wishing to enroll in Amazon Clinic are required to sign away some of their privacy rights in order to use the service. Amazon Clinic was launched in November 2022 and provides virtualized healthcare services. Amazon advertises the service as “a virtual healthcare storefront through which telehealth services are offered,” with those telehealth services provided by third-party healthcare providers. The Washington Post was contacted by a reader who requested an investigation of Amazon Clinic over the terms and conditions of its sign-up form. When enrolling for Amazon Clinic, users are required to provide consent to allow the use and disclosure of their protected health information. The form states that after providing consent Amazon will be authorized to have access to a complete patient file, may re-disclose information contained in that file and that the information disclosed will no longer be subject to...

Read More

Healthcare Organizations Warned of Risk of Cyberattacks via SEO Poisoning

In a recently published analyst note, the Health Sector Cybersecurity Coordination Center (HC3) draws attention to the practice of SEO poisoning – a tactic often used by malicious actors to trick individuals into disclosing sensitive information or downloading malware. Phishing is one of the most common ways that malicious cyber actors target individuals to gain initial access to healthcare networks; however, contact may be made with healthcare employees over the Internet. SEO poisoning is a technique used to drive traffic to attacker-controlled websites where instead of distributing links to malicious websites via phishing emails or SMS/instant messaging services, search engine optimization (SEO) techniques are used to get the malicious websites to appear high in the search engine listings for key search terms. The goal is to get the websites to appear in the first few results for specific search terms. The top few results in the search engine listings attract the highest number of clicks and users tend to view the top results as the most relevant and trustworthy, and will often...

Read More

Intellihartx Facing Class Action Lawsuit Over 490K-Record Data Breach

A lawsuit has been filed against Intellihartx, LLC, (aka ITx Companies), over a cyberattack by the Clop ransomware group that exploited a vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution. The protected health information of 490,000 patients of its healthcare clients was compromised in the attack in late January. Intellihartx was one of 130 GoAnywhere users to be affected. Intellihartx, a revenue cycle management company, said protected health information was compromised in the January 30, 2023 cyberattack, including names, contact information, insurance information, diagnoses, medications, dates of birth, and Social Security numbers. Affected individuals were notified about the data breach on June 9, 2023, more than 4 months after the discovery of the attack. The lawsuit, Laren Perrone v. Intellihartx, LLC, was filed in the U.S. District Court of the Northern District of Ohio Western Division and alleges the defendant failed to properly secure and safeguard the protected health information of the plaintiff and class members, did not adequately supervise its...

Read More

Study Identifies Lack of Preparedness for Ransomware Attacks in Emergency Departments

Ransomware attacks on hospitals cause major disruption to healthcare operations over several weeks. During the acute and recovery phases, access is often prevented to electronic health records and critical IT systems which can naturally have an impact on patient care. Ransomware attacks cause disruption to workflows, increase wait times, and slow patient flow, which can increase patient transfers and complication rates and negatively affect patient outcomes. Some studies suggest mortality rates increase following a ransomware attack. Research on the impact of ransomware attacks on hospitals is limited, with studies often focusing on the technical consequences of ransomware attacks rather than the impact these attacks have on hospital staff, especially in emergency care. A recent qualitative study, Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals, which was recently published in Annals of Emergency Medicine, sought to explore the impact on staff in more detail and identify the challenges faced by healthcare professionals and...

Read More
PoC Exploit Published for CISCO AnyConnect Secure Vulnerability
Jun22

PoC Exploit Published for CISCO AnyConnect Secure Vulnerability

Proof-of-concept exploit code has been released for a high-severity vulnerability in AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows. Users that have yet to apply the patch should do so immediately to prevent exploitation. Unpatched flaws in Cisco Secure Client Software have been targeted by malicious actors in the past. Cisco Secure Client Software is a remote access solution that allows employees to connect to the network from any location via a Virtual Private Network and is used by IT admins for endpoint management. The vulnerability is tracked as CVE-2023-20178 and has a CVSS base score of 7.8. The vulnerability affects the client update process and can be exploited by an authenticated, local attacker to elevate privileges to SYSTEM level. The vulnerability is due to improper permissions on a temporary directory created during the update process and can be exploited by abusing a specific function of the Windows installer process. An attack exploiting the vulnerability has low complexity and requires no user interaction. The...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist