Share this
Phishing Attacks: A Hacker’s Gateway to Patient Health Records
by Cate Stanton on November 9, 2016
Over the past few weeks, we focused our “Patients at Risk” series on the various threats that hospital insiders present to patient data. Now, we are shifting our attention to ones stemming from external parties.
Phishing attacks are one way hackers break into networks and gain access to sensitive health data. In the healthcare industry, it’s a popular strategy for stealing patient data stored in the EHR. Allen Paller, the Director of Research at the SANS Institute, describes phishing as the primary gateway to hospital networks as 95% of all hacking attacks on enterprise networks gained entry through phishing.
Phishing Isn't Rocket Science
To understand why hackers use phishing tactics so frequently, it’s essential to understand how they work. Most simply, think of it as a play on words; phishing attacks involve hackers going fishing for information.
Phishing in on getting around health cybersecurity by tricking someone into divulging sensitive information that provides the hacker an access point into an organization's network - a type of activity that’s called social engineering.
The processes for carrying out phishing attacks are well-known. Hackers identify institutions, find relevant employees’ email addresses, compose emails, and build fake web pages. Since most people don’t willingly shell out their bank account information, credit card numbers, or passwords, phishers take extra steps to make their correspondence look legitimate. They often use real company logos and email copy. They send the emails from spoofed addresses, and design web pages to look valid even though they are merely ploys to gain credentials. Emails may have attachments containing malware, ransomware, or malicious links. Next, the phisher sends the phony message. If the employee opens the email, link, or attachment, and turns over their information, the phisher records the information, which can be used to access the locked network. In the database, they can gather and steal patient health data information and use it to commit various forms of identity fraud.
Within phishing, spear phishing has proven to be a particularly effective tactic. It involves highly targeted and customized emails designed with specific individuals in mind, allowing correspondence to get past spam filters. The success rate of spear phishing attacks is considerably higher than phishing attacks, with users opening a modest 5% of phishing emails compared to 50% of spear phishing emails.
The Dangers of Ransomware
A successful phishing attack is one where the hacker enters the network or database because they gain employee credentials or the system becomes affected by ransomware, malware, or another type of unwelcome software.
Ransomware attacks have recently plagued the healthcare industry. Research conducted by HIMSS and Healthcare IT News found that up to 75% of hospitals may have been affected by ransomware in the past year. Ransomware is a type of malware that prevents an organization from accessing certain parts of its system. Typically, data is held hostage and business operations grind to a halt until the healthcare organization pays a certain amount of money to the hackers or the system is replaced, a particularly dangerous situation when patients' lives are on the line.
Four Steps That Can Make a Big Difference
Evidence points to healthcare employees being unprepared to face phishing threats. A Verizon report found that healthcare workers missed more questions about how to protect confidential information than employees in other industries when surveyed about data security. The report also showed that professional services and healthcare employees performed the lowest on questions asked about safe passwords.
However, it’s not all doom and gloom. Here are four steps that healthcare institutions can take to prevent phishing attacks and medical data breaches:
- Educate Employees: Many experts cite employee education and training as the key to stopping phishing attacks because phishing is all about exploiting people’s weaknesses. Beyond teaching employees how to detect fishy correspondence and sites, phishing test kits imitate real incidents, preparing users to act during an actual incident. Additionally, employees should know who to contact in the event they receive suspicious correspondence.
- Install Two-Factor Authentication: Falling for phishing becomes less serious if a username and password do not act as a master key to your network. Two-factor authentication gives you a separate way of verifying that employees are who they claim to be.
- Backup Data: 93% of all phishing emails contained encryption ransomware in 2016. Storing an institution’s data in more than one place will potentially ensure that critical information remains accessible in some way, and that healthcare organizations can continue to run even when affected by ransomware.
- Implement a Behavior Monitoring System: Hackers will almost surely access patient data differently from how authorized users access this information. Hospital privacy monitoring platforms can alert organizations to any suspicious and abnormal activity in access patterns, thereby catching malicious activity before it spirals out of control.
Perhaps it’s most essential to understand that no single product, policy, or strategy should be the sole silver bullet solution to keeping patient data safe from unwanted parties. Rather, a combination of multiple solutions that work together and tackle distinct threats within your system is key to preventing health data breaches.
Share this
- November 1, 2024 (1)
- October 1, 2024 (2)
- September 1, 2024 (1)
- August 1, 2024 (1)
- July 1, 2024 (1)
- June 1, 2024 (1)
- May 1, 2024 (1)
- March 1, 2024 (2)
- February 1, 2024 (3)
- January 1, 2024 (1)
- December 1, 2023 (1)
- November 1, 2023 (3)
- October 1, 2023 (3)
- September 1, 2023 (1)
- August 1, 2023 (1)
- July 1, 2023 (2)
- April 1, 2023 (1)
- March 1, 2023 (1)
- February 1, 2023 (1)
- December 1, 2022 (3)
- November 1, 2022 (3)
- October 1, 2022 (1)
- September 1, 2022 (1)
- August 1, 2022 (2)
- June 1, 2022 (4)
- May 1, 2022 (5)
- April 1, 2022 (1)
- March 1, 2022 (4)
- February 1, 2022 (3)
- November 1, 2021 (2)
- October 1, 2021 (3)
- September 1, 2021 (3)
- August 1, 2021 (3)
- July 1, 2021 (4)
- June 1, 2021 (2)
- May 1, 2021 (2)
- April 1, 2021 (2)
- March 1, 2021 (5)
- February 1, 2021 (2)
- January 1, 2021 (1)
- December 1, 2020 (1)
- November 1, 2020 (2)
- October 1, 2020 (2)
- September 1, 2020 (3)
- August 1, 2020 (2)
- July 1, 2020 (2)
- June 1, 2020 (6)
- May 1, 2020 (3)
- April 1, 2020 (4)
- March 1, 2020 (2)
- February 1, 2020 (4)
- January 1, 2020 (2)
- December 1, 2019 (2)
- November 1, 2019 (1)
- October 1, 2019 (1)
- September 1, 2019 (1)
- August 1, 2019 (1)
- June 1, 2019 (1)
- April 1, 2019 (1)
- February 1, 2019 (1)
- January 1, 2019 (1)
- December 1, 2018 (2)
- November 1, 2018 (2)
- October 1, 2018 (2)
- September 1, 2018 (3)
- August 1, 2018 (1)
- July 1, 2018 (2)
- June 1, 2018 (2)
- May 1, 2018 (1)
- April 1, 2018 (1)
- March 1, 2018 (2)
- February 1, 2018 (6)
- January 1, 2018 (2)
- September 1, 2017 (2)
- August 1, 2017 (2)
- June 1, 2017 (2)
- May 1, 2017 (1)
- April 1, 2017 (1)
- March 1, 2017 (2)
- February 1, 2017 (5)
- January 1, 2017 (2)
- December 1, 2016 (3)
- November 1, 2016 (5)
- October 1, 2016 (4)
- September 1, 2016 (8)
- August 1, 2016 (4)
- July 1, 2016 (4)