Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

Hospitals are often in the news due to data breaches, and email hacks are often the cause. Investigations of the matters frequently find unauthorized parties were able to gain access to email accounts at health care facilities, and everything started when an employee clicked on a phishing email and gave the information it requested. Why does this happen?

1. Hospitals Don't Have Adequate Security Budgets

Most people who have even a bare-bones familiarity with phishing emails know one of the reasons they work is that the messages look so realistic. One recent study wanted to see what percentage of people at health care facilities would interact with simulated phishing emails. The study involved six health organizations and more than 2.9 million emails.

An analyzed sample of the results showed workers clicked on phishing emails one out of every seven times. However, the findings also revealed the click rates went down when people received ongoing exposure to campaigns that helped them recognize and avoid phishing emails.

Training is an excellent way to help people stay aware of phishing and its dangers. Moreover, tools can screen for suspicious emails and stop them from reaching employees' inboxes. But, both those things cost money, and health care facilities aren't putting enough toward cybersecurity.

Research compiled by Symantec shows the cybersecurity budgets at health care organizations are far smaller than they should be. More specifically, the statistics show 74 percent of providers in the health industry devote 6 percent or less of their budgets to IT security.

It's widely known health care organizations lag when beefing up cybersecurity. For example, at a hospital where a phishing attack may have compromised the data of more than 60,000 people, the organization started using multi-factor authentication afterward, but that's arguably an essential step that should have happened earlier.

2. Hackers Prey on Urgency and Use Personalization

Today's cybercriminals who use phishing as their attack type of choice know all the most successful tricks to use to make people fall victim to the scams. That often means emphasizing urgency. Hospital workers know life-and-death situations well, and they understand inefficiency can have dire consequences. So, necessity is an aspect that can push health care workers to act.

It's also common for phishing emails to have personalized elements, such as including a person's name or having content related to a person's industry. If an employee at a medical facility received a phishing email about medical insurance, an upcoming health conference or a supposed login issue at a medical site that requires a person to confirm their password, they'd likely click on it after assuming it is pertinent to their job responsibilities.

Hackers typically don't mind putting in the extra effort to include details that convey urgency or seem personalized for the recipient. That's because there's so much at stake. Health care providers and associated brands around the world have to prepare for an extra 2.5 trillion bytes of data daily, including figuring out how to protect that information.

The tremendous amount of data hospitals handle frequently features information that is exceptionally valuable to hackers, such as Social Security numbers, complete addresses and credit card numbers. The substantial payoff associated with a successful phishing attempt gives cybercriminals plenty of reasons to research what matters most to health workers and craft their messages accordingly, encouraging people to click.

3. Phishing Emails Come in Many Forms

As mentioned in the previous section, hackers like to capitalize on urgency and personalize messages when possible. However, predicting the elements of a phishing email is not as straightforward as some people think.

A 2018 paper from Cofense took an in-depth look at the phishing problem in the health care sector. It found many of the phishing emails that get results most often are those appearing entirely innocent and generic. For example, people were most likely to click phishing emails that requested invoices, followed by those about manager evaluations and messages about package deliveries.

Also, the phishing emails examined in the study either asked people to enter data or click on links. Some of the emails in the latter category were extremely simple, containing content such as "Thank you for your business. Please find your invoice at this link."

A person who works at a medical facility and regularly receives invoices likely wouldn't suspect anything odd after seeing such a brief message. They'd appreciate that it's to the point and doesn't require too much of their time.

The problem is that although some red flags identify phishing emails, such as lots of spelling and grammar mistakes and requests to enter one's password, cybercriminals change their methods frequently and know it's sometimes best to focus on simplicity. As such, even employees who know most of the telltale signs of phishing emails may still become victims.

A Care-Centric Industry

The medical sector puts patient care at the forefront. Many of the people working in it see cybersecurity as less critical, especially if associated training takes away from time spent with patients.

But, phishing attacks can be severe enough to shut down entire hospitals. With that in mind, hospitals should view phishing prevention as something that ties into caring for those in need.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3