Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

Hospitals are often in the news due to data breaches, and email hacks are often the cause. Investigations of the matters frequently find unauthorized parties were able to gain access to email accounts at health care facilities, and everything started when an employee clicked on a phishing email and gave the information it requested. Why does this happen?

1. Hospitals Don't Have Adequate Security Budgets

Most people who have even a bare-bones familiarity with phishing emails know one of the reasons they work is that the messages look so realistic. One recent study wanted to see what percentage of people at health care facilities would interact with simulated phishing emails. The study involved six health organizations and more than 2.9 million emails.

An analyzed sample of the results showed workers clicked on phishing emails one out of every seven times. However, the findings also revealed the click rates went down when people received ongoing exposure to campaigns that helped them recognize and avoid phishing emails.

Training is an excellent way to help people stay aware of phishing and its dangers. Moreover, tools can screen for suspicious emails and stop them from reaching employees' inboxes. But, both those things cost money, and health care facilities aren't putting enough toward cybersecurity.

Research compiled by Symantec shows the cybersecurity budgets at health care organizations are far smaller than they should be. More specifically, the statistics show 74 percent of providers in the health industry devote 6 percent or less of their budgets to IT security.

It's widely known health care organizations lag when beefing up cybersecurity. For example, at a hospital where a phishing attack may have compromised the data of more than 60,000 people, the organization started using multi-factor authentication afterward, but that's arguably an essential step that should have happened earlier.

2. Hackers Prey on Urgency and Use Personalization

Today's cybercriminals who use phishing as their attack type of choice know all the most successful tricks to use to make people fall victim to the scams. That often means emphasizing urgency. Hospital workers know life-and-death situations well, and they understand inefficiency can have dire consequences. So, necessity is an aspect that can push health care workers to act.

It's also common for phishing emails to have personalized elements, such as including a person's name or having content related to a person's industry. If an employee at a medical facility received a phishing email about medical insurance, an upcoming health conference or a supposed login issue at a medical site that requires a person to confirm their password, they'd likely click on it after assuming it is pertinent to their job responsibilities.

Hackers typically don't mind putting in the extra effort to include details that convey urgency or seem personalized for the recipient. That's because there's so much at stake. Health care providers and associated brands around the world have to prepare for an extra 2.5 trillion bytes of data daily, including figuring out how to protect that information.

The tremendous amount of data hospitals handle frequently features information that is exceptionally valuable to hackers, such as Social Security numbers, complete addresses and credit card numbers. The substantial payoff associated with a successful phishing attempt gives cybercriminals plenty of reasons to research what matters most to health workers and craft their messages accordingly, encouraging people to click.

3. Phishing Emails Come in Many Forms

As mentioned in the previous section, hackers like to capitalize on urgency and personalize messages when possible. However, predicting the elements of a phishing email is not as straightforward as some people think.

A 2018 paper from Cofense took an in-depth look at the phishing problem in the health care sector. It found many of the phishing emails that get results most often are those appearing entirely innocent and generic. For example, people were most likely to click phishing emails that requested invoices, followed by those about manager evaluations and messages about package deliveries.

Also, the phishing emails examined in the study either asked people to enter data or click on links. Some of the emails in the latter category were extremely simple, containing content such as "Thank you for your business. Please find your invoice at this link."

A person who works at a medical facility and regularly receives invoices likely wouldn't suspect anything odd after seeing such a brief message. They'd appreciate that it's to the point and doesn't require too much of their time.

The problem is that although some red flags identify phishing emails, such as lots of spelling and grammar mistakes and requests to enter one's password, cybercriminals change their methods frequently and know it's sometimes best to focus on simplicity. As such, even employees who know most of the telltale signs of phishing emails may still become victims.

A Care-Centric Industry

The medical sector puts patient care at the forefront. Many of the people working in it see cybersecurity as less critical, especially if associated training takes away from time spent with patients.

But, phishing attacks can be severe enough to shut down entire hospitals. With that in mind, hospitals should view phishing prevention as something that ties into caring for those in need.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3