Cargando…
Phishing in healthcare organisations: threats, mitigation and approaches
INTRODUCTION: Healthcare data have significant value as a potential target for hackers. Phishing is a method of exploitation for malicious reasons using targeted communications (email/messaging). This study reports on an internal evaluation targeting hospital staff and summarises peer-reviewed liter...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
BMJ Publishing Group
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7062337/ https://www.ncbi.nlm.nih.gov/pubmed/31488498 http://dx.doi.org/10.1136/bmjhci-2019-100031 |
_version_ | 1783504513898905600 |
---|---|
author | Priestman, Ward Anstis, Tony Sebire, Isabel G Sridharan, Shankar Sebire, Neil J |
author_facet | Priestman, Ward Anstis, Tony Sebire, Isabel G Sridharan, Shankar Sebire, Neil J |
author_sort | Priestman, Ward |
collection | PubMed |
description | INTRODUCTION: Healthcare data have significant value as a potential target for hackers. Phishing is a method of exploitation for malicious reasons using targeted communications (email/messaging). This study reports on an internal evaluation targeting hospital staff and summarises peer-reviewed literature regarding phishing and healthcare. METHODS: An assessment was performed as part of cybersecurity activity during a designated test period using multiple credential harvesting approaches through staff email. We also searched the medical-related literature to identify relevant phishing-related publications. RESULTS: During the 1-month testing period, the organisation received 858 200 emails: 139 400 (16%) marketing, 18 871 (2%) identified as potential threats. Of 143 million internet transactions, around 5 million (3%) were suspected threats. 468 employee email addresses were identified from public data and targeted through phishing using a range of payloads including attachments and malicious links; however, no credentials were recovered or malicious files downloaded. Several hospital employees were, however, identified on social media profiles, including some tricked into accepting false friend requests. DISCUSSION: Healthcare organisations are increasingly moving to digital systems, but healthcare professionals have limited awareness of threats. Increasing emphasis on ‘cyberhygiene’ and information governance through mandatory training increases understanding of these risks. While no credentials were harvested in this study, since up to 5% of emails/internet traffic are suspicious, the need for robust firewalls, cybersecurity infrastructure, IT policies and, most importantly of all, staff training, is emphasised. CONCLUSION: Hospitals receive a significant volume of potentially malicious emails. While many staff appear to be aware of phishing and respond appropriately, ongoing education is required across the spectrum of cybersecurity, with specific emphasis around ‘leakage’ of information on social media. |
format | Online Article Text |
id | pubmed-7062337 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | BMJ Publishing Group |
record_format | MEDLINE/PubMed |
spelling | pubmed-70623372020-09-30 Phishing in healthcare organisations: threats, mitigation and approaches Priestman, Ward Anstis, Tony Sebire, Isabel G Sridharan, Shankar Sebire, Neil J BMJ Health Care Inform Original Research INTRODUCTION: Healthcare data have significant value as a potential target for hackers. Phishing is a method of exploitation for malicious reasons using targeted communications (email/messaging). This study reports on an internal evaluation targeting hospital staff and summarises peer-reviewed literature regarding phishing and healthcare. METHODS: An assessment was performed as part of cybersecurity activity during a designated test period using multiple credential harvesting approaches through staff email. We also searched the medical-related literature to identify relevant phishing-related publications. RESULTS: During the 1-month testing period, the organisation received 858 200 emails: 139 400 (16%) marketing, 18 871 (2%) identified as potential threats. Of 143 million internet transactions, around 5 million (3%) were suspected threats. 468 employee email addresses were identified from public data and targeted through phishing using a range of payloads including attachments and malicious links; however, no credentials were recovered or malicious files downloaded. Several hospital employees were, however, identified on social media profiles, including some tricked into accepting false friend requests. DISCUSSION: Healthcare organisations are increasingly moving to digital systems, but healthcare professionals have limited awareness of threats. Increasing emphasis on ‘cyberhygiene’ and information governance through mandatory training increases understanding of these risks. While no credentials were harvested in this study, since up to 5% of emails/internet traffic are suspicious, the need for robust firewalls, cybersecurity infrastructure, IT policies and, most importantly of all, staff training, is emphasised. CONCLUSION: Hospitals receive a significant volume of potentially malicious emails. While many staff appear to be aware of phishing and respond appropriately, ongoing education is required across the spectrum of cybersecurity, with specific emphasis around ‘leakage’ of information on social media. BMJ Publishing Group 2019-09-04 /pmc/articles/PMC7062337/ /pubmed/31488498 http://dx.doi.org/10.1136/bmjhci-2019-100031 Text en © Author(s) (or their employer(s)) 2019. Re-use permitted under CC BY-NC. No commercial re-use. See rights and permissions. Published by BMJ. This is an open access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited, appropriate credit is given, any changes made indicated, and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/. |
spellingShingle | Original Research Priestman, Ward Anstis, Tony Sebire, Isabel G Sridharan, Shankar Sebire, Neil J Phishing in healthcare organisations: threats, mitigation and approaches |
title | Phishing in healthcare organisations: threats, mitigation and approaches |
title_full | Phishing in healthcare organisations: threats, mitigation and approaches |
title_fullStr | Phishing in healthcare organisations: threats, mitigation and approaches |
title_full_unstemmed | Phishing in healthcare organisations: threats, mitigation and approaches |
title_short | Phishing in healthcare organisations: threats, mitigation and approaches |
title_sort | phishing in healthcare organisations: threats, mitigation and approaches |
topic | Original Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7062337/ https://www.ncbi.nlm.nih.gov/pubmed/31488498 http://dx.doi.org/10.1136/bmjhci-2019-100031 |
work_keys_str_mv | AT priestmanward phishinginhealthcareorganisationsthreatsmitigationandapproaches AT anstistony phishinginhealthcareorganisationsthreatsmitigationandapproaches AT sebireisabelg phishinginhealthcareorganisationsthreatsmitigationandapproaches AT sridharanshankar phishinginhealthcareorganisationsthreatsmitigationandapproaches AT sebireneilj phishinginhealthcareorganisationsthreatsmitigationandapproaches |