Cargando…
Phishing simulation exercise in a large hospital: A case study
BACKGROUND: Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations. There are many factors influencing th...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
SAGE Publications
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8935590/ https://www.ncbi.nlm.nih.gov/pubmed/35321019 http://dx.doi.org/10.1177/20552076221081716 |
_version_ | 1784672064885489664 |
---|---|
author | Rizzoni, Fabio Magalini, Sabina Casaroli, Alessandra Mari, Pasquale Dixon, Matt Coventry, Lynne |
author_facet | Rizzoni, Fabio Magalini, Sabina Casaroli, Alessandra Mari, Pasquale Dixon, Matt Coventry, Lynne |
author_sort | Rizzoni, Fabio |
collection | PubMed |
description | BACKGROUND: Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations. There are many factors influencing the difficulty of detecting a phishing email including fatigue and the nature of the deceptive message. METHOD: A major Italian Hospital with over 6000 healthcare staff performed a phishing simulation as part of its annual training and risk assessment. Three campaigns were launched at approx. 4-month intervals, to compare staff reaction to a general phishing email and a customized one. RESULTS: The results show that customization of phishing emails makes them much more likely to be acted on. In the first campaign, 64% of staff did not open the general phish, significantly more than the 38% that did not open the custom phish. A significant difference was also found for the click rate, with significantly more staff clicking on the custom phish. However, the campaigns could not be run as intended, due to issues raised within the organization. CONCLUSIONS: Phishing simulation is useful but not without its limitations. It requires contextual knowledge, skill and experience to ensure that it is effective. The exercise raised many issues within the Hospital. Successful, ethical phishing simulations require coordination across the organization, precise timing and lack of staff awareness. This can be complex to coordinate. Misleading messages containing false threats or promises can cause a backlash from staff and unions. The effectiveness of the message is dependent on the personalization of the message to current, local events. The lessons learned can be useful for other hospitals. |
format | Online Article Text |
id | pubmed-8935590 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | SAGE Publications |
record_format | MEDLINE/PubMed |
spelling | pubmed-89355902022-03-22 Phishing simulation exercise in a large hospital: A case study Rizzoni, Fabio Magalini, Sabina Casaroli, Alessandra Mari, Pasquale Dixon, Matt Coventry, Lynne Digit Health Original Research BACKGROUND: Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations. There are many factors influencing the difficulty of detecting a phishing email including fatigue and the nature of the deceptive message. METHOD: A major Italian Hospital with over 6000 healthcare staff performed a phishing simulation as part of its annual training and risk assessment. Three campaigns were launched at approx. 4-month intervals, to compare staff reaction to a general phishing email and a customized one. RESULTS: The results show that customization of phishing emails makes them much more likely to be acted on. In the first campaign, 64% of staff did not open the general phish, significantly more than the 38% that did not open the custom phish. A significant difference was also found for the click rate, with significantly more staff clicking on the custom phish. However, the campaigns could not be run as intended, due to issues raised within the organization. CONCLUSIONS: Phishing simulation is useful but not without its limitations. It requires contextual knowledge, skill and experience to ensure that it is effective. The exercise raised many issues within the Hospital. Successful, ethical phishing simulations require coordination across the organization, precise timing and lack of staff awareness. This can be complex to coordinate. Misleading messages containing false threats or promises can cause a backlash from staff and unions. The effectiveness of the message is dependent on the personalization of the message to current, local events. The lessons learned can be useful for other hospitals. SAGE Publications 2022-03-16 /pmc/articles/PMC8935590/ /pubmed/35321019 http://dx.doi.org/10.1177/20552076221081716 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access page (https://us.sagepub.com/en-us/nam/open-access-at-sage). |
spellingShingle | Original Research Rizzoni, Fabio Magalini, Sabina Casaroli, Alessandra Mari, Pasquale Dixon, Matt Coventry, Lynne Phishing simulation exercise in a large hospital: A case study |
title | Phishing simulation exercise in a large hospital: A case study |
title_full | Phishing simulation exercise in a large hospital: A case study |
title_fullStr | Phishing simulation exercise in a large hospital: A case study |
title_full_unstemmed | Phishing simulation exercise in a large hospital: A case study |
title_short | Phishing simulation exercise in a large hospital: A case study |
title_sort | phishing simulation exercise in a large hospital: a case study |
topic | Original Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8935590/ https://www.ncbi.nlm.nih.gov/pubmed/35321019 http://dx.doi.org/10.1177/20552076221081716 |
work_keys_str_mv | AT rizzonifabio phishingsimulationexerciseinalargehospitalacasestudy AT magalinisabina phishingsimulationexerciseinalargehospitalacasestudy AT casarolialessandra phishingsimulationexerciseinalargehospitalacasestudy AT maripasquale phishingsimulationexerciseinalargehospitalacasestudy AT dixonmatt phishingsimulationexerciseinalargehospitalacasestudy AT coventrylynne phishingsimulationexerciseinalargehospitalacasestudy |