Tips for all Healthcare Workers to Protect against Cyberattacks

Cyberattacks have been a growing threat in healthcare over the past year and there is no end in sight. In fact, one Georgia University Hospital reported defending against 550 cyberattacks on their Epic MyChart system each day – 20% of them coming from emails to staff.
However, not all attacks are defended. In 2019, 41.4 million patient records were compromised – almost three times more than in 2018, and the COVID-19 pandemic heightened this in 2020 as many healthcare workers moved to virtual workspaces. Recent survey results suggest that 1,500 healthcare providers are vulnerable to data breaches of 500 or more records, representing a 300% increase over 2019.

How are patient records being compromised?

Human behavior is the largest factor in over 60% of healthcare data breaches (through malware, hacking, and social media or email phishing).

healthcare-08-00133-g004
https://pubmed.ncbi.nlm.nih.gov/32414183/

How can all healthcare staff do their part to protect their patients?

While every health system continues to tighten down on controls to prevent cyberattacks (virus and malware protection, software patching, spam filtering), every employee – nurse, AP clerk, maintenance worker, etc. – must do their part to reduce the human error aspect. After all, even secure technological systems can be thwarted by untrained or inadvertent actions.

For example, phishing, a top scheme planted by hackers, preys on human behavior by impersonating a credible contact, often an authority figure, and prompting a response. To help reduce this, TAG’s VP of Business Solutions overseeing IT, put together this list to help against phishing attempts:

1 icon

Are you being asked to send sensitive information via email? Legitimate senders do not request personal information such as passwords, social security numbers, or credit card numbers via email.

2 icon

Is the email addressed to you? Most legitimate requests use your name rather than customer, member, account holder, etc.

3 icon

What is the email domain? Is the email originating from the sender\’s correct domain? Hold your mouse over the email, without clicking, to confirm the email address and text match.

4 icon

Are the spelling or grammar suspicious? Obvious spelling and grammar mistakes are a tip-off to a scam.

5 icon

Is the email prompting you to click on a link? Most phishing e-mails convey a sense of urgency. Again, hover over the link (do not click) to confirm they match the address represented in the email.

6 icon
Is there an unsolicited attachment? Were you sent a .zip or other attachment and a request to open from an unknown source?

phishing email example - TAG inc.

Each of these is a tip-off to a threat that can be avoided with extra attention. Examples like this can be used to tighten spam email rules – by yourself or your system administrator.

If phishing schemes are found, notify your IT department as soon as possible to reduce the threat of others within your organization falling victim.

Collective action is essential to protect data from increasingly stealthy threats. When everyone plays their part, we can all keep ourselves and our data secure from ‘dechickens’ out there.