2019
DOI: 10.1136/bmjhci-2019-100031
|View full text |Cite
|
Sign up to set email alerts
|

Phishing in healthcare organisations: threats, mitigation and approaches

Abstract: IntroductionHealthcare data have significant value as a potential target for hackers. Phishing is a method of exploitation for malicious reasons using targeted communications (email/messaging). This study reports on an internal evaluation targeting hospital staff and summarises peer-reviewed literature regarding phishing and healthcare.MethodsAn assessment was performed as part of cybersecurity activity during a designated test period using multiple credential harvesting approaches through staff email. We also… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(44 citation statements)
references
References 15 publications
0
36
0
Order By: Relevance
“…There are a few open issues regarding the security of the ICU; as shown in this paper, one of these issues is the human factor, which could be utilized as an attack vector through social engineering techniques [79] in 15 of the attacks we presented (for example, by sending a malicious link or inserting an infected USB into an operating system). Moreover, the trend of using social engineering techniques in healthcare, such as phishing, has been continuously growing [86]. Based on our understanding, the medical team is not well trained regarding seurity issues or aware of the security problems that exist.…”
Section: Discussionmentioning
confidence: 99%
“…There are a few open issues regarding the security of the ICU; as shown in this paper, one of these issues is the human factor, which could be utilized as an attack vector through social engineering techniques [79] in 15 of the attacks we presented (for example, by sending a malicious link or inserting an infected USB into an operating system). Moreover, the trend of using social engineering techniques in healthcare, such as phishing, has been continuously growing [86]. Based on our understanding, the medical team is not well trained regarding seurity issues or aware of the security problems that exist.…”
Section: Discussionmentioning
confidence: 99%
“…Apart from the studies enumerated above, we perused the work of Ward Priestman et al which is based on classifying different factors for healthcare sector [27]. This study, in particular, became the premise of our research investigations.…”
Section: Past Research Initiativesmentioning
confidence: 99%
“…The questionnaire was based on queries related to the healthcare information security exploitation issue. On the basis of the experts' opinion, the authors aligned every factor that is affecting a particular layer with the classical healthcare data handling model [24][25][26][27]. Figure 4 describes the different factors and their related layers.…”
Section: Various Factors: Affecting Healthcare Data Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…However, it alerts the health facilities and its stakeholders on dangers derived from the use of these technologies [90]. This danger can derive from internal problems-e.g., the wrong design of the computer network or inefficient processes [22]-and external problems-e.g., cyber-attack by hackers [24]. These dangers are increasingly widespread and difficult to control all activities [91].…”
mentioning
confidence: 99%