Blog Post

Go phish: How to build a human firewall to protect against phishing

June 21, 2017

    In health care, we've seen a huge spike in social engineering style cyberattacks, most particularly in phishing—in which hackers send an email disguised as a trustworthy entity to induce individuals to reveal information such as login credentials or sensitive data for malicious purposes.

    A Bitglass study of HHS's Wall of Shame—where the department publishes all breaches that affect 500 or more patients—found that 68% of the records breached in 2014 resulted from a lost or stolen laptop, but in 2016, a staggering 98% of records compromised were due to hacks.

    Have a Question?


    Ask our experts a question on any topic in health care by visiting our member portal, AskAdvisory.

    Cookies help us improve your website experience. By using our website, you agree to our use of cookies.