Blog Post

Go phish: How to build a human firewall to protect against phishing

June 21, 2017

    In health care, we've seen a huge spike in social engineering style cyberattacks, most particularly in phishing—in which hackers send an email disguised as a trustworthy entity to induce individuals to reveal information such as login credentials or sensitive data for malicious purposes.

    A Bitglass study of HHS's Wall of Shame—where the department publishes all breaches that affect 500 or more patients—found that 68% of the records breached in 2014 resulted from a lost or stolen laptop, but in 2016, a staggering 98% of records compromised were due to hacks.

    Have a Question?


    Ask our experts a question on any topic in health care by visiting our member portal, AskAdvisory.