How susceptible are hospital employees to phishing attacks?
Cybersecurity threats are a rising problem in society, especially for healthcare organizations. Successful attacks can jeopardize not only patient data but also patient care, leading to cancellations and disruptions in the critical services that hospitals provide.
While many hospitals have taken steps to educate, inform and forewarn their employees about cybersecurity attacks, few studies have quantified how susceptible hospital employees are to phishing attacks.
A new study led by investigators from Brigham and Women’s Hospital addresses these questions through a multicenter study that aggregated data from six healthcare institutions that ran phishing simulations over the course of seven years.
The team reports a high click rate for simulated phishing but also a reduction in click rates with increasing campaigns, suggesting a potential benefit for raising awareness.
“Information security is increasingly important for healthcare organizations, and cybersecurity attacks are a major risk to a hospital’s ability to operate and deliver care,” said corresponding author William Gordon, MD, MBI, of the Brigham’s Division of General Internal Medicine and Primary Care. “But our study suggests that while the risk is high, there is an opportunity to mitigate it through training.”
Phishing attacks via email can lure individuals into disclosing sensitive personal information or clicking on links that download malicious software. Many organizations have made a concerted effort to train their employees to recognize and report these attacks by sending simulated phishing emails, ranging from office- and IT-related to personal-related correspondence, and subsequently training those who inappropriately click or enter their credentials.
Brigham investigators aggregated data from six anonymized U.S. healthcare institutions representing a broad spectrum of care and geography. In total, they analyzed click rates for more than 2.9 million simulated emails.
The team reports that 422,052 of these emails were clicked (14.2 percent) — roughly one in every seven. However, the odds of clicking on a phishing email decreased with increasing campaigns. After institutions had run 10 or more phishing simulation campaigns, the odds went down by more than one-third.
The authors note that many factors may go into why an individual clicks on an email and that their study, which did not drill down to the level of individual employees, could not take all of these complexities into account. In addition, the study could not answer whether the improvements may be sustainable, and for how long, after a campaign ends.
“The rates that we report here are consistent with findings across other industries, where click rates can range from 13 to 49 percent, depending on the industry, but we know that in healthcare the stakes are high. Patient data, patient care, patient trust and financial stability may be on the line,” said Gordon. “Understanding susceptibility, but also what steps can be taken to mitigate it, are critical as cyberattacks continue to rise.”