Social Engineering Attacks Against Healthcare

Posted by John Dimaggio on Sep 8, 2016 2:21:25 PM

In Cyber Security

Social engineering attacks against the healthcare industry are becoming more and more commonplace. Hackers are relentless in their assault against this critical infrastructure, and often use social engineering as a method to gain access to Personal Health Information (PHI), Personal Identifiable Information (PII) and financial information. Social engineering scams can occur over the phone, by email, online or in-person, with hackers often posing as a person of authority or trustworthy contact such as a network administrator, technical support representative or a vendor employee.

Social engineering is a hacker’s clever manipulation of the natural human tendency to trust and avoid conflict, with the objective of gaining access to sensitive information. Healthcare employees can be particularly vulnerable to this scam because they have a natural inclination to be helpful and provide assistance.  The hacker’s goal is to cleverly manipulate their target into unwittingly doing something outside of normal operations, such as disclose a password, user name, financial information or unknowingly download malware.

There are literally hundreds of possible social engineering tactics.  Hackers may send emails that appear to be from trusted sources that tempt the recipient to click on a link or attachment that ultimately downloads malware. Other attempts may involve incoming phone calls where the hacker poses as a representative of a known vendor in an attempt to gain sensitive financial information. Still, others may include a hacker masquerading as a help desk employee in an attempt to acquire log-in credentials, email addresses or answers to security questions. The list of possible techniques continues to grow as hackers hone and refine their skills.

It is sometimes difficult to recognize real-life examples of social engineering attacks because the crime is not easily traced.  The employee(s) that was victimized may not realize he/she disclosed sensitive information to an untrustworthy source, or may be unwilling to admit the disclosure, and therefore the incident goes unreported and undocumented. Furthermore, social engineering breaches sometimes leave no physical evidence or an easily identifiable entry point, so if a breach does occur, the method may remain a mystery.

As healthcare organizations focus on tightening IT security, the threat of social engineering can sometimes remain overlooked.  Yet just one successfully executed attack can result in a serious breach that can cost millions of dollars in fines, not to mention negative publicity and reputational damage. The best defense for healthcare organizations is to:
  • Monitor and communicate industry security trends and vulnerabilities.
  • Keep alert to current and emerging threats, and provide periodic security updates and reminders to your workforce. 

  • Educate employees on the mechanics of spam, phishing and malware. 

  • Test workforce awareness by initiating internal phishing expeditions.

For more information on how you can best protect your organization from social engineering scams, download our Cybersecurity eBook by clicking on the below link:

Download Our Cyber Security eBook

BlueOrange Compliance has been providing privacy and security assessments, remediation, training and guidance since the inception of HITECH.  Our team is comprised of former healthcare IT executives and top security, privacy and technology analysts.  Our national client base consists of hospitals, physician provider practices, Nursing Facilities, LTC Pharmacies, senior living organizations, homecare, hospice and business associates.  If you want to learn how BlueOrange Compliance can help you turn HIPAA complexity into HIPAA compliance, visit us at