By Shana Tachikawa
Amidst the worldwide Coronavirus pandemic, cyber criminals are trying to take advantage of individuals and organizations' fear and fragile state. Even frontline agencies are major cybercrime targets at this time. The World Health Organization (WHO) has seen clear increase in cyberattack attempts. One recent attempt tried to spoof a WHO login portal to gain access to employee passwords. This was thankfully caught and mitigated, while the U.S. Department of Health and Human Services (HHS) has also had to defend against recent cybercriminal attacks. Now, even COVID-19 research centers in the U.S., U.K. and Canada, which are working around the clock on developing vaccinations, have been the most recent cyber target.
Jump in email phishing
As published by Healthcare IT News, a recent GreatHorn ransomware report found that there were 15 times more phishing attacks in the first two weeks of March than there were for all of January 2020. As of March 14, 2020, Coronavirus-related email threats made up 2% of all email traffic, often impersonating official health organizations' credentials, like the CDC. But the attempts don't stop with email. The HHS Office of the Inspector General issued a fraud alert for Medicare beneficiaries, who are said to be targeted through telemarketing, social media and even door-to-door schemes.
Organizations' responsibility
With the majority of the U.S. under stay-at-home orders, the big push in the last few weeks has been to test and establish end-user remote access. But the responsibility extends beyond initial set up for continued support, maintenance and end-user education, especially in terms of cybersecurity compliance and documentation. Virtual private networks (VPNs) tend to be more vulnerable and targeted by malicious attacks. In fact, Microsoft has alerted dozens of hospitals that their gateway and VPN appliances are actively being targeted by ransomware groups. To help healthcare facilities stay prepared, we’ve compiled the following cybersecurity best practices — many of which coordinate with U.S. Cybersecurity & Infrastructure Security Agency (CISA) recommendations:
Individuals' responsibility
To remain on the defense for cybersecurity compliance during the COVID-19 crisis, think before you click. Even if it seems like a request from a healthcare provider, double check credentials.
To remain up-to-date on the latest healthcare and health IT industry insights, check back to the Stoltenberg Blog.
Secure dependable fully U.S. based Tier 1-3 EHR and technical support, including remote access and service desk assistance, with immediate turnaround.