Which of the healthcare related emails are phishing attempts? Spot the phish

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing and real emails related to healthcare. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Answer: Email 2 is the real email. The others are phishes! Let’s take a look below…

Image 1 details: First of all, it’s not a good idea to send health checkup reports to the patient via e-mail. Second, it’s unencrypted! A legitimate healthcare provider will never do that from a HIPAA compliance standpoint. This is a phish.


Mayo Clinic Phishing Explained 1

Image 2 details: The email passes our link checks, format checks, and grammar checks. Nothing seems fishy. Still, it’s wise to be cautious when it comes to cybersecurity. Rather than click the link and to be extra safe, log in to “lockbin” separately using your browser.

 

Image 3 details: First, the date format is a non-U.S. one. Second, it’s an unencrypted attachment once again. That’s not allowed under HIPAA, and no professional healthcare provider would want to violate HIPAA. This one’s an attempted phishing attack, too!

Mass General Hospital Phishing Explained 3

Image 4 details: While the email gives very little away, the short bit.ly link doesn’t inspire confidence at all. This one is best avoided and is most likely a phish!

Healthcare Phishing Explained 4

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Biggest Cybersecurity Trends

The Biggest Cybersecurity Trends to Watch in 2023

As we begin a new year, here’s a look at some of the top security trends that are emerging now and could pick up pace in 2023 …
Cybersecurity Threats of 2022

The Biggest Cybersecurity Threats of 2022

Here’s a look at the biggest cybersecurity threats from 2022, and what organizations should pay close attention to in the coming year …
soc 2 auditor

Top 10 Tips for Choosing a SOC 2 Auditor

Choosing a SOC 2 auditor can seem like a complicated process, but keep in mind that the most important factor is picking someone who will be a valuable partner …