Human Error: How Your Own Staff Puts Your Practice at Risk

Mar 18, 2021

You worked hard to build your practice from the ground up. That’s why you take cybersecurity very seriously. You’re probably working with a cloud hosting service provider to put your confidential data in secure storage.


As your practice grows, the odds of a security threat increases as well. Some of these threats don’t necessarily come from the outside. Your staff, no matter how well-meaning and hardworking, can make mistakes from time to time. 


One of those mistakes can lead to a phishing scam, ransomware attack, or data breach. Even if they don’t necessarily intend to cause harm, these fatal errors can still happen.


According to an IBM study , 95% of breaches are caused by human error!

PREVENT DATA BREACHES NOW

Healthcare: A Cybercrime Hotspot

You want to focus on your practice but you don’t want to let your guard down when it comes to IT security.


With over 100 million records breached, the healthcare sector is the top-most target of cyberattacks at one point, according to the 
IBM X-Force Cyber Security Intelligence Index


Since then, healthcare providers have tightened the IT security of their practices. However, the healthcare industry has always been 
one of cybercriminals’ favorite targets, not even sparing small clinics and hospitals from their attacks. 


With the coronavirus crisis, 2020 was one of the most challenging years for the healthcare sector. Cybercriminals taking advantage of the 
COVID-19 pandemic are only making things worse.


How can your own staff put your practice at risk?


Here are ways your employees can (deliberately or accidentally) put your entire practice at risk and ways on how to prevent them:


Scenario 1: A scammer steals the credentials of one of your employees.

Credential harvesting (also known as password harvesting) happens where your employee unwittingly provides his or her credentials through a bogus site.


How could that happen? Here’s an example:

John receives an email saying there’s a problem with his G Suite account. The email directs John to a seemingly legitimate “G Suite” website that asks for his credentials for verification. John eagerly complies so he can sort the problem immediately.


Just like that, the scammer now has John’s credentials, and freely uses the account to send another set of emails to his entire organization to steal more credentials and other data that the scammer can get his hand on. That’s credential harvesting in action.


How to prevent credential harvesting:

Beef up your email security! Your IT staff should be able to assess the risk and create preventive measures to protect your company against this threat.


Ask your IT staff to do the following:

  • Implement multi-factor authentication (MFA).
  • Install an email security gateway.
  • While you’re at it, you can also get G Suite Business plans with discounts from a certified G Suite reseller like ER Tech Pros.
HAVE ALL OF THESE IN ONE GO


Scenario 2: An employee forwards sensitive data to the wrong person

Whether it's a text, chat, or email, we've all made the mistake of sending a message to the wrong person.


However, this can cause irreparable damages when this happens in organizations handling sensitive information like clinics and hospitals.


How could that happen? Here’s an example:

Mary, a nurse working at Brookmaine hospital for over 5 years, is on the final hour of her long and stressful shift. 


She intends to send an email containing sensitive medical information of 100 patients to her supervising doctor. Due to exhaustion and lack of sleep, Mary unfortunately sent the email to an email group that consists of other health practitioners instead of sending it to the doctor. 


Mary notices this mistake the next day when the doctor asks her about the report. She sent another email to the recipients telling them to simply delete the email.


How to prevent sending an email to the wrong recipient:

Ideally, using an EHR integrated with collaboration tools can also help healthcare providers avoid this error.


If you’re already accustomed to using email as the main mode of correspondence, ask your IT staff to deploy an advanced email remediation tool. Already using Gmail? You’re in luck. Through your Admin Console, you can find and delete emails that shouldn’t have been sent.


While we can’t totally eliminate these instances from happening, costly mistakes can be significantly reduced with the help of this tool. You can work with your IT staff to remove malicious or undesirable emails from the inboxes of your members. 


When needed, you can also have the capabilities of monitoring emails coming and going to your organization. If that sounds like a lot of work even for your in-house IT personnel, consider partnering with a managed IT services provider (MSP) like ER Tech Pros that has IT experts ready to help you 24/7.


Most importantly, encourage your employees to practice good cyber-etiquettes and require them to attend cybersecurity awareness training, which can also be done by your IT personnel if they’re capable of doing so.

Scenario 3: A disgruntled employee blasts a profanity-laden email

We’ve already talked about scenarios with employees not intending to cause harm. But what about those (soon-to-be ex-) employees who hold grudges and want to take you down with them?


How could that happen? Here’s an example:

Due to the prolonged lockdown and tanking economy, Rudy was one of the unlucky employees who lost his job in his company. Understandably, Rudy was sad and disappointed. What rubbed salt to Rudy’s wound was finding out that some of his colleagues whom he thought were not as hardworking as him were able to keep their jobs.


Rudy was furious. He sat down at his workstation for the last time and typed an email not only cursing the company he used to love, but also exposed some of its not-so-ideal way of conducting business, it’s future plans, and other confidential information. 


Without hesitation, he sends the email blast to the entire organization, its clientele, and business partners.


How to prevent profane language in emails?

Email providers like Gmail have settings that can detect and block certain words which can help you prevent obscenities and harmful exchanges in your organizations’ email communication. However, this configuration is something that you need to tinker on manually. If you don’t have the time to undergo this kind of hassle, simply coordinate with your IT staff.


If you really want to save time (and money!) in the long run and still give a huge boost to your email security, MSPs can cover this for you with advanced email monitoring tools handled by their IT experts.


How your staff can improve when it comes to cybersecurity

Your employees are your biggest asset. You probably even treat them as family. 


Your asset can easily become your biggest liability if they aren’t capable of dealing with cybersecurity in your office—this could also include your in-house IT personnel, unfortunately.


What you can do:

  • Place posters, bulletin board updates, and regular email blasts reminding them about cybersecurity best practices.
  • Conduct cybersecurity awareness training. This should not be a one-time thing. This should happen regularly with exams and certification.
  • If you need reinforcement or want to totally change your IT strategy, partner with a reliable MSP who can handle all of your IT concerns for you.


Before You Go: Special Offer for Our Cloud Clients

Now more than ever, your job as a healthcare provider should be your top priority.


We at ER Tech Pros provide quality IT services to our colleagues in the 
healthcare community.

 

We’re offering special rates to existing cloud clients! Sign up with ER Tech's IT services for as low as $40/desktop/month*!

  • 24/7 Remote IT Support
  • IT and Network Maintenance
  • Account Management

We want you to experience excellent quality IT support...for free! So we’re offering a free trial—no strings attached. 


* Limited-time promo rate for MG Hosting/cloud clients who sign up for the three-year contract

BOOK A CALL NOW

Search Articles

By DrCatalyst Marketing 11 May, 2022
There are severe retributions when breaching HIPAA regulations, from hefty civil fines to criminal penalties. Get to know the legal implications of HIPAA violations.
How to Improve Your Patient LTV with Cloud-Based Phone Systems
By DrCatalyst Marketing 06 May, 2022
Achieving a high lifetime value is an important goal for any business. Read this article to learn how to increase your patients' LTV with ease.
The Fastest Way to Find Out if Your Email or Social Media Account Is Hacked
By DrCatalyst Marketing 29 Apr, 2022
Have you noticed a sudden change in your email or social media account? Check now to find out if it's been hacked.
7 Proven Advantages of Having a Managed Cloud Service Provider For Your Medical Practice
By DrCatalyst Marketing 21 Apr, 2022
Getting your clinic staff to focus on patients rather than your IT is just one of the benefits of managed cloud services. Read on to discover more benefits.
Uncommon Email Attacks to Watch Out For and How To Prevent Them
By DrCatalyst Marketing 14 Apr, 2022
Email is the most used form of communication in healthcare, but it’s also the main point of attack for hackers. Here are some surprising ways in which your emails can be attacked.
Stress Awareness Month: Reduce Clinic Staff’s Stress with IT Outsourcing
By DrCatalyst Marketing 07 Apr, 2022
IT is a crucial part of any healthcare organization, but it can also be one of the most stressful. Learn how a managed service provider (MSP) can help reduce that stress.
How to Protect Your Medical Practice Against URL Phishing  or Fake Website Scam
By DrCatalyst Marketing 01 Apr, 2022
URL phishing is among the most common phishing scams, yet it can be easily prevented if you take precautions. Find out how you can protect your clinic against this threat.
Is Your Medical Practice’s IT Support Responsive?
By DrCatalyst Marketing 29 Mar, 2022
Are you able to get the IT support you need when you need it? If you’re not sure how to answer that question, your practice may be at risk.
Women in Tech: Contributions, Opportunities and Breakthroughs
By DrCatalyst Marketing 29 Mar, 2022
This March, we celebrate the women – careers, opportunities and breakthroughs in the tech industry
Tech as the Answer to Healthcare Labor Shortages
By DrCatalyst Marketing 25 Mar, 2022
Technology can help address the unprecedented labor shortages in the industry. Here’s how.
Show More

News & Resources

By DrCatalyst Marketing 11 May, 2022
There are severe retributions when breaching HIPAA regulations, from hefty civil fines to criminal penalties. Get to know the legal implications of HIPAA violations.
How to Improve Your Patient LTV with Cloud-Based Phone Systems
By DrCatalyst Marketing 06 May, 2022
Achieving a high lifetime value is an important goal for any business. Read this article to learn how to increase your patients' LTV with ease.
The Fastest Way to Find Out if Your Email or Social Media Account Is Hacked
By DrCatalyst Marketing 29 Apr, 2022
Have you noticed a sudden change in your email or social media account? Check now to find out if it's been hacked.
More Posts
Share by: