What are phishing’s telltale signs? Although phishing emails have become more sophisticated, some criminals still make spelling and grammar mistakes. More subtle clues are URLs with spelling errors or the wrong domain — .com versus .org, for example. Here's a handy guide to phishing vocabulary, and ways that stolen data can be used.
Phishing: An electronic communication from what looks like a trustworthy source that seeks to obtain victims’ sensitive information — computer username and password, or credit card, Social Security or bank account numbers — for malicious intent.
Spear phishing: Phishing targeted at specific individuals. Attackers first gather intelligence about the target to make the deception more believable and increase the likelihood of success. The criminal might connect with the victim on social media to glean information and foster trust.
Whaling: Spear phishing targeting a high-profile person, such as a hospital executive.
Social engineering: A non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.
Nation-state actors: Targeted intrusions into your specific computer network by an organized group of hackers to collect information from any organization with valuable data, like hospital medical records.
Hacktivists: Computer hackers who join groups like Anonymous in order to demonstrate their dissatisfaction with powerful organizations such as corporations and governments that fail to share their views.
Spam Filters: These filters prevent unsolicited emails from clogging your inbox with these downloads. Spammers are often attempting to steal personal data by sending spoofed spam emails which mimic legitimate companies’ domain names.
Firewalls: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Malware: An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware and other malicious programs. It can take the form of executable code, scripts, active content and other software.
There are also different ways for cyber criminals to use data
Medical record theft: Cyber criminals steal patients’ health records to sell them on the black market.
Medical identify theft: Criminals use patients’ stolen health record information to gain personal access to medical treatment, to acquire prescription drugs for personal use or sale, or to make false claims against patients’ insurers.
Identity theft: Criminals sell or personally use employees’ or patients’ credit cards, bank or Social Security numbers to open and max out credit cards, clean out bank accounts and commit tax fraud.
Industrial espionage: Criminals steal a hospital’s intellectual property in areas such as medical technology innovation, clinical research and business practices.