Why Healthcare Is a Prime Phishing Target
Is your healthcare organization one phishing email away from a data breach? The sobering answer, backed by data, is: possibly. Phishing remains the most common initial attack vector in healthcare cyber incidents, and it is getting more sophisticated by the year. According to Check Point Research, the healthcare sector experienced a 47% increase in cyberattacks in the first half of 2024 compared to the same period in 2023, with phishing consistently identified as the leading entry point. At the same time, the FBI’s Internet Crime Complaint Center (IC3) continues to rank healthcare among the top three most-targeted industries for business email compromise (BEC) and credential theft schemes.
Why Is Healthcare Such a Prime Phishing Target?
Healthcare organizations hold a uniquely valuable combination of assets: electronic protected health information (ePHI), financial data, and access to critical systems that cannot afford downtime. This makes them attractive to ransomware groups, nation-state actors, and opportunistic cybercriminals alike. The HHS 405(d) Health Industry Cybersecurity Practices (HICP) Main Document identifies phishing as the number one threat to healthcare organizations across all practice sizes, and for good reason. Clinical staff are busy, email volume is high, and urgency is a feature of the environment that attackers exploit deliberately. Several structural factors compound the risk:
- High staff turnover and large workforces: More users means a larger attack surface and inconsistent security awareness training.
- Legacy systems: Older EHR platforms and clinical devices are frequently unpatched and may lack modern email security controls.
- Time pressure: Clinicians and administrative staff operating under deadline pressure are statistically more likely to click without verifying.
- Third-party access: Vendors, billing services, and referral networks create complex email environments where unfamiliar sender addresses are normalized.
What Phishing Attacks Targeting Healthcare Employees Look Like
Phishing has evolved well beyond the obvious “Nigerian prince” email. Today’s attacks are targeted, contextually aware, and often indistinguishable from legitimate communications without careful inspection.
Business Email Compromise (BEC)
BEC is the most financially damaging form of phishing in healthcare. Attackers impersonate executives, billing departments, or vendors to redirect wire transfers or steal credentials. The FBI Cyber Division has repeatedly flagged healthcare BEC as a priority threat area, with losses in the sector running into the hundreds of millions annually.
Spear Phishing
Unlike bulk phishing, spear phishing uses open-source intelligence (OSINT) to craft emails specifically tailored to an individual. A threat actor might reference a physician’s specialty, a recent conference they attended, or a known colleague’s name. Proofpoint’s Healthcare Threat Report documents widespread use of spear phishing to compromise physician email accounts and pivot into broader network access.
Credential Harvesting via Fake Portals
Attackers send emails impersonating EHR vendors (Epic, Cerner, athenahealth), insurance payers, or government agencies (CMS, HHS) directing recipients to convincing login pages designed to capture usernames and passwords. These credentials are then used for direct ePHI access or sold on criminal marketplaces.
Smishing and Vishing
Phishing has expanded beyond email. SMS-based phishing (smishing) targeting clinical staff on mobile devices is rising sharply, as is voice phishing (vishing) where attackers call staff impersonating IT support or vendor representatives to extract credentials or grant remote access.
Ransomware Delivery via Phishing
The majority of healthcare ransomware incidents begin with a phishing email. Once an employee clicks a malicious attachment or link, attackers establish a foothold, move laterally, and deploy ransomware across networked systems, including those touching ePHI. CISA’s healthcare cybersecurity advisories have consistently identified phishing-delivered ransomware as the dominant threat pattern across hospitals, group practices, and ambulatory surgery centers.
What HIPAA Requires You to Do About Phishing
Phishing is not just an IT problem. It is a HIPAA Security Rule compliance problem. Several provisions of 45 CFR Part 164 directly implicate your organization’s phishing defenses.
Security Awareness Training (45 CFR § 164.308(a)(5))
The HIPAA Administrative Safeguards require covered entities to implement a security awareness and training program for all workforce members, including management. Specifically, the regulation includes “protection from malicious software” and “procedures for guarding against, detecting, and reporting malicious software” as addressable implementation specifications under this standard. In 2024 and 2025 Office for Civil Rights (OCR) enforcement actions, inadequate phishing awareness training has been cited as a contributing factor in breach findings.
Access Control and Authentication (45 CFR § 164.312(a)(1) and (d))
Because phishing is frequently used to steal credentials and gain unauthorized access to systems containing ePHI, strong access controls are your second line of defense after training. This includes unique user identification, multi-factor authentication (now effectively required per OCR guidance and the proposed 2025 HIPAA Security Rule update), and automatic session timeout.
Audit Controls (45 CFR § 164.312(b))
When phishing succeeds and credentials are compromised, your audit logging must be sufficient to detect the intrusion, establish a timeline, and scope the breach. Systems without active audit logging cannot satisfy this requirement and cannot support a meaningful breach investigation.
Workforce Sanctions (45 CFR § 164.308(a)(1)(ii)(C))
Your security management process must include sanctions against workforce members who fail to comply with security policies. This means your phishing defense program should include documented policies on what happens when employees click on simulated phishing tests or fail to report suspicious emails, and those policies must be consistently applied.
| Regulatory Checkpoint The proposed 2025 HIPAA Security Rule update (HHS NPRM, December 2024) would explicitly require anti-phishing technology controls and mandatory annual security awareness training for all workforce members. Practices aligned with current best practices will be well-positioned when these changes are finalized. |
Technical Controls: Building a Layered Phishing Defense
No single control stops phishing. An effective defense is layered, combining technical barriers, human awareness, and procedural safeguards. The following framework draws from CISA’s guidance, HICP, and the NIST Cybersecurity Framework.
1. Email Authentication Protocols
Implement the following DNS-based email authentication standards to prevent spoofing of your domain and block spoofed emails from reaching your staff:
- SPF (Sender Policy Framework): Authorizes which mail servers can send email on behalf of your domain.
- DKIM (DomainKeys Identified Mail): Adds a cryptographic signature to outbound messages to verify authenticity.
- DMARC (Domain-based Message Authentication): Instructs receiving mail servers what to do with messages that fail SPF or DKIM checks. CISA strongly recommends a DMARC policy of “p=reject” for all healthcare organizations.
CISA’s email security best practices guide provides step-by-step implementation guidance for all three protocols.
2. Secure Email Gateways and Anti-Phishing Filters
Cloud-based and on-premise secure email gateways (SEGs) filter inbound email for known malicious indicators, suspicious links, impersonation attempts, and malicious attachments before they reach user inboxes. Solutions like those evaluated in Proofpoint’s Threat Protection Platform use behavioral AI and threat intelligence to detect novel phishing campaigns that bypass signature-based filters.
3. Multi-Factor Authentication (MFA)
MFA is your most important technical safeguard against phishing-driven credential theft. Even if an attacker obtains a valid username and password via phishing, MFA blocks unauthorized access in most cases. Implement MFA on all systems that access ePHI, including your EHR, billing platform, email, and remote access points (VPN, RDP, cloud apps).
4. DNS Filtering and Web Content Controls
DNS filtering blocks access to known malicious domains at the network level, preventing phishing links from resolving even when clicked. CISA’s Protective DNS guidance provides implementation details for healthcare environments.
5. Endpoint Detection and Response (EDR)
When phishing delivers malware rather than just harvesting credentials, EDR solutions provide the detection and containment capabilities needed to stop lateral movement before ransomware deploys. The HICP Main Document lists endpoint protection as a high-priority mitigation across all healthcare organization size tiers.
6. Phishing Simulation and Awareness Training
Simulated phishing campaigns, where IT or a managed service provider sends safe but realistic phishing emails to staff, measure real-world susceptibility and create teachable moments without real consequences. Effective programs run simulations at least quarterly, provide immediate feedback when an employee clicks, and track improvement over time. Combine simulations with regular, role-appropriate security awareness training covering how to recognize and report suspicious emails.
Incident Response: What to Do When Phishing Succeeds
Even robust defenses will occasionally fail. Your incident response plan must address phishing-driven breaches specifically, including:
- Credential compromise: Immediate password reset, account lockout, session termination, and MFA re-enrollment for affected accounts.
- Malware delivery: Endpoint isolation, forensic preservation, and engagement of your incident response retainer or MSP.
- ePHI access review: Audit log analysis to determine whether ePHI was accessed, exfiltrated, or modified during the compromise window.
- Breach notification analysis: Determine whether a reportable breach occurred under 45 CFR § 164.402 and initiate notification procedures accordingly.
CISA’s Healthcare and Public Health Sector-specific guidance and the FBI’s Cyber Division both recommend that healthcare organizations pre-establish relationships with law enforcement and report phishing-related intrusions promptly, both to enable investigation and to contribute to sector-wide threat intelligence.
Common Gaps Found in Healthcare Phishing Defenses
When practices undergo formal HIPAA security risk analyses, the following phishing-related gaps appear most frequently:
- No MFA on email or EHR systems: Credentials stolen via phishing provide immediate, unchallenged access.
- Security awareness training done once at onboarding: Annual or more frequent training is required under HIPAA and recommended by HICP.
- No phishing simulation program: Organizations cannot measure susceptibility or demonstrate improvement without simulations.
- Missing DMARC, SPF, or DKIM configuration: Your domain can be freely spoofed, enabling attackers to impersonate your organization to patients and partners.
- No documented phishing reporting procedure: Staff who suspect phishing have no clear path to report it, delaying detection and response.
- BAAs that don’t address vendor email security: Third-party vendors with access to ePHI represent phishing risk vectors that your Business Associate Agreements should address.
How Phishing Defenses Map to Regulatory Frameworks
Healthcare phishing defenses should be built on recognized frameworks, both to satisfy HIPAA requirements and to ensure your program is defensible under scrutiny:
NIST Cybersecurity Framework (CSF 2.0)
The Protect and Detect functions of the NIST CSF directly map to phishing defenses: Awareness and Training (PR.AT), Identity Management and Access Control (PR.AA), and Anomalies and Events (DE.AE). The CSF provides a common language for communicating your phishing defense posture to leadership, auditors, and insurers.
HHS HICP (405(d))
The HICP Main Document identifies phishing mitigation as the top priority practice across all five healthcare cybersecurity threat areas. Its tiered implementation guides (Small, Medium, Large practice) provide specific, actionable recommendations scaled to your organization’s resources and complexity.
CIS Controls v8
CIS Control 14 (Security Awareness and Skills Training) and Control 9 (Email and Web Browser Protections) directly support phishing defense. For smaller practices, CIS Implementation Group 1 provides a minimum baseline of controls achievable without dedicated security staff.
Where to Go From Here
Phishing attacks targeting healthcare employees are not a future threat. They are the present operational reality for every organization that touches ePHI, from solo practitioners to large health systems. The gap between “we have some security training” and “we have a documented, tested, HIPAA-defensible phishing defense program” is where breaches happen and where OCR enforcement actions begin.
Building that documented, defensible program requires more than a checklist. It requires a completed security risk analysis that identifies phishing as a threat, risk ratings tied to the likelihood and impact of a successful attack, and written policies and procedures that map your controls to HIPAA requirements.
Medcurity’s HIPAA compliance platform is purpose-built to help healthcare practices complete their security risk analysis, identify gaps in their phishing defenses, and maintain the written documentation required under 45 CFR § 164.316, all in one place. Learn how Medcurity can help your practice.
Key Sources & References
CISA Healthcare Cybersecurity: Cybersecurity Best Practices for the Healthcare and Public Health Sector, including Protective DNS and Email Security guidance.
FBI Cyber Division / IC3: Internet Crime Complaint Center Annual Reports; Business Email Compromise and healthcare-specific threat advisories.
HHS 405(d) HICP Main Document: Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients.
Check Point Research: Healthcare Cyber Threat Landscape Reports, 2024.
Proofpoint Threat Reports: Healthcare Threat Intelligence and Email Security Research.
eCFR 45 CFR Part 164 Subpart C & A: HIPAA Security Rule Administrative and Technical Safeguards.
NIST Cybersecurity Framework 2.0 & NIST SP 800-53 Rev 5: Security and Privacy Controls for Information Systems.
CIS Controls v8: Center for Internet Security Implementation Groups.





Leave a Reply