In January of 2019, Managed Health Services (MHS) of Indiana Health Plan had to announce to approximately 31,000 patients that their personal data had potentially been a part of a data breach. However, MHS didn’t suffer this data breach. One of MHS’s business associates, LCP Transportation, was the victim. The hack was a result of LCP Transportation’s employees responding to phishing emails, which gave a hacker remote access to patient records.
Today, the most common cause of healthcare data breaches are phishing attacks, with rates of attacks increasing significantly since 2021 and doubling since 2020.
Experts have stated that phishing attacks are often successful as a result of the human factor in an organization. To properly address the threat of phishing and protect your healthcare organization, you should ensure that you have proper regulations and training in place to train your employees to be aware of phishing attacks.
But, what about your vendors? Managed Health Services of Indiana Health Plan was the victim of a third-party data breach because their business associate, LCP Transportation, experienced a successful phishing attack. So, it’s not just your own organization’s staff that needs to have a certain level of phishing training and awareness; it’s that of your vendors too.
When performing a vendor risk assessment on a business associate or other third party, part of that risk assessment should include a thorough review of the vendor’s Security Training and Awareness policy and procedures. During due diligence, review these policies in detail for phishing training that covers all types of phishing techniques - today, there are many.
Phishing attacks range from email to voice to SMS texting and can target a general group of people as well as specific individuals. Be sure to review if your vendor’s phishing training is performed on a periodic basis as part of an employee’s or staffer’s ongoing security training and awareness.
Answers to these questions should be found in the Security Training and Awareness Policy and Procedures of the business associate or vendor.
A third party’s Security Training and Awareness Policy and Procedures should always be thoroughly scrutinized when conducting a third-party risk assessment. Special attention should be given to how a vendor’s employees and staff are continuously educated and tested to recognize phishing attacks. The standards and procedures a business associate or other third party uses for their own phishing training and awareness directly translates into just how secure your protected health information (PHI) is in that vendor’s environment if the adversary decides to go phishing for the human factor.