| Literature DB >> 30848810 |
William J Gordon1,2,3,4, Adam Wright2,3,4, Ranjit Aiyagari5, Leslie Corbo6, Robert J Glynn7, Jigar Kadakia3, Jack Kufahl8, Christina Mazzone3, James Noga3, Mark Parkulo9, Brad Sanford10, Paul Scheib11, Adam B Landman3,4,12.
Abstract
Importance: Cybersecurity is an increasingly important threat to health care delivery, and email phishing is a major attack vector against hospital employees. Objective: To describe the practice of phishing simulation and the extent to which health care employees are vulnerable to phishing simulations. Design, Setting, and Participants: Retrospective, multicenter quality improvement study of a convenience sample of 6 geographically dispersed US health care institutions that ran phishing simulations from August 1, 2011, through April 10, 2018. The specific institutions are anonymized herein for security and privacy concerns. Exposures: Simulated phishing emails received by employees at US health care institutions. Main Outcomes and Measures: Date of phishing campaign, campaign number, number of emails sent, number of emails clicked, and email content. Emails were classified into 3 categories (office related, personal, or information technology related).Entities:
Mesh:
Year: 2019 PMID: 30848810 PMCID: PMC6484661 DOI: 10.1001/jamanetworkopen.2019.0393
Source DB: PubMed Journal: JAMA Netw Open ISSN: 2574-3805
Email Category and Click Rates Among 95 Simulated Phishing Campaigns
| Email Category | Example Lures | No. (% Total) of Campaigns |
|---|---|---|
| Office related | You have received a new fax… | 37 (38.9) |
| You are expected to review this document on an annual basis… | ||
| Mandatory online workplace safety training… | ||
| Personal | Someone sent you a Halloween e-card… | 22 (23.2) |
| Your new credit card has been shipped… | ||
| We are pleased to announce that you are eligible to receive double rewards… | ||
| IT related | Your mailbox has exceeded the storage limit, which is 20 GB as set by your administrator… | 36 (37.9) |
| We are currently updating our database and email center. All unused accounts will be deleted… | ||
| If you are receiving this message, it means that your email address has been queued for deactivation… |
Abbreviation: IT, information technology.
Emails were placed into 1 of 3 categories based on expert review. Shown are example lures from each of the categories, highlighting the type of content that is used to solicit further engagement with the phishing email from employees. Also shown are the number of campaigns from our sample that fell into each category.
Figure 1. Study Design and Data Acquisition
Data collected for each campaign included year of campaign, institutional campaign number, emails sent, emails clicked, and email category.
Unadjusted Click Rates Among 95 Simulated Phishing Campaigns Across All Sites
| Variable | No. of Campaigns | Unadjusted Click Rate, Median (IQR), % |
|---|---|---|
| Reference | 95 | 16.7 (8.3-24.2) |
| Year (centered on 0) | ||
| 2011 | 12 | 23.5 (18.7-26.4) |
| 2012 | 4 | 22.0 (15.2-30.8) |
| 2013 | None | NA |
| 2014 | None | NA |
| 2015 | 18 | 19.1 (10.1-19.4) |
| 2016 | 21 | 18.4 (10.3-25.0) |
| 2017 | 33 | 9.9 (4.8-17.2) |
| 2018 | 7 | 10.2 (7.3-15.7) |
| Institutional campaign No. | ||
| 1-5 | 28 | 25.1 (13.8-31.1) |
| 6-10 | 19 | 17.9 (10.4-22.2) |
| >10 | 48 | 13.4 (6.3-18.8) |
| Institution | ||
| Site 1 (n = 19) | 19 | 10.2 (5.3-18.3) |
| Site 2 (n = 33) | 33 | 14.5 (8.0-22.6) |
| Site 3 (n = 3) | 3 | 7.4 (5.8-9.6) |
| Site 4 (n = 9) | 9 | 14.5 (8.3-21.0) |
| Site 5 (n = 26) | 26 | 19.0 (15.6-25.6) |
| Site 6 (n = 5) | 5 | 30.7 (25.2-34.4) |
| Email category | ||
| Office related | 37 | 12.2 (7.2-20.7) |
| Personal | 22 | 15.9 (6.8-24.5) |
| IT related | 36 | 18.6 (13.9-25.6) |
| Season | ||
| Fall | 24 | 18.5 (13.4-22.2) |
| Winter | 30 | 16.4 (9.7-21.9) |
| Spring | 18 | 14.0 (8.1-25.5) |
| Summer | 23 | 11.8 (5.7-28.1) |
Abbreviations: IQR, interquartile range; IT, information technology; NA, not applicable.
Figure 2. Boxplot of Campaign Click Rate Among 95 Simulated Phishing Campaigns, by Site
The click rate distribution is shown by site. Each site is an anonymized institution. Click rate is calculated as a proportion (total emails sent divided by total emails delivered) across each campaign. The whiskers indicate the minimum and maximum values for each institution. The lower and upper borders of the box represent the first and third quartiles, respectively, while the line in the box represents the median.
Logistic Regression Model (With the Use of Generalized Estimating Equations) for the Odds of Clicking on 95 Simulated Phishing Campaigns
| Variable | Model OR (95% CI) | |
|---|---|---|
| Reference | 0.279 (0.197-0.396) | <.001 |
| Year (centered on 0) | 0.965 (0.841-1.107) | .61 |
| Institutional campaign No. | ||
| 1-5 | 1 [Reference] | NA |
| 6-10 | 0.511 (0.382-0.685) | <.001 |
| >10 | 0.335 (0.282-0.398) | <.001 |
| Institution | ||
| Site 1 (n = 19) | 0.788 (0.651-0.954) | .02 |
| Site 2 (n = 33) | 1 [Reference] | NA |
| Site 3 (n = 3) | 0.302 (0.225-0.406) | <.001 |
| Site 4 (n = 9) | 0.557 (0.474-0.654) | <.001 |
| Site 5 (n = 26) | 0.584 (0.393-0.868) | .008 |
| Site 6 (n = 5) | 1.463 (1.299-1.648) | <.001 |
| Email category | ||
| Office related | 1.354 (0.865-2.120) | .19 |
| Personal | 1.505 (1.128-2.007) | .005 |
| IT related | 1 [Reference] | NA |
| Season | ||
| Fall | 1 [Reference] | NA |
| Winter | 1.175 (0.972-1.420) | .10 |
| Spring | 0.842 (0.735-0.964) | .01 |
| Summer | 0.751 (0.624-0.905) | .003 |
Abbreviations: IT, information technology; NA, not applicable; OR, odds ratio.