| Literature DB >> 35321019 |
Fabio Rizzoni1, Sabina Magalini2, Alessandra Casaroli3, Pasquale Mari2, Matt Dixon4, Lynne Coventry4.
Abstract
Background: Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations. There are many factors influencing the difficulty of detecting a phishing email including fatigue and the nature of the deceptive message. Method: A major Italian Hospital with over 6000 healthcare staff performed a phishing simulation as part of its annual training and risk assessment. Three campaigns were launched at approx. 4-month intervals, to compare staff reaction to a general phishing email and a customized one.Entities:
Keywords: Cybersecurity; technology; training
Year: 2022 PMID: 35321019 PMCID: PMC8935590 DOI: 10.1177/20552076221081716
Source DB: PubMed Journal: Digit Health ISSN: 2055-2076
Details of messages sent and responses in the first campaign.
| First campaign | Standard email | Custom email | ||
|---|---|---|---|---|
| Total emails sent | 2656 | 100% | 2657 | 100% |
| Received not opened | 1699 | 64% | 1012 | 38% |
| Received and opened | 957 | 36% | 1645 | 62% |
| Received, opened and link clicked | 176 | 7% of emails sent | 1447 | 55% of emails sent |
Details of messages sent and responses in the second campaign.
| Second campaign | Custom email | |
|---|---|---|
| Total emails sent (1600 went to junk mail) | 2700 | 100% |
| Received not opened | 452 | 42% of emails in inbox |
| Received and opened | 648 | 24% of emails sent |
| Received, opened, link clicked | 564 | 21% of emails sent |
Details of messages sent and responses in the third campaign.
| Total emails sent | 5198 | 100% |
| Received not opened | 2900 | 56% |
| Received and opened | 2298 | 44% |
| Received, opened and link clicked | 152 | 3% of emails sent |
Summary of responses across the three campaigns.
| Unopened emails | Opened emails | % of opened emails clicked | % of total emails clicked | |||||
|---|---|---|---|---|---|---|---|---|
| Campaign | Standard | Custom | Standard | Custom | Standard | Custom | Standard | Custom |
| First | 64% | 38% | 36% | 62% | 18% | 88% | 7% | 55% |
| Second | – | 42% | – | 59% | – | 87% | – | 21% |
| Third | 56% | – | 44% | – | 7% | – | 3% | – |
Roles and responsibilities to run a successful phishing simulation.
| Role | People to involve |
|---|---|
| Ordering simulation and undertaking risk assessment | General Director and Board |
| Implementation of technical aspects, ensure no security compromises | ICT Management or Chief Information Security Officer (CISO) |
| Ensure that staff have received appropriate awareness training about the need for phishing simulation, what is surveilled during a simulation, and how to detect a phish. | Training |
| Management of feedback from/to the users (start, issues arising during, final results and actions arising) | HelpDesk |
| Staff concerns and contract issues: Ensure that there is no breach of contract/laws or regulations and that the employment of staff is not put at risk. | Human Resources |
| Privacy: Ensure that individuals are not identifiable to the organization and that data of individuals is protected by the external company running the simulation. This will ensure no repercussions on individual staff. | Data Protection Office |
| Review the content of persuasive messages (rewards or sanctions), and what can be surveilled as part of the exercise (to maintain employee trust) | staff unions, and all relevant departments |