Gone Phishing for Cybersecurity Awareness Month
“It only takes one,” said Scott Blough, CISSP, HM interim chief information security officer. “If one person lets their guard down, our systems and data are at greater risk. Cybercriminals are relentless in their efforts to breach our security systems. So, we all must be equally relentless in preventing access.”
Every year, our cybersecurity team prevents nearly 100 million online attacks. That’s close to 1.8 million attacks per week or three attacks every second! In the time it takes you to read this article, 900 HM cyberattacks will have been blocked.
Practice for the real thing
During October, an average of 16% of you reported one of our phishing drill messages. By comparison, in October 2022, only 11% reported it. While we’ve made progress, we need everyone catching and reporting these attacks. During this year’s drill, we caught more than 108,000 phish. At the same time, we got lured by 24,600 bad clicks of links and files. If those had been real cyberattacks, that’s 24,600 times our data could have been compromised.
Tips for catching a phish
Let’s take a closer look at three messages from our October phishing drill, to give you tips on how to spot a phish in the future.
Code of Conduct Violation
On Monday, Oct. 2, you received a message regarding a recent code of conduct violation.
Red Flags
- The external sender banner indicated the message was sent from outside of HM.
- Instead of coming from “@houstonmethodist.org,” the email address was from “@corp-int.”
- The email signature line was vague and didn’t include HM.
- The message included a questionable attachment, which you were strongly urged to open.
Results
- More than 7,700 (16%) reported this message as suspicious.
- 6,300 (13%) took the bait and opened the attachment.
- This is an unfortunate increase from our recent monthly average of 3-4% opens and clicks.
Parking Violation Notice
On Wednesday, Oct. 18, someone imitating Texas Medical Center security sent you a fake parking violation notice.
Red Flags
- An external sender banner should always raise your level of concern.
- The message came from a public account (@publicmailservice.com) instead of TMC.
- It included several links and a photo that was supposed to be your vehicle.
- The urgent nature required you to click a link.
Results
- Nearly 12,000 (24%) reported the message as suspicious, the most of all phishing messages this month.
- More than 7,900 (16%) recipients clicked at least one of the six links.
- Many contacted TMC Security directly which is a great way to determine its legitimacy. It’s always better to verify than to click the links or open the attachments.
Your Teammates are Trying to Reach You
On Monday, Oct. 9, you received an email from Microsoft Teams that your teammates were trying to reach you. The message attempted to bait you to click a link that would allow you to reply in Teams.
Red Flags
- The external sender banner signaled to be on alert.
- While this was sent from Microsoft Teams, the email address was from “maildeliverysystem.net.”
- There were several spelling, grammar and capitalization errors.
- The message included a confusing request with a vague deadline.
Results
- 4,800 (10%) reported this as suspicious.
- More than 2,500 (5%) clicked a link.
How to report a suspicious message
Identifying and avoiding a suspicious message is only part of the battle. It’s equally critical that you report potential phish to initiate automatic defenses that will confirm and remove legitimate attacks from all HM email. Reporting a suspicious email is quick and easy. To report a phish, from Outlook:
- Click the Report Phish – Phish Alarm button in your Outlook. On smaller screens, select the three dots in the upper-right corner to view the option.
- Click the Report Suspicious button on the External Sender banner (automatically visible for any messages coming from outside HM).
Thank you and continue to remain vigilant
To remain safe, it’s critical to stay alert for suspicious messages. Similar phishing drills will continue to ensure we’re all prepared, so we must remain vigilant. We all have a responsibility to protect our HM data, and we’re all in this together.