
Among the plethora of emails that I receive on a daily basis, there seems to always be at least one sent from my hospital’s information services department. Usually, I receive alerts about system downtime or notifications about resolved tickets. They all have the same general look and feel, and so I hardly ever question that they are official. And then I come across a communication with the message similar to the one below. It certainly seems innocent enough, and what’s worse: believable.
Attention valued employee:
Information Services is deploying a new self-service tool to help users reset their own network passwords. Below are the steps you will need to get set up.
Step 1: Register by clicking the following link. Answer at least 5 of the 10 identification questions.
Step 2: If you forget your network password, you will be asked to answer 3 questions correctly in order to reset your password. You can begin this step here!
But in the end, this email turns out to just be spam, likely an attempt from an outside hacker to gain access to my hospital’s system. The hackers don’t necessarily care about my personal information nor are they looking to steal the identity of one sole doctor; they are looking to wreak havoc on an organization and potentially make a lot of money in the process.
Your patients are rating you online: How to respond. Manage your online reputation: A social media guide. Find out how.
No comments:
Post a Comment