Paubox blog: HIPAA compliant email - easy setup, no portals or passcodes

The impact of social engineering tactics on healthcare

Written by Gugu Ntsele | September 11, 2025

Unlike traditional cyberattacks that exploit technical vulnerabilities, social engineering manipulates human psychology to breach security defenses. As noted by Naiya Patel in Social Engineering as an Evolutionary Threat to Information Security in Healthcare Organizations, "It is a well-planned strategy to exploit the 'trust' factor amongst human beings." These attacks leverage psychological manipulation techniques—such as authority, urgency, fear, and trust—to trick healthcare workers into divulging sensitive information, providing unauthorized access, or performing actions that compromise organizational security.

According to the Joint Cybersecurity Advisory, "Healthcare organizations are attractive targets for threat actors due to their size, technological dependence, access to personal health information" and the unique impacts from patient care disruptions. This vulnerability is further emphasized by Kathleen Ann Mullin, CISO at Healthmap Solutions, who noted in her HIMSS21 presentation that "All healthcare organizations are target-rich environments for the value of their health, payment and insurance information, as well as for their methods of treatment and research information.”

According to Obi Marizu's analysis of vulnerabilities in US healthcare, healthcare organizations are especially susceptible because of "their reliance on digital systems and the critical nature of the data it handles.” The scale of this vulnerability is compounded by recent data from the Paubox report on rural healthcare cyber attacks vulnerabilities, showing that 60% of healthcare IT leaders report their organizations had at least one email-related security incident in the past year.

 

Impact on patient safety and clinical operations

Social engineering attacks pose direct and immediate threats to patient safety, the cornerstone of healthcare delivery. When attackers successfully compromise healthcare systems through human manipulation, they can disrupt medical equipment, alter patient records, or shut down entire networks that support life-saving operations.

Recent investigations reveal sophisticated attack methods where "threat actor called an organization's IT Help Desk posing as an employee of the organization, and triggered a password reset" for targeted accounts. Even more concerning, the Joint Cybersecurity Advisory documents instances where "by manipulating the IT Help Desk employees, the threat actor was able to bypass multifactor authentication (MFA)," demonstrating how social engineering can circumvent even advanced security measures.

Ransomware attacks, frequently initiated through social engineering tactics, have forced hospitals to divert ambulances, postpone surgeries, and cancel medical procedures. During these incidents, healthcare providers must revert to manual, paper-based systems that increase the risk of medical errors, medication mistakes, and communication breakdowns between care teams. The transition from digital to analog operations creates dangerous gaps in patient monitoring and care coordination.

 

Financial and economic consequences

The financial impact of social engineering attacks on healthcare organizations is both immediate and long-lasting, often reaching into millions of dollars per incident. Healthcare organizations face severe financial consequences, as noted by HC3 presentation on the Impact of Social Engineering on Healthcare, with healthcare breach costs of "$9.23" million in 2021 rising to "$10.10" million in 2022, making it the costliest industry for data breaches globally. According to the HC3 presentation, "the United States = $9.44 million" represents the highest average breach cost by country.

The burden is disproportionately heavy on rural providers, where 50% of rural respondents cite budget limitations as a top barrier to adopting HIPAA compliant email security, as noted in the Paubox report. The report further states that, 73% of rural leaders admit they struggle to maintain HIPAA compliance due to a lack of staff and funding.

The Joint Cybersecurity Advisory reveals a financial threat, documenting cases where "threat actors were able to amend forms to make ACH changes to patients' accounts which enabled the diversion of legitimate payments" to accounts controlled by attackers. This type of financial manipulation represents a direct theft of healthcare resources intended for patient care.

Direct costs include system restoration expenses, forensic investigations, legal fees, and regulatory fines imposed by bodies such as the Department of Health and Human Services for HIPAA violations. Healthcare organizations face business interruption costs when social engineering attacks force system shutdowns. Lost revenue from cancelled procedures, extended patient stays due to delayed discharges, and the need to divert patients to other facilities create economic strain.

As Mullin emphasized in her HIMSS21 presentation, organizations face difficult decisions regarding ransom payments: "Payments of ransomware help fund future, more advanced ransomware attacks and may be paid to terrorist organizations. The payment of ransomware does not guarantee that the encryption key will be provided or that data will not be published.”

Long-term financial impacts include increased cyber insurance premiums, costs associated with patient credit monitoring services, potential class-action lawsuits, and the substantial investment required to upgrade security infrastructure following an attack. These expenses often strain already tight healthcare budgets, potentially reducing resources available for patient care and medical equipment.

 

Data privacy and confidentiality breaches

Healthcare organizations maintain sensitive personal information, making them prime targets for social engineering attacks aimed at data theft. According to Patel, "The hospital data system includes administrative data, as well as employees' personal information hacked, which can cause identity theft." Threats are constantly changing, with the HC3 presentation noting that "the use of 'hybrid vishing' has increased by 625%" compared to previous periods, indicating that attackers are becoming more sophisticated in their approaches.

The infrastructure challenges facing many healthcare organizations, particularly rural providers, makes these risks more. The Paubox report shows that 85% of rural healthcare organizations report that their current infrastructure can't support advanced email security, leaving them vulnerable to communication-based attacks.

Protected health information (PHI) includes not only medical records but also financial information, social security numbers, and other personally identifiable information that can be valuable on black markets. When social engineers successfully breach healthcare systems, they often gain access to patient profiles that can be used for identity theft, insurance fraud, and other criminal activities. The intimate nature of medical information makes these breaches violating for patients, who may experience lasting psychological trauma from knowing their most private health details have been exposed.

The reputational damage from data breaches can persist for years, affecting patient enrollment, physician recruitment, and community trust. Healthcare organizations may lose competitive advantages and face ongoing scrutiny from regulators, patients, and business partners.

 

Operational and administrative disruption

Social engineering attacks create operational chaos that extends beyond the initial security incident. Administrative functions become hampered when email systems, electronic health records, and communication networks are compromised or shut down for security reasons.

Staff productivity decreases as healthcare workers must adapt to manual processes they may not have used for years. Simple tasks like scheduling appointments, processing insurance claims, and coordinating patient transfers become time-consuming manual procedures that require additional personnel and create opportunities for errors.

The administrative burden of responding to social engineering attacks diverts resources from patient care. Information technology staff, administrators, and clinical leaders must dedicate time to incident response, system restoration, and regulatory reporting requirements. This resource diversion can persist for months following an initial attack.

 

Regulatory and legal ramifications

Social engineering attacks that result in healthcare data breaches trigger regulatory and legal consequences that can persist for years. Healthcare organizations must navigate multiple regulatory frameworks, including HIPAA, state privacy laws, and emerging cybersecurity regulations specific to the healthcare sector.

Breach notification requirements mandate that organizations notify patients, regulatory bodies, and sometimes the media within specific timeframes. These notifications often generate negative publicity and may trigger investigations by state attorneys general, the Department of Health and Human Services, and other regulatory bodies.

Legal liability extends beyond regulatory fines to include potential civil litigation from affected patients. Class-action lawsuits following healthcare data breaches have resulted in multi-million-dollar settlements, even when organizations believed they had reasonable security measures in place

For example, the Ambry Genetics case shows the costly regulatory and legal ramifications healthcare organizations face following a data breach. After a 2020 incident where hackers accessed an employee’s email account containing sensitive patient information, Ambry faced multiple class action lawsuits that alleged failure to meet HIPAA’s breach notification requirements and inadequate cybersecurity safeguards. The company ultimately reached a $12.25 million settlement, including funds for credit monitoring, identity theft protection, and reimbursement of out-of-pocket costs for affected individuals. 

Contractual obligations with business associates, insurance companies, and other partners may be violated when social engineering attacks compromise shared systems or data. These breaches can result in contract terminations, financial penalties, and damaged business relationships that are essential for healthcare operations.

 

Long-term impact on healthcare delivery

Patients may become reluctant to share complete medical histories, discuss sensitive health conditions, or seek preventive care when they fear their information could be compromised. This reluctance can lead to delayed diagnoses, incomplete treatment, and poorer health outcomes across entire patient populations.

Healthcare organizations may become overly cautious in their adoption of new technologies that could improve patient care, fearing additional security vulnerabilities. This technological hesitation can slow innovation and prevent healthcare organizations from realizing the full benefits of digital health solutions.

The effect of multiple social engineering attacks across the healthcare sector contributes to rising healthcare costs as organizations invest heavily in cybersecurity infrastructure, insurance, and compliance programs. These costs are ultimately passed on to patients and healthcare systems, contributing to the overall burden of healthcare expenses.

Staff morale and retention may suffer as healthcare workers become frustrated with additional security protocols, system downtime, and the stress of working in environments where they must balance patient care responsibilities with cybersecurity awareness. This can contribute to the ongoing healthcare workforce shortage and reduce the quality of patient care.

 

Prevention and mitigation strategies

Research indicates that certain populations may be more vulnerable to social engineering attacks. According to Patel, "It is observed that females reflecting neurotic behaviour traits are more vulnerable to responding to phishing emails or visiting unsecure websites over other females and males." Understanding these vulnerabilities is crucial for developing targeted training programs.

However, the most effective defense against social engineering attacks is education and awareness training. As Mullin emphasized in her HIMSS21 presentation, "All employees in health systems need to understand the common methods used by social engineers. The best way to detect social engineering is to learn how to recognize the methods and tactics and then train everyone in their organization."

According to Patel, "Educating vulnerable population in healthcare organizations or any settings about it is the most effective way to mitigate such attacks." Marizu's research reinforces this point, stating that "since the majority of social engineering attacks exploit human vulnerabilities, ensuring that healthcare staff are well-trained in identifying suspicious behavior is crucial."

Healthcare organizations must invest in regular training programs that help employees recognize and respond appropriately to social engineering attempts. Marizu emphasizes that training programs should incorporate "phishing simulations" and go beyond simple awareness sessions, as "organizations that incorporate phishing simulations into their training programs experience significant reductions in the number of successful phishing attacks."

 

The role of usability in security

An insight from the Paubox report highlights the importance of security tools that work with existing workflows. As Rick Kuwahara, Chief Compliance Officer at Paubox, explains, "We can't expect rural hospitals to meet the same compliance standards as large systems without giving them tools that fit their size and structure. In cybersecurity, usability is security".

This principle applies across all healthcare settings. When security tools are difficult to use or create workflow friction, staff may bypass them entirely, inadvertently creating security vulnerabilities. The report shows that 74% of rural healthcare leaders are dissatisfied with their current email security features, often due to usability issues.

 

Detection and reporting

A component of any defense strategy is establishing detection and reporting mechanisms. As Mullin noted in her HIMSS21 presentation, "The most important way that CISOs and CIOs are made aware of attacks is by employee reporting.” This shows the value of creating a culture where employees feel empowered to report suspicious activities without fear of blame or retribution.

 

Organizational preparedness

Healthcare leaders must prepare their organizations for the inevitability of social engineering attempts. Mullin's advice to healthcare boards is that "Boards should understand that it is a matter of when, not if, they will have an incident.” This perspective shift from prevention-only to preparation and response is crucial for organizational resilience.

The most comprehensive approach, as outlined in the HIMSS21 presentation, involves "Implementation of preventive, detective and corrective controls aligned with the enterprise risk assessment is the only way any health system can prepare.”

Prevention strategies should include both technical safeguards and human-centered approaches that address the psychological aspects of these attacks while maintaining the collaborative and helpful nature that is essential to healthcare delivery.

 

FAQs

How do social engineering attacks in healthcare differ from those in other industries?

They are more dangerous because they can disrupt patient care and put lives at risk in addition to causing financial loss.

 

Why are healthcare employees especially vulnerable to social engineering?

The culture of trust, urgency in patient care, and reliance on rapid communication make them more likely to comply with deceptive requests.

 

Can social engineering attacks target patients directly?

Yes, attackers sometimes impersonate providers or insurers to trick patients into revealing personal or financial information.