Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Iowa City hospital suffers phishing attack

By Maria Henriquez
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security
November 23, 2020

During a time where hospitals are already strapped for resources, Mercy Iowa City hospital reported that an internal email compromise and phishing email incident led to the exposure of personal information of some 60,473 individuals.

Mercy has no reason to believe that any personal information or protected health information has been misused for the purpose of committing fraud or identity theft, or that any personal information or protected health information was actually viewed by any unauthorized party, says a press release. 

An investigation revealed that breached information contained personal or protected health information for certain individuals, and depending on the affected individual, their name, date of birth, Social Security number, driver’s license number, medical treatment information, and medical insurance information.

Mohit Tiwari, Co-Founder and CEO at Symmetry Systems, notes that organizations cannot turn on a dime to perfectly harden their infrastructure, so it is understandable that breaches can happen. "What would really help in this incident is to share details beyond 'employees email was compromised and some phishing happened' -- if that was all, how did 60,000 people lose their information? Tracing the attack from emails to data stores where critical data resides -- both SSN/financial and medical records were compromised here! -- is critical. Organizations can respond to this incident by buying more 'email security' -- instead, organizations can often find simpler fixes that stop stray phishing incidents from escalating into large data-store breaches," Tiwari adds. 

Cybersecurity firm Mimecast recently examined how cybercrime affects hospitals, finding that: 

  • 90% of healthcare organizations experienced email-borne attacks in the past year
    • 25% suffering from very or extremely disruptive attacks
  • 72% experienced downtime as a result of an attack

Lisa Plaggemier, Chief Strategy Officer at MediaPro, explains, “Like the vast majority of incidents, this breach reportedly started with a phishing email that compromised an employee’s email account. The volume of phish hitting company email gateways is mindboggling.  No matter how good the filtering is, there will always be exceptions – phish will land in employee’s inboxes. Training and awareness is critical for employees to recognize and report phishing.  Unfortunately, for many organizations, training budgets have suffered.  Due to COVID-19, budgets planned for training were used purchase technology to enable everyone to work from home securely. Training employees to recognize phish is also not a “one and done”. The best training is short, targeted and ongoing.”

According to Jack Kudale, founder and CEO of Cowbell Cyber, “Organizations that process protected data face a long tail of expenses following a data breach. This can rapidly rise into hundreds of thousands, if not millions of dollars, and is why cyber insurance is becoming a must, not a nice to have.“

Matthew Gardiner, cybersecurity strategist, Mimecast, says, "The successful cyberattack against Mercy Iowa City hospital that led to this data breach is extremely common. Cybercriminals often focus on stealing login credentials at targeted organizations and then using that access to breach other organizations or people that would trust email coming from that organization. Giving cybercriminals more than a month’s access to an organization’s email system is a recipe for a breach of this magnitude. Fortunately, there are some pretty simple security controls that can be applied to make this sort of breach much less likely. These controls include multi-factor authentication to make giving away access much more difficult, phishing controls that inspect and filter inbound, outbound, and internal mail flow to prevent the attacker’s initial access and spreading, and security awareness training to help staff become more aware and cautious of these sorts of email and other types of attack."

KEYWORDS: cyber security healthcare security phishing attack risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Carle Foundation Hospital Suffers Data Breach Due to Phishing Attack

    See More
  • UK Hospitals Receive Funding for Cybersecurity

    Iowa's Virginia Gay Hospital Suffers Data Breach

    See More
  • Revised NIST Cyber Security Framework - Security Magazine

    SANS Institute suffers data breach due to phishing attack

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing