HIPAA Slam Method

Cybersecurity is at the top of mind for many businesses, especially during October’s Cybersecurity Awareness Month. The main cause for concern for healthcare organizations in particular is how to recognize phishing emails to prevent breaches. There is a simple method that healthcare organizations can use to aid in the identification of phishing emails, the SLAM method. 

What Does the SLAM Acronym Stand For?

The SLAM acronym can be used as a reminder of what to look for to identify possible phishing emails. The SLAM acronym stands for sender, links, attachments, message.

Sender

When hackers send phishing emails, they often mimic a trusted sender’s email address to trick recipients into opening the email. This is why it is important to analyze a sender’s email address before opening an unsolicited email. To check an email address for validity, recipients should hover their mouse over the sender name to reveal where the email came from prior to opening it. Email addresses should be checked carefully to look for misspellings in a trusted individual’s name or a company name. It is also important to note that an email coming from a company will usually have the company’s name in the domain address. For instance, an email coming from [email protected] is not a legitimate Microsoft email address. An email coming from Microsoft support would read [email protected].

Links

Phishing emails generally contain links that enable hackers to steal a recipient’s login credentials and infiltrate their network. Just like with the sender’s email address, links contained in an email should be hovered over to check the legitimacy of the link. Is the URL actually directing you to the page it says it will? Are there misspellings in the link address? It is also best practices to, rather than clicking on a link in the email itself, to go to the company website directly. For instance, many phishing emails wrongly state that your login credentials for a particular company were compromised, providing a reset link in the body of the email. However, by clicking on this link, you expose your login credentials to the hacker. Since most people use the same login credentials across multiple platforms, by stealing your credentials in one incident, it is likely that hackers will gain access to your other accounts. Whenever you receive an email that says that your login credentials were compromised, or that you need to reset your password, you should manually input the company’s website into your web browser. This way you can be certain that you are on a legitimate website, preventing your login credentials from being stolen.

Rated #1 on G2

“Compliancy Group makes a highly complex process easy to understand.”

Easiest To Do Business With 2024

Attachments

You should never open an email attachment from any sender that you do not know. However, even when you do know the sender, you should not open unsolicited email attachments. Hackers often send malicious email attachments using a compromised email address’ contact list to infiltrate the recipient’s system. It is unlikely that a business would send an email attachment without prompting. If you’d like to check the validity of an email attachment, you should reach out to the sender directly to confirm that the attachment sent was legitimate.

Message

While phishing emails have become more sophisticated over the years, the content of the message itself can often be a dead giveaway. Phishing emails often contain generic greetings, misspellings, grammatical errors, or strange wording. Emails that contain any of these issues should not be trusted.

What to Do When You Recognize a Phishing Email

While you can use the SLAM method to help you identify phishing emails, it is also important to know what to do when you recognize one. 

  1. Mark the email as spam
  2. Report the phishing attempt to management so that they can alert other employees
  3. Report the email to your IT department or MSP so that they can blacklist the sender’s domain address
  4. Do not forward the email to anyone

How HIPAA Compliance Protects You Against Phishing

HIPAA compliance and cybersecurity go hand-in-hand. By becoming HIPAA compliant, your organization is ultimately more secure, protecting you from healthcare breaches and costly HIPAA fines. This is because HIPAA Security Rule requirements set a minimum standard for implementing safeguards to ensure the confidentiality, integrity, and availability of protected health information (PHI). 

HIPAA also requires organizations to train their employees to prevent unauthorized access or disclosure of PHI and to provide cybersecurity best practices. Other than the technology used to prevent phishing attacks, employee training is your best defense against breaches. This is because the majority of breaches occur through employee error, therefore, employees who are adequately trained are less likely to fall victim to a phishing attempt by being able to recognize them before they compromise their email account.

Modernize Your Compliance

Say goodbye to spreadsheets and hello to automated software!

Global CTAs Image