to cybercriminals . Kaleida Health discovered the attack on May 24 , 2017 , prompting a full investigation which involved hiring a third-party computer forensic firm . An analysis of its systems showed that by responding to the phishing email , the employee had provided accessAttack.Databreachto his/her email account . While accessAttack.Databreachto Kaleida Health ’ s EHR was not gainedAttack.Databreach, the email account contained a range of protected health information of a small subset of its patients . The types of data in the account varied for each patient , but may have included names , dates of birth , medical record numbers , diagnoses , treatment and other clinical data . However , no financial information or Social Security numbers were exposedAttack.Databreachat any time . While accessAttack.Databreachto the email account was possible , no evidence was uncovered to suggest that the emails were accessedAttack.Databreachor any protected health information was viewed or copiedAttack.Databreach. However , since the possibility of data access could not be ruled out with a high degree of certainty , all affected patients have been notified of the incident by mail . PhishingAttack.Phishinghas grown to be one of the most serious threats to healthcare organizations . As we have already seen this year , record numbers of successful W-2 phishing attacksAttack.Phishinghave been reported and many healthcare employees have fallen for these phishing scamsAttack.Phishing. Providing security awareness training to employees can help to reduce risk , although a single training session every year is no longer sufficient . Training must be an ongoing process .