Experts Continue to Warn About Recognizing and Reporting Phishing

October 6, 2022 Thomas Graham

October is Cybersecurity Awareness Month

The National Cyber Security Alliance and the Cybersecurity and Infrastructure Security Agency invite you to celebrate Cybersecurity Awareness Month 2022 this October as we raise awareness about the importance of cybersecurity and ensure that all individuals and organizations have the information and tools they need to be safer and more secure online. “Do Your Part. #BeCyberSmart.”

Cybersecurity Awareness Month was created by the Department of Homeland Security and the National Cyber Security Alliance in October of 2004. It was launched in an effort to help Americans to be safe in the rapidly growing Internet. Since its inception, the month has only grown more important as our lives become increasingly digitized. We are only one of many industry participants who are taking this month to educate our community on the importance of cybersecurity.

As always, follow our posts this month and hear what the healthcare security experts have to say. We start with recognizing and reporting phishing.



Thomas Graham, PhD, CISSP, MBA, Vice President and CISO, CynergisTek, a Clearwater company
Twitter: @cynergistek

One of the best ways to identify if something is a Phish or not is to ask yourself “Is this an unsolicited request?”. Another way to identify an email as Phish is by looking at the “From” address. If it is from a location other than what it pretends to be, such as pretending to be from Amazon but having a Gmail address, then this is probably a Phish. Additionally, by looking at the body of the email and seeing if there are any misspelled words or incorrect syntax utilized. Phish emails also can have redirectors included in any embedded links within the email. These can be identified by browsing over the link and seeing if they direct to an expected location, such as, or if they have something appended to the link, such as “”. If you encounter a Phish in your organizational environment, the best practice is to establish a centralized way to report it to internal IT or IS. From there, internal IT or IS should have procedures in place to limit the reoccurrence of the Phish and communicate to the organization if large Phishing campaigns are ongoing. This can be conducted in a variety of ways including organizational email notification, dedicated organizational IM Phish channels, Intranet notices, or a number of other ways depending on the culture of the organization.

Click here to read more insights.

About the Author

Thomas Graham

Dr. Thomas Graham serves as the CISO for CynergisTek, a top healthcare cybersecurity company based in Austin, TX. Prior to CynergisTek, he supported the Defense Health Agency in a variety of roles, where his team received a FedHealthIT award for innovation presented at the National Press Club in Washington, DC. He currently holds a PhD in Information Assurance and Security, and an MBA. Thomas has received CISSP and HCISPP designations, along with other industry-recognized certifications. Thomas also serves on the MIS advisory board for East Carolina University, was part of an IoT panel discussion at the 2016 National Cyber Conference in Birmingham, AL, and has recently presented at the 2019 ISC2 Security Congress and was part of another panel discussion at the 2019 QSC conference.

Follow on Twitter Follow on Linkedin More Content by Thomas Graham
Previous Article
Labs Must Audit Their Cybersecurity Measures
Labs Must Audit Their Cybersecurity Measures

Ben Denkers discusses why it's important for labs to ensure that their defenses are operating properly.

Next Article
VA Center's IT Legacy Flaws Common at Other Health Entities
VA Center's IT Legacy Flaws Common at Other Health Entities

A Texas clinic has the all-too-common problem of obsolete equipment leading to security vulnerabilities.