Facebook Fallout Becoming a Social Media Menace

Many healthcare professionals have unwittingly placed their facilities at risk for ransomware attacks.

Many of us watched Mark Zuckerberg testify before Congress last week, in the wake of the news that Facebook had released the data of 87 million users to a company named Cambridge Analytica, which in turn sold the data to political campaigns. 

Let’s briefly talk about what happened at Facebook. A researcher named Aleksandr Kogan developed a Facebook application, or “app.” It was one of those “take a quiz” apps, on the surface. Unfortunately, if you took the quiz, your Facebook information was sent to the app creator. No big foul yet. 

Now, this was a special app. It then pulled the information of all your friends and contacts on Facebook, without their permission. Here is how we get to 87 million users. The app then went on to gather data of the contacts of your contacts – the way a virus spreads.   

Facebook and government bodies are still figuring out how much information was gathered. Cambridge Analytica has confirmed it also harvested some private messages. Facebook told them to delete the data once they found out what happened. The folks at Cambridge Analytica said they did, then continued selling the data to political campaigns. 

Mr. Kogan, who began working for Cambridge Analytica after creating the app, insists that the app was modified to collect only user names, birth dates, and pages users liked. We only have the assurances of Mr. Kogan and Cambridge Analytica on what data they have, and we already know they have been less than forthcoming.

Why is this such a big concern for healthcare? If I know enough about you, I can breach your system accounts. If I know where you work, I can find out what systems are used by your healthcare company. I can get your company email address. If I just know where you work and your name, I can use it to send emails with hacking tools to you and your coworkers that look like they are coming from you. 

Let’s assume that we trust Cambridge Analytica, and someone knows your name, birth date, and the Facebook pages you liked. Lots of people like their employers’ Facebook pages. Now I have your name, employer’s name, and your birth date. I can Google your company domain by Googling your company.  Knowing your name and company domain, I can figure out your email address. 

With just this much, I can start sending emails to you and your fellow employees. I can include special programs that allow me to take over computers in your company to access information – or maybe just lock the computers and demand payments to unlock them. If I can get control of your computer, maybe I can also log in to software with patient information that I can sell to identity thieves. 

What can be done? First, a dose of reality: social media is here to stay. Platforms like Facebook are free to users, and Facebook makes huge profits from advertisements. Facebook users are the product. Facebook can’t allow users to block themselves off completely from advertisers – or potential hackers that want to use social media to break into systems. 

Here are some common-sense things that can be done, keeping all this in mind.

First, you can start by being wary of emails that seem odd, like Dunn & Bradstreet suddenly needing a response to an impending issue when you never deal with this kind of information. Without opening such emails, notify your IT department. If you open an email that seems odd, immediately call IT. 

Next, be careful what you share about your company on social media. You may think you know the members of a group of fellow employees on Facebook. You may not know them as well as you think. Consider staying away from these groups, or clearing memberships with your IT department.  Review your company’s social media rules and comply with them.

Follow Mark Zuckerberg’s advice and review the privacy agreements and settings for your social media applications. If you are not comfortable with the privacy rules of a social media company, maybe you don’t need to use their apps. If you are comfortable, ask yourself: what privacy settings do you want to use for your account?

Never use personal information to make up company passwords. Change your passwords regularly, even if it is not required by your IT department.  Consider adopting the same rules for your passwords for personal use. 

When you walk away from your computer, lock it. You should also change your computer settings on your company computer to lock it after a period of inactivity. Even if someone can get access to your computer, they may not be able to unlock it without your computer login password. 

All of these rules are like buying an alarm for your house or a getting a guard dog. You can’t guarantee you will stop any thief, but you can get them to pick the easier house down the block.

 

Comment on this article

Facebook
Twitter
LinkedIn

Timothy Powell, CPA, CHCP

Timothy Powell is a nationally recognized expert on regulatory matters, including the False Claims Act, Zone Program Integrity Contractor (ZPIC) audits, and U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) compliance. He is a member of the RACmonitor editorial board and a national correspondent for Monitor Mondays.

Related Stories

Leave a Reply

Please log in to your account to comment on this article.

Featured Webcasts

The Cost of Ignoring Risk Adjustment: How HCCs Impact Revenue & Compliance

The Cost of Ignoring Risk Adjustment: How HCCs Impact Revenue & Compliance

Stop revenue leakage and boost hospital performance by mastering risk adjustment and HCCs. This essential webcast with expert Cheryl Ericson, RN, MS, CCDS, CDIP, will reveal how inaccurate patient acuity documentation leads to lost reimbursements through penalties from poor quality scores. Learn the critical differences between HCCs and traditional CCs/MCCs, adapt your CDI workflows, and ensure accurate payments in Medicare Advantage and value-based care models. Perfect for HIM leaders, coders, and CDI professionals.  Don’t miss this chance to protect your hospital’s revenue and reputation!

May 29, 2025
I050825

Mastering ICD-10-CM Coding for Diabetes and it’s Complications: Avoiding Denials & Ensuring Compliance

Struggling with ICD-10-CM coding for diabetes and complications? This expert-led webcast clarifies complex combination codes, documentation gaps, and sequencing rules to reduce denials and ensure compliance. Dr. Angela Comfort will provide actionable strategies to accurately link diabetes to complications, improve provider documentation, and optimize reimbursement—helping coders, CDI specialists, and HIM leaders minimize audit risks and strengthen revenue integrity. Don’t miss this chance to master diabetes coding with real-world case studies, key takeaways, and live Q&A!

May 8, 2025
2025 Coding Clinic Webcast Series

2025 ICD-10-CM/PCS Coding Clinic Update Webcast Series

Uncover critical guidance. HIM coding expert, Kay Piper, RHIA, CDIP, CCS, provides an interactive review on important information in each of the AHA’s 2025 ICD-10-CM/PCS Quarterly Coding Clinics in easy-to-access on-demand webcasts, available shortly after each official publication.

April 14, 2025

Trending News

Featured Webcasts

The Two-Midnight Rule: New Challenges, Proven Strategies

The Two-Midnight Rule: New Challenges, Proven Strategies

RACmonitor is proud to welcome back Dr. Ronald Hirsch, one of his most requested webcasts. In this highly anticipated session, Dr. Hirsch will break down the complex Two Midnight Rule Medicare regulations, translating them into clear, actionable guidance. He’ll walk you through the basics of the rule, offer expert interpretation, and apply the rule to real-world clinical scenarios—so you leave with greater clarity, confidence, and the tools to ensure compliance.

June 19, 2025
Open Door Forum Webcast Series

Open Door Forum Webcast Series

Bring your questions and join the conversation during this open forum series, live every Wednesday at 10 a.m. EST from June 11–July 30. Hosted by Chuck Buck, these fast-paced 30-minute sessions connect you directly with top healthcare experts tackling today’s most urgent compliance and policy issues.

June 11, 2025
Open Door Forum: The Changing Face of Addiction: Coding, Compliance & Care

Open Door Forum: The Changing Face of Addiction: Coding, Compliance & Care

Substance abuse is everywhere. It’s a complicated diagnosis with wide-ranging implications well beyond acute care. The face of addiction continues to change so it’s important to remember not just the addict but the spectrum of extended victims and the other social determinants and legal ramifications. Join John K. Hall, MD, JD, MBA, FCLM, FRCPC, for a critical Q&A on navigating substance abuse in 2025.  Register today and be a part of the conversation!

July 16, 2025

Trending News

Happy National Doctor’s Day! Learn how to get a complimentary webcast on ‘Decoding Social Admissions’ as a token of our heartfelt appreciation! Click here to learn more →

CYBER WEEK IS HERE! Don’t miss your chance to get 20% off now until Dec. 2 with code CYBER24