Paubox Weekly Fully Automated - A HIPAA compliant email security Podcast
Fully Automated is your weekly rundown of the biggest healthcare cybersecurity stories, delivered in a conversational format by Alex and Jen, two AI hosts who break down breaches, vulnerabilities, and compliance news with clarity, a little dark humor, and always a practical takeaway. Perfect for healthcare IT leaders, administrators, and compliance officers who want to stay informed without wading through the noise.
Paubox Weekly Fully Automated - A HIPAA compliant email security Podcast
Paubox recognized as email encryption leader in G2 Spring 2026 Reports
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Welcome back to the show. I'm Alex.
SpeakerAnd I'm Jen. And this week's news is a lot.
Speaker 1It's always a lot.
SpeakerTrue. But this time it's the kind of a lot where you read the headlines and think, okay, so we've learned nothing.
Speaker 1Let's start with some good news actually. Pau box got recognized in the G2 Spring 2026 reports. Number one in 55 categories. 136 badges.
SpeakerThat's not a typo. 136 badges.
Speaker 1It's a good reminder that HIPAA compliant email isn't just a checkbox. It's infrastructure. And when you get it right, people notice.
SpeakerAlright, good news over. Let's talk about Google Cloud Storage being used for phishing.
Speaker 1Yeah, this one's clever. Attackers set up a bucket, host a redirect page, and bounce victims to the actual malicious site.
SpeakerIt's simple, and that's why it works. You see a Google URL, you trust it. Your filters trust it.
Speaker 1So what's the takeaway here?
SpeakerDon't assume a trusted domain means a trusted destination. Train your staff to look past the URL. And if your email security isn't inspecting redirects, you've got a blind spot.
Speaker 1Next up, Community Health Action of Staten Island. Ransomware hit a nonprofit serving vulnerable populations. Over 60,000 records exposed.
SpeakerIncluding HIV testing data, medical databases, financial records, the Genesis Ransomware Group took credit.
Speaker 1This is the part that keeps me up at night. These aren't big hospital systems with massive security budgets.
SpeakerNo, and attackers know that. Smaller orgs, community health centers, they're often underfunded and understaffed. But the data they hold is just as sensitive.
Speaker 1So what can organizations like this do?
SpeakerStart with the basics.
Speaker 1Let's talk about a win. Tycoon 2FA, that phishing as a service platform, got disrupted by Microsoft, Europol, and a bunch of security firms.
SpeakerPhishing as a service. It's exactly what it sounds like. Ready-made phishing kits, realistic login pages, infrastructure, all for sale.
Speaker 1Like a franchise for fraud.
SpeakerBasically. And Tycoon 2FA specifically helped attackers bypass multi-factor authentication, which is supposed to be our safety net.
Speaker 1So even MFA isn't bulletproof?
SpeakerNot against session hijacking. Not against adversary in the middle attacks. The takeaway? MFA is still essential, but it's not the finish line. You need phishing resistant methods, hardware keys, conditional access policies. And finally, striker.
Speaker 1This one's wild. Wild is one word for it. Reports say an Iran-linked attack wiped around 80,000 devices. And here's the thing: no malware.
SpeakerThey used Microsoft's own admin tools. Legitimate features weaponized. Mass wipe commands issued through the cloud environment.
Speaker 1So the attacker didn't break in with a crowbar. They used the keys already hanging on the hook.
SpeakerExactly. And that's the lesson. Your cloud environment is only as secure as your configurations. If admin privileges aren't locked down, if there's no monitoring on sensitive commands, you're one compromised credential away from disaster.
Speaker 1So when we step back and look at all of this: phishing through trusted cloud services, ransomware hitting community health orgs, NFA bypass kits, admin tools turned against you.
SpeakerThe theme isn't bad luck. It's bad configurations, blind spots, gaps that are fixable if you know where to look. And most of this is preventable. That's the frustrating part. And the hopeful part, honestly. Alright, that's the show. Thanks for listening. Stay patched, stay paranoid. See you next week.