
Phishing attacks have changed. They’re no longer the obvious, typo-filled scam emails asking you to wire money to a Nigerian prince. Today’s attacks clone real websites, replicate legitimate emails, and use platforms your staff already trust like DocuSign, SharePoint, and Microsoft Teams to deliver malicious links.
For healthcare practices, the stakes are higher than most industries. A compromised account isn’t just an IT headache. It’s a potential HIPAA breach, a disruption to patient care, and a billing and revenue risk all from one click by one staff member on one convincing email.
Why file-sharing links are the new attack vector
Most people assume that a link from DocuSign is safe because it comes from DocuSign. Attackers know this. They use legitimate file-sharing platforms to mask malicious destinations, specifically because those links are harder for email filters to flag and more likely to be trusted by recipients. It’s not a flaw in the platform, it’s a flaw in our assumptions about it.
What your practice should have in place
There are two layers of protection every practice needs right now.
- Strong spam filtering. A tool like Proofpoint Essentials filters out malicious emails while still letting legitimate ones through. Not all spam filters are equal — healthcare-specific configuration matters.
- Multi-Factor Authentication (MFA). Even if a username and password are compromised, MFA requires a second form of verification before anyone gets access. That second factor can be an app code, a physical token, a fingerprint, or Face ID. An attacker would need all of it — not just the password.
The one question to ask your IT provider
“If someone on my staff clicks a phishing link and their credentials are stolen, what happens next?”
The answer should walk you through both the prevention layer and the recovery layer. If your provider can’t answer it clearly, that’s important information.
The one habit worth sharing with your team today
Before clicking any file sharing link — even one that looks exactly like DocuSign — verify it. Send a quick message or make a quick call to the person who sent it. Ten seconds of friction is worth it.
Most breaches start with one click. Technology reduces the risk. Awareness closes the gap.



