Alaska Native Medical Center does not have a confirmed Novel Coronoirus patient and there are no confirmed cases in Alaska. In case of a confirmed Novel Coronovirus patient, the Alaska Department of Health and Social Services, Division of Public Health would provide information to the public. ANMC is prepared to treat and control the spread of infectious disease and is continuing to prepare in the event the recommendations evolve. read more
Your source for ANTHC employee news and events
907-563-2662 Operator
907-729-1301 Human Resources
907-729-2626 IT Helpdesk
907-729-5665 Housekeeping
907-729-2915 Security

Phishing Attack Alert and ANTHC System Access Lock Outs

January 7th, 2020 by Allison McIntyre

A large number of malicious emails are being sent to ANTHC employees. All employees should use extreme caution when checking email.  Tips for what to be on the watch for are included below.

Due to the risk that is created when an employee clicks on a bad link or provides a hacker with information, access to their accounts must be disabled to prevent the risk of further damage. The account must have a password reset and (in some cases) the user’s device must be quarantined and examined. Hackers are not only looking to steal private health information (PHI), but also to infect systems so that the entire ANTHC system (e.g., Cerner, Outlook, HealthCatalyst) could be disabled or disrupted. The above steps are necessary to ensure that our electronic health record and other systems remain protected if someone clicks on a bad link.

If you are locked out, please call IT (extension 2626) to arrange for your access to ANTHC systems to be re-enabled. To avoid disrupting patient care, physicians and other providers will be prioritized among those who have been locked out. Training on phishing attacks is being provided to better educate staff on how to identify malicious emails, which are also known as Phishing Attacks.

Things to watch out for:

  • Bad email address (email addresses that do not provide a name, or are from someone unfamiliar)
  • Messages that create a sense of urgency or incite fear
  • Link redirect – Any hyperlink should be viewed with suspicion
  • Implausible pretext or an individual who would not normally email you
  • Requests to reset your password and include a link that asks for your username and password
  • Requests to enter a username and password to view a document
  • No greeting or a strange closing

What should you do if you are suspicious?

  • Do not click on any links or open attachments
  • Do not enter your username and password or provide personal information
  • Click “Phish Alert” in Outlook

Again, if you are locked out, please call IT (extension 2626) to arrange for your access to ANTHC systems to be re-enabled. For questions or to request training, please contact Information Security in Compliance (extension 2699 or 3919)

Thank you for your vigilance in helping protect our systems.

How to Use the Phish Alert Button for Outlook instructions