Skip to main content

PERSPECTIVE article

Front. Digit. Health, 14 September 2023
Sec. Digital Mental Health
This article is part of the Research Topic Cybersecurity in Digital Mental Health View all 3 articles

Cybersecurity: a critical priority for digital mental health

  • 1Department of Psychiatry, Cambridge University, Cambridge, United Kingdom
  • 2School of Health Sciences, Salford University, Salford, United Kingdom
  • 3Department of Psychology, Queen Mary University of London, London, United Kingdom

There has been a surge in the supply and demand of digital mental health support services in recent times. There have also been high profile cyberattacks specifically targeting mental health and behavioral services, along with a shift toward targeting vulnerable people directly. Cyberattacks involving personal health data, especially sensitive mental health data, could have devastating consequences to vulnerable people, those close to them, and many other stakeholders. This article calls for the immediate examination of the current state of cybersecurity in the digital mental healthcare industry to collectively identify risks and to protect user and provider vulnerabilities. This article points to the need to build a global cybersecurity culture within digital mental health while also working closely with other industries. The article concludes by making some preliminary recommendations to help support the creation of standards that will enhance the collective preparedness for future responses to cybersecurity threats and attacks.

Introduction

Cybersecurity in digital mental health is being overlooked as a critical priority. For example, in a recent report by the World Economic Forum Governance Toolkit for Digital Mental Health the word “cybersecurity” is mentioned only once in over 70 pages (1). Furthermore, whilst the profession of mental health care is focused on delivery of services, the digital and technical knowledge of those services is not necessarily part of training mental health professionals.

Data breaches involving mental health information can have widespread impacts, for clients, patients, their loved ones, practitioners themselves and even providers of the technology. Therefore, there is an immediate need to examine the current state of cybersecurity in digital mental healthcare to identify risks and to protect user and provider vulnerabilities. This may also include reviewing the membership bodies that oversee healthcare professional practice and training to identify where those risks are present.

This article highlights some of the ways in which many stakeholders can be affected. It also highlights different ways in which providers and other stakeholders can become vulnerable from design and implementation of these services. It then concludes with some preliminary recommendations for helping to cultivate a global cybersecurity culture within the digital mental health space, which would expedite the creation of standards to enhance collective preparedness to respond to future cybersecurity threats and attacks.

Personal health data is now the most valuable form of data on the dark web according to sources (2), and cybersecurity breaches in the healthcare sector continue to grow (3). In January 2021 alone, a total of 878.17 million data records were compromised worldwide, which is more than in all of 2017 (4).

The pandemic has also accelerated the global adoption of digital mental health services (5), but this growth in supply and demand could increase the exposure of sensitive data to cybersecurity threats and attacks. Furthermore, there is a lack of training overall in cybersecurity matters and data protection laws for the professionals using those very services who often, if not always, process what are called “special categories” of data under the Data Protection Act 2018 (6).

Several high-profile cyberattacks have already targeted mental health and behavioral services providers. For example, Finland's largest psychotherapy provider, Vastaamo, declared bankruptcy in 2021 after experiencing data breaches in which confidential therapy session notes, as well as other personal information, were stolen (7). After the company allegedly refused to pay the ransom, the cyber criminals directly targeted victims, including minors (8). This case is an example of how cybercrime has evolved beyond encrypting data to using blackmail and extortion aimed at already vulnerable people with extremely private and sensitive information (9). In another recent high-profile case, SalusCare, the largest provider of behavioral healthcare services in Southwest Florida, USA, filed a lawsuit against Amazon to force the release of allegedly stolen mental health data that was exfiltrated to an Amazon Web Services (AWS) storage account (10, 11). According to SalusCare, the stolen data contains extremely personal and sensitive records of patients’ psychiatric and addiction counselling and treatment, as well as sensitive financial information (10, 11). In a cyberattack on the Behavioral Health Center, Bangor, Maine, USA, highly confidential psychotherapy records were stolen, which included evaluations, session notes, and records of sex offenders and sexual abuse victims (12). This stolen data was listed on the dark web and has allegedly been sold to an unknown party for unknown purposes (12). Cyber-attacks have also targeted private health insurers, NHS mental health trusts, and mental health charities (1315).

Impact to victims and those close to them

Data breaches can harm victims in multiple ways, including mental health harms (16, 17). For example, cyber-attacks can potentially trigger or exacerbate issues such as anxiety, insomnia, trauma, paranoia, substance abuse, or even suicidal behaviors and action (1820) or the repetition of these kinds of “cybertrauma” (21). Attacks can cause interpersonal harms due to disclosures, such as when abusers are named in therapy sessions. They can also cause financial harm that could exacerbate mental health issues and leave victims exposed to fraud and identity theft, or financial hardship if the victim pays a ransom. Reputational harms, especially for high-profile victims, can also occur given that stigma about mental health still exists globally. Loved ones, and those who are close to the victim are also at risk from data breaches, such as when their details are listed as emergency contacts. Surveillance advertising, which may also be a side-effect of tracking is also a harm, whereby data is sold to the market to target those individuals (22) specifically and directly.

Research findings with victims of computer misuse report psychological harm such as anger, anxiety, fear, isolation, and embarrassment (23). In the case of a victim of identity theft after a data breach, victims feel violated, betrayed, vulnerable, angry, and powerless (24). Victims might go into stages of grief and might feel guilty or ashamed. The emotional harm can lead to trauma or physical symptoms such as difficulty in sleeping as mentioned earlier (25). Repeat victims who might have experienced such experiences more than once, might have a unique set of support needs, for both emotional or physical problems such as the need for counselling, and support from the criminal justice system (26).

Targeting minors, who are already at a heightened exploitation risk, could lead to them being manipulated into carrying out illegal hacking activities, becoming “money mules” to perform illegal online financial transactions, or being groomed by online predators to share age-inappropriate and often sexually explicit content; all of which can have implications for young people's mental health and future outcomes (27).

Cyber-attacks not only negatively impact victims of the crime, but they can also impact all other service users who are no longer able to access the support they need from their provider. For example, access to services would be especially important for vulnerable people in crisis and times of need, including high suicidal risk, service disruptions to medication delivery and monitoring medication adherence. Such issues raise questions about how individuals should be supported before, during, and after such events. How do data breaches and service disruptions impact psychological and other clinical outcomes? What actions should a mental health practitioner take when they become aware of such intrusions or disruptions to the system? For example, one study assessing 3,025 hospitals with 14,297 unique hospital-year observations found that after a data breach had occurred clinical outcomes worsened with as many as 36 additional deaths per 10,000 heart attacks (28). In addition, cyber-attacks, such as the WannaCry attack, resulted for many in worry as well as a sense of helplessness (29). When victims have experienced identity theft what happens to their socioeconomic status? A data breach can also weaken or even destroy trust between service users and providers, and ill-prepared cybersecurity breach responses could add to the stigma around seeking and receiving mental health treatments. For example, users might start to avoid or delay seeking treatment, or omit or give false information during assessments thus harming the quality of care.

Digital mental health providers

Digital mental health providers offer critical and timely support to millions of people around the world, including extremely sensitive support such as suicide safety and prevention planning. This can make digital mental health providers “attractive” targets for cybercriminals. When security-by-design and default is not a priority from the onset, providers risk hurting the very people they are trying to help. Digital support can scale readily, but so too can disruption and devastation. There could be many immediate and long-lasting consequences to mental health services providers after being targeted by cyber threats and attacks. Employees and other stakeholders connected with the service could have their data stolen or sold to third parties or criminals. This can also be a stressful and highly emotional period for all staff, such as provoking panic, anger, and guilt (30) especially for employees who continue to work with the mental health services provider while the breach is being investigated, and especially if the breach involves an employee misstep (clicking on a phishing email) or their own data being breached. From a business perspective, data breaches could lead to serious impacts on revenue including slow operational recovery after a breach as well as irreparable reputational damage. Cybercriminals are increasingly targeting small and medium-sized enterprises (SMEs) and small and medium-sized businesses (SMBs) (31). Many digital mental health services providers are SMEs and SMBs, therefore this could have a serious impact on the provider's sustainability (32), and in extreme cases lead to bankruptcy (7). Even security training for employees does not guarantee improvements in security awareness at the organizational level or in real-world attack situations (33). Furthermore, while cybersecurity insurance offers a mechanism to mitigate some risks to providers, such as underwriting ransomware payments to cybercriminals, it remains uncertain as to what extent providers will be able to shift cybersecurity risks to insurers in the future. For example, the global insurer, AXA, announced a landmark policy decision in 2021 to stop reimbursements of ransomware payments in France (34). Some governments have started to inform companies that they should not pay ransomware (35). From a legal and regulatory perspective, digital mental health providers must be aware of any obligations and repercussions related to data breaches. For example, the US Department of Treasury's Office of Foreign Assets Control (OFAC) warned that businesses could be in violation of USA law if they pay groups that are on the sanctions list (35). Other potential criminal penalties, such as prosecution, fine or imprisonment (36), could come from improperly disclosing a data breach, for example, by concealing security failings. For example, Article 34 of the European General Data Protection Regulation (GDPR) states that data controllers must communicate a data breach to people impacted without undue delay and report to the Information Commissioner's Office within 72 h of becoming aware of such instances (37).

This issue also highlights that practitioners and users of the systems must either use further technology or employ staff to highlight a breach where possible or be able to understand cybersecurity and technology principles with enough competence to recognize when data has been breached. However, many providers find out that criminal activity has taken place when the system becomes unavailable or “locked” due to malware or virus notifications (38).

The pandemic is shifting boundaries for mental health support and subsequently expanding and evolving the cyber threat attack surface for cybercriminals

The pandemic has brought a profound shift toward the digital provision of mental health support (5), albeit with some exceptions, such as it being ruled illegal to section someone under the Mental Health Act using remote video consultations in the UK (39, 40). In April 2020, an FDA regulatory change allowed digital mental health providers to bypass certain processes (41). While the FDA still required that products meet the same level of cybersecurity protections, including software verification, validation, and hazard analysis, this action by the FDA has still subsequently increased the gap between “time to market and the time to security” as stated by the World Economic Forum, which inferred that digital mental health services providers could be “introducing new vulnerabilities faster than they can be secured” (42).

The pandemic also increased opportunities for adversaries to find vulnerabilities and infiltrate networks, which subsequently has expanded the attack surface. This was in part due to the shift towards remote working, increased internet connectivity, and dependency on digital infrastructures from possibly unprotected or unknown networks. Moreover, many practitioners were at home during this time using their own Internet Service Provider who may not have the same infrastructure of security protocols as a business that provides a room for the practitioner to use, or the home practitioner may not have had their own security systems in place or know how to if they lacked data protection, cybersecurity, and awareness training (43).

During the pandemic, ransomware attacks increased by 62% globally, and by 158% in North America between 2019 and 2021 (44). This increase in cybercrime can have a serious subsequent impact on the mental health of cybersecurity workers. A survey by OneLogin called IAMokay Mental Health Survey polled 250 technology leaders worldwide and found that over three-quarters believed the pandemic had increased workplace stress, 86% reported an increase in workload, and almost a quarter of respondents said they used alcohol, narcotics, or prescription medication to manage their stress (45). Nearly three-quarters of respondents believed their organization cares about their mental health, and nearly half (49%) said their employer has provided access to mental health services (45).

There are many ways that providers can experience cyber threats and attacks, including brute force and distributed denial-of-service (DDoS), credential stuffing, person-in-the-middle and providers can also be made vulnerable in different ways, such as through interactions with clients and supplier third party software vulnerabilities (46, 47). There are also factors such as human error and social engineering at play, including sophisticated spear phishing attacks that exploit cognitive biases and target disgruntled or vulnerable staff members to help cybercriminals steal information or use disguises to enter premises (4649).

While cybercrime is often driven by financial incentives, “hacktivist” groups might have additional motivations, such as causing disruptions to clinical operations for social purposes. For example, a hacktivist group in the USA had opposing views about how a hospital was managing a patient's case and subsequently targeted the hospital with a DDoS attack (50). This may also be an issue for hacktivists who may take action where services that include “hot” or sensitive topics such as children's services providing gender-based care, sexual health, or areas of reproductive justice, abortion, and pregnancy, which all relate to and fall within the mental health and healthcare paradigm.

Other tactics used by cybercriminals include exploiting web services and Application Programming Interfaces (APIs). APIs define how apps can communicate with other apps and systems, and this form of communication now accounts for more than 83% of all internet traffic (51). According to a Salt Security report, malicious API traffic is growing faster than non-malicious API calls, whereby API calls grew 51% vs. malicious traffic that grew 211% in 2021 (52). Some have even predicted that API attacks would become the most frequent attack vector for application breaches (53). Many high-profile companies have experienced API-related cybersecurity problems, including Peloton Equifax, Instagram, Meta, Amazon and Paypal. According to a report by Salt Security, 91% of companies had API-related security problems (54). Within the digital mental health space, one might speculate a similar degree of risk exists albeit far less reported. One documented API-related security threat involving the digital mental health app provider, “Feelyou”, was reported by The Daily Dot stating that the provider patched a vulnerability that was—until then—leaving nearly 80,000 email addresses of its users exposed online (55).

As the pandemic accelerated the use of mobile healthcare apps, this increased the exposure of health data through API vulnerabilities used by mobile health applications. For example, in the largest unveiling of vulnerabilities in telemedicine APIs, a recent report called “All That We Let In” by ethical hacker Alissa Knight and Approov found that all 30 mobile health apps investigated were vulnerable to API attacks, which collectively exposed 23 million mobile health users (56, 57). While APIs play a crucial role in supporting health IT interoperability by allowing multiple data sources to become transferable and to help providers give better care (58) much more research is needed, especially as to the security of Fast Healthcare Interoperability Resources (FHIR) standards and compliant applications, and potential FHIR API vulnerabilities (5961).

Recommendations to remediate and respond to cyber threats and attacks

All digital mental health providers are vulnerable to cyber threats and attacks. How can we be individually and collectively more responsive and resilient in the face of those attacks so that the consequences are minimized? While improving the security of systems is vital, there are other factors to address, such as creating standards for victim support after breaches, and building an evidence base to evaluate the impact of data breaches on clinical and psychological outcomes. These goals will be best achieved by working collaboratively, and we make the following preliminary recommendations:

1. Training

Cybersecurity and digital mental health training in the curriculums of mental health professional schools must be ensured, especially when mental health practitioners begin their professional studies. Many students begin at the lower college levels, who are often collecting special categories of data, processing and controlling this and in some cases carrying this data with them to and from educational settings, or sending to their respective tutors to be assessed, with little knowledge of the systems in place that protect this data and systems. Training should follow the legislations and law as discussed earlier in this article and become their ethical “privacy by design and default approach to practice”. This will include understanding cybersecurity of their own technology such as smartphones, tablets, and computers that they use to collect all forms of data and access the platforms and spaces of digital metal health. Training should help professionals to become aware of cybersecurity issues that surround services that they use and should provide education on how to protect both themselves and their service users from the data breaches.

2. Develop a global cybersecurity culture in digital mental health

Digital mental health providers, especially those with an international user base, must navigate a growing number and increasingly complex system of regulations and standards, such as the DPA (8), GDPR (62), soon PECR (63), ePR (64), DSA (65), OSB (66), CCPA (67), the Cybersecurity Law of the People's Republic of China (68) and many others worldwide. This makes it harder to keep up with cyber criminals who do not comply with such regulations. Therefore, digital mental health services providers must work together, as they have shown they can do in the past (5, 69), to make safety a universal and non-competitive issue. The digital mental health community needs to develop cybersecurity governance that ensures that security-by-design and default is built into digital services from the onset. By creating a global cybersecurity network within digital mental health, we can collectively learn from breaches and improve our responses to future attacks with a common goal of protecting people during their most vulnerable moments. Expanding on this point, a multi-faceted approach is needed whereby regulatory organizations contribute to the development of a global cybersecurity culture within digital mental health and that mental health associations, among others, provide support for the regulations governing practitioners, service providers, and mental health facilities. Furthermore, given that digital mental health overlaps with broader aspects of digital health, including the digital therapeutics industry, it will be important to integrate and align with other frameworks, such as the Digital Therapeutic Alliance. However, it will remain critical to examine how such frameworks are integrated within mental health contexts to ensure that the most appropriate standards are being adapted and implemented in this highly sensitive space.

3. Assessing the current and future landscape

As a global community for digital mental health, we need to assess the current state of the cybersecurity landscape. For example, how have digital mental health security programs been developed to date? What are the common themes of struggle across this industry? We need to think about assessing future risks. For example, what are the risks and consequences if a cybercriminal targets medical and IoT devices that provide, transmit, and access confidential data or exploit a VR headset used for mental health and wellbeing support? Or a hacker manipulates a conversational AI system designed to offer mental health support, especially given recent occurrences of ChatGPT being hacked (70) and ChatGPT allegedly prompting a vulnerable person to a tragic outcome of death by suicide (71)? There has been a drive towards gamifying mental health treatment, but how secure is the information being gathered and stored, especially when a lot of games and apps link with virtual/social media profiles?

4. Set standards for victim support, including breach response and continuity of care procedures

While many solutions for breach responses exist from technical and operational perspectives (72), we also urgently need standards to manage disruptions in mental health care and for implementing victim support services. In the aftermath of the Vastaamo cyber-attack Finland has been actively leading the way globally on how to establish frameworks that protect victims (73). For example, the government of Finland fast-tracked legislation to allow citizens to change their personal identity codes in high-risk cases of data breaches (74). Other countries should engage in these and other forms of protecting vulnerable people.

5. Incident monitoring and establishing a central repository for reporting and archiving incidents

Cybersecurity incidents involving mental health information should be recorded, analyzed, and shared in safe ways to help the whole community respond to potential vulnerabilities. We should also be monitoring mitigation trends to deal with these threats. The attacks are coming from all types of endpoints, including some that providers can’t control or monitor.

6. More research and better budgeting: Support for cyber threat researchers, ethical hackers, and studies evaluating outcomes and impacts of data breaches

Cybercrime was predicted to cost $6 trillion in 2021 (75). By 2025, it is predicted that over $1 trillion dollars will be spent on information security (76). More digital mental health providers should be running breach and attack simulations performed by ethical hackers and they should be sharing the outcomes of these efforts. More support is needed to support and protect ethical hackers as in the past there have been occurrences whereby ethical hackers have been negatively targeted by breached organizations, for example, by threatening the individual who first notified the organization of a breach with legal action (77). We also need to better understand the immediate and long-term risks of cyber-attacks and data breaches on users and investigate the impact of interruptions to service provision on psychological outcomes. Providers must ensure there is an adequate budget for employing or consulting with cybersecurity experts, for example, having a cybersecurity officer, and/or a cybersecurity expert on their advisory board. There should also be a budget set aside for costs associated with breach responses, including to fund costs associated with offering victim support, or compensation and other aspects.

7. Identify the best methods for collecting and sharing data

Currently it is a challenge to conduct research in the field of online victimization, especially in the context of the most vulnerable, due to the lack of data. Gaining access to data sets collected by the police, such as Action Fraud, complaint records from Telecoms, or cases prosecuted under the Computer Misuse Act, could lead to more precision and evidence-based research, which could better inform policy makers.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.

Author contributions

All authors contributed to writing, reviewing and editing the manuscript. All authors contributed to the article and approved the submitted version.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. World Economic Forum. Global Governance Toolkit for Digital Mental Health in collaboration with Deloitte. White Paper (2021). Available at: https://www.weforum.org/whitepapers/43c36293-05fa-4101-9abf-a5916a490a58 (Accessed June 18, 2023).

2. The Irish Examiner. Patient data ‘10-15 times more valuable than credit card data’ (2021). Available at: https://www.irishexaminer.com/news/arid-40293149.html?type=amp (Accessed June 18, 2023).

3. Neprash HT, McGlave CC, Cross DA, Virnig BA, Puskarich MA, Huling JD, et al. Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016–2021. JAMA Health Forum. (2022) 3(12):e224873. doi: 10.1001/jamahealthforum.2022.4873

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Scroxton A. More data stolen in January 2021 than in all of 2017, says report. Computer Weekly (2021). Available at: https://www.computerweekly.com/news/252501400/More-data-stolen-in-January-2021-than-in-all-of-2017-says-report (Accessed June 18, 2023).

5. Inkster B, Digital Mental Health Data Insights Group (DMHDIG). Early warning signs of a mental health tsunami: a coordinated response to gather initial data insights from multiple digital services providers. Front Digit Health. (2021) 2. doi: 10.3389/fdgth.2020.578902

PubMed Abstract | CrossRef Full Text | Google Scholar

6. Data Protection Act Legislation (2018). Available at: https://www.legislation.gov.uk/ukpga/2018/12/contents/enacted (Accessed June 18, 2023).

7. Teivainen A. Hacked Finnish psychotherapy service provider declared bankrupt. Helsinki Times (2021). Available at: https://www.helsinkitimes.fi/finland/finland-news/domestic/18704-hacked-finnish-psychotherapy-service-provider-declared-bankrupt.html (Accessed June 18, 2023).

8. Ralston W. A dying man, a therapist and the ransom raid that shook the world. WIRED (2020). Available at: https://www.wired.co.uk/article/finland-mental-health-data-breach-vastaamo (Accessed June 18, 2023).

9. Harris M. They told their therapists everything. Hackers leaked it all. WIRED (2021). Available at: https://www.wired.com/story/vastaamo-psychotherapy-patients-hack-data-breach/ (Accessed June 18, 2023).

10. Coble S. Phished Healthcare Provider Takes Legal Action Against Amazon. Inforsecurity Magazine (2021). Available at: https://www.infosecurity-magazine.com/news/saluscare-takes-legal-action/ (Accessed June 18, 2023).

11. Davis J. Amazon Sued for Hosting Florida Provider’s Stolen Healthcare Data. Health IT Security (2021). Available at: https://healthitsecurity.com/news/amazon-sued-for-hosting-stolen-health-data-to-compel-its-release (Accessed June 18, 2023).

12. Highly confidential psychotherapy records from Maine center listed on the dark web. DataBreaches.net. April 5, 2017. Available at: https://www.databreaches.net/highly-confidential-psychotherapy-records-from-maine-center-listed-on-the-dark-web/ (Accessed June 18, 2023).

13. McGowan M. Medibank hackers release 1,500 more patient records on dark web, including mental health data. The Guardian (2022). Available at: https://www.theguardian.com/australia-news/2022/nov/20/medibank-hackers-release-1500-more-patient-records-on-dark-web-including-mental-health-data (Accessed June 18, 2023).

14. Dimsdale C. NHS cyber attack hits patient care with records left in ‘chaos’ three months on iNews (2022). Available at: https://inews.co.uk/news/nhs-cyber-attack-lives-risk-mental-health-care-systems-chaos-three-months-1947561 (Accessed June 18, 2023).

15. Scottish mental health charity SAMH targeted in cyber attack. BBC. March 21, 2022. Available at: https://www.bbc.co.uk/news/uk-scotland-60826263 (Accessed June 18, 2023).

16. Kaakinen M, Keipi T, Räsänen P, Oksanen A. Cybercrime victimization and subjective well-being: an examination of the buffering effect hypothesis among adolescents and young adults. Cyberpsychol Behav Soc Netw. (2018) 21(2):129–37. doi: 10.1089/cyber.2016.0728

PubMed Abstract | CrossRef Full Text | Google Scholar

17. Wies B, Landers C, Ienca M. Digital mental health for young people: a scoping review of ethical promises and challenges. Front Digit Mental Health. (2021) 3. doi: 10.3389/fdgth.2021.697072

CrossRef Full Text | Google Scholar

18. Shapr M. Two people may have committed suicide after Ashley Madison hack: police. Reuters (2015). Available at: https://www.reuters.com/article/us-ashleymadison-cybersecurity-idUSKCN0QT1O7201508242 (Accessed June 18, 2023).

19. Why the wife of a pastor exposed in Ashley Madison leak spoke out after his suicide. Washington Post. September 9, 2015. Available at: https://www.washingtonpost.com/news/acts-of-faith/wp/2015/09/09/why-the-wife-of-a-pastor-exposed-in-ashley-madison-leak-spoke-out-after-his-suicide/ [Accessed June 18, 2023]

20. Doffman Z. Ashley Madison Hack Returns To ‘Haunt’ Its Victims: 32 Million Users Now Watch And Wait. Forbes (2020). Available at: https://www.forbes.com/sites/zakdoffman/2020/02/01/ashley-madison-hack-returns-to-haunt-its-victims-32-million-users-now-have-to-watch-and-wait/ (Accessed June 18, 2023).

21. Knibbs C. Cybertrauma. The darker side of the internet. kindle self published and website definition @ (2016). www.childrenandtech.co.uk

22. Fielding R. cited in Knibbs & Hibberd, 2023 in press (2023).

23. Button M, Sugiura L, Blackbourn D, Shepherd DWJ, Wang V, Kapend R. Victims of computer misuse: Main findings. Portsmouth: University of Portsmouth (2020). Available at: https://www.gov.uk/government/organisations/home-office

24. Kirwan G, Power A. The psychology of cyber crime: Concepts and principles. Hershey, PA: IGI Global (2011).

25. Dallaway E. Cybercrime Victims Left Depressed and Traumatized. Infosecurity Magazine. #ISC2Congress (2016). Available at: https://www.infosecurity-magazine.com/news/isc2congress-cybercrime-victims/

26. Bada M. Online victimisation: the impact on victims and implications for crime prevention. 21st Annual Conference of the European Society of Criminology, EUROCRIM; 8–10th September 2021 (2021). Available at: https://openwater-public.s3.amazonaws.com/sonar-uploads%2FaeZpCqaxQkaumJzj8BRw_Eurocrim%202021%20-%20Book%20of%20Abstracts.pdf

27. Knibbs C. Online harm and cybertrauma. Legal and harmful issues with children and young people. Abingdon: Routledge (2023).

28. Choi SJ, Johnson E, Lehmann CU. Data breach remediation efforts and their implications for hospital quality. Health Serv Res. (2019) 54(5):971–80. doi: 10.1111/1475-6773.13203

PubMed Abstract | CrossRef Full Text | Google Scholar

29. Bada M, Nurse J. The social and psychological impact of cyberattacks. In: Benson V, McAlaney J, editors. Emerging cyber threats and cognitive vulnerabilities. London: Academic Press (2019). p. 73–92. doi: 10.1016/B978-0-12-816203-3.00004-6

31. Afifi-Sabet K. Experts blast SMBs’ “head in the sand” approach to cyber security. IT Pro (2021). Available at: https://www.itpro.co.uk/security/cyber-security/358682/experts-blast-smbs-head-in-the-sand-approach-to-cyber-security (Accessed June 18, 2023).

32. Incentivizing Responsible and Secure Innovation: A framework for entrepreneurs and investors. World Economic Forum Reports. June 25, 2020. Available at: https://www.weforum.org/reports/incentivizing-responsible-and-secure-innovation-a-framework-for-entrepreneurs-and-investors (Accessed June 18, 2023).

33. Security awareness training doesn’t solve human risk. Help Net Security. May 12, 2021. Available at: https://www.helpnetsecurity.com/2021/05/12/solve-human-risk/ (Accessed June 18, 2023).

34. Bajak F. Insurer AXA to Stop Paying for Ransomware Crime Payments in France. Insurance Journal (2021). Available at: https://www.insurancejournal.com/news/international/2021/05/09/613255.htm (Accessed June 18, 2023).

35. Lemos R. Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise. Dark Reading (2021). Available at: https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109 (Accessed June 18, 2023).

36. Prosecutors charge ex-CEO of hacked therapy firm Vastaamo. YLE News. September 27, 2022. Available at: https://yle.fi/a/3-12641083

37. Ralston W. A dying man, a therapist and the ransom raid that shook the world. WIRED ( 9.2020). Available at: https://www.wired.co.uk/article/finland-mental-health-data-breach-vastaamo (Accessed June 18, 2023).

38. Knibbs C, Hibberd G. Cybersecurity and data protection for practitioners. How to ensure client confidentiality. Abingdon: Routlege (2023). In Press.

39. Carter C. Video assessments by AMHPs unlawful, High Court rules. Community Care (2021). Available at: https://www.communitycare.co.uk/2021/01/27/video-assessments-amhps-unlawful-high-court-rules/ (Accessed June 18, 2023).

40. Marsh S. NHS drops virtual assessments used to section patients. Guardian (2021). Available at: https://www.theguardian.com/society/2021/jan/30/nhs-drops-virtual-assessments-used-to-section-patients (Accessed June 18, 2023).

41. Muoio D. FDA: Devs can release digital products for psychiatric disorders without 510(k) submission during COVID-19 crisis. Mobi Health News (2020).

42. Incentivizing Responsible and Secure Innovation: A framework for entrepreneurs and investors. World Economic Forum Report. June 25, 2020. Available at: https://www.weforum.org/reports/incentivizing-responsible-and-secure-innovation-a-framework-for-entrepreneurs-and-investors (Accessed June 18, 2023).

43. Loane, Knibbs and Tudor (2021).

44. Security. Ransomware soars with 62% increase since 2019 (2021). Available at: https://www.securitymagazine.com/articles/94831-ransomware-soars-with-62-increase-since-2019 (Accessed June 18, 2023).

45. Muncaster P. Quarter of CISOs Self-Medicate as Pandemic Stress Spikes. Info Security Magazine (2021). Available at: https://www.infosecurity-magazine.com/news/quarter-cisos-it-selfmedicate/ (Accessed June 18, 2023).

46. DIMH2021: What are hackers and why do they hack? Digital Innovation in Mental Health Conference. August 4, 2021. Hugo van den Toorn—Manager OffSec team, Outpost24. Available at: https://www.youtube.com/watch?v=jx22DjKsCT4 (Accessed June 18, 2023).

47. Huang K, Madnick S, Pearlson K. Is Third-Party Software Leaving You Vulnerable to Cyberattacks? Harvard Business Review (2021). Available at: https://hbr.org/2021/05/is-third-party-software-leaving-you-vulnerable-to-cyberattacks (Accessed June 18, 2023).

48. DIMH2021: How Criminals Can Steal Data Without Hacking Systems. Tyson N, ACFS, Director Rightway Compliance, Creator Fraud Management Resource Centre. Digital Innovation in Mental Health Conference. August 4, 2021. Available at: https://www.youtube.com/watch?v=fKP9aIs34wM (Accessed June 18, 2023).

49. Rashid FA. Phishing attacks exploit cognitive biases, research finds. Venture Beat (2021). Available at: https://venturebeat.com/2021/05/12/phishing-attacks-exploit-cognitive-biases-research-finds/ (Accessed June 18, 2023).

50. Miliard M. Massive DDoS attack harnesses 145,000 hacked IoT devices. Healthcare IT News (2016). Available at: https://www.healthcareitnews.com/node/529886 (Accessed June 18, 2023).

51. Mathur A. API Discovery and Profiling—Visibility to Protection. Akamai (2020). Available at: https://blogs.akamai.com/2020/10/api-discovery-and-profiling-visibility-to-protection.html (Accessed June 18, 2023).

52. Korolov M. How API attacks work, and how to identify and prevent them. CSO (2021). Available at: https://www.csoonline.com/article/3618569/how-api-attacks-work-and-how-to-identify-and-prevent-them.html (Accessed June 18, 2023).

53. API Security: What You Need to Do to Protect Your APIs. Gartner Research. August 28, 2019. Available at: https://www.gartner.com/en/documents/3956746/api-security-what-you-need-to-do-to-protect-your-apis (Accessed June 18, 2023).

54. API Security Trends 2023. Salt. January 2023. Available at: https://salt.security/api-security-trends (Accessed June 18, 2023).

55. ISBuzz Staff Editorial Team, Information Security Buzz. Mental Health App Feelyou Exposed 70,000 Emails. Information Security Bizz (2022). Available at: https://informationsecuritybuzz.com/mental-health-app-feelyou-exposed-70000-emails/ (Accessed June 18, 2023).

56. Stewart D. All That We Let In. Approov. Available at: https://approov.io/mhealth/hacking/ (Accessed June 18, 2023).

57. Kaur D. How API attacks are hamstringing mobile healthcare apps. Techwire Asia (2021). Available at: https://techwireasia.com/2021/04/how-api-attacks-are-hamstringing-mobile-healthcare-apps/ (Accessed June 18, 2023).

58. Siwicki B. What you need to know about healthcare APIs and interoperability. Healthcare IT News (2019). Available at: https://www.healthcareitnews.com/news/what-you-need-know-about-healthcare-apis-and-interoperability (Accessed June 18, 2023).

59. Stewart D. Guest Blog: Alissa Knight on ’Standing Outside The FHIR’. Approov (2021). Available at: https://blog.approov.io/standing-outside-the-fhir (Accessed June 18, 2023).

60. Stewart D. Guest Blog: Authentication & Authorization in FHIR APIs’ (2021). Available at: https://blog.approov.io/guest-blog-alissa-knight-on-fhir-walker-authentication-and-authorization-in-fhir-apis (Accessed June 18, 2023).

61. Stewart D. Guest Blog: Alissa Knight on ‘Playing with FHIR’ (2021). Available at: https://securityboulevard.com/2021/06/guest-blog-alissa-knight-on-playing-with-fhir/ (Accessed June 18, 2023).

62. General Data Protection Ruling (2018) Available at: https://gdpr-info.eu/ (Accessed June 18, 2023).

63. The Privacy and Electronic Communications (EC Directive) Regulations 2003, UK Statutory Instruments 2003 No. 2426. Available at: https://www.legislation.gov.uk/uksi/2003/2426/contents/made (Accessed June 18, 2023).

64. Next-gen privacy: Examining the EU’s ePrivacy Regulation. Müge Fazlioglu, CIPP/E, CIPP/US IAPP Staff Contributor. Available at: https://iapp.org/news/a/nextgen-privacy-the-eus-eprivacy-regulation/ (Accessed June 18, 2023).

65. The Digital Services Act package. Available at: https://digital-strategy.ec.europa.eu/en/policies/digital-services-act-package (Accessed June 18, 2023).

66. Online Safety Bill. Available at: https://bills.parliament.uk/bills/3137 (Accessed June 18, 2023).

67. California Consumer Privacy Act (CCPA). May 10, 2023. Available at: https://oag.ca.gov/privacy/ccpa (Accessed June 18, 2023).

68. Creemers R, Webster G, Triolo P. Translation: Cybersecurity Law of the People’s Republic of China (Effective June 1, 2017) (2018). Available at: https://digichina.stanford.edu/work/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017/ (Accessed June 18, 2023).

69. The API Security Project. Ongoing 2023. Available at: https://www.beckyinkster.com/apisecurityproject

70. Burgess M. The hacking of ChatGPT is just getting started. WIRED (2023). Available at: https://www.wired.com/story/chatgpt-jailbreak-generative-ai-hacking/?utm_source=onsite-share&utm_medium=email&utm_campaign=onsite-share&utm_brand=wired (Accessed June 18, 2023).

71. Xiang C. ‘He Would Still Be Here': Man Dies by Suicide After Talking with AI Chatbot, Widow Says. Vice (2023). Available at: https://www.vice.com/en/article/pkadgm/man-dies-by-suicide-after-talking-with-ai-chatbot-widow-says (Accessed June 18, 2023).

72. Bradley S. Minimizing damage from a data breach: A checklist. CSO (2021). Available at: https://www.csoonline.com/article/3617910/minimizing-damage-from-a-data-breach.html (Accessed June 18, 2023).

73. Rikosuhripäivystys. 2023. Available at: https://www.riku.fi/en/ (Accessed April 18, 2023) (Accessed June 18, 2023).

74. Tanner J. Finland fast-tracks ID code law change after hacking case. AP News (2020). Available at: https://apnews.com/article/estonia-finland-legislation-psychotherapy-laws-bb9294ddfc78acf7b8c816ecaf15e8c0

75. Lunden I. Cymulate nabs $45M to test and improve cybersecurity defenses via attack simulations. Tech Crunch (2021). Available at: https://techcrunch.com/2021/05/05/cymulate-nabs-45m-to-test-and-improve-cybersecurity-defenses-via-attack-simulations/ (Accessed June 18, 2023).

76. Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses. Hashed Out. July 16, 2020. Available at: https://www.thesslstore.com/blog/breach-and-attack-simulations-how-to-find-the-gaps-in-your-cyber-defenses/ (Accessed June 18, 2023).

77. Bule G. The Apperta data breach fiasco. Secjuice (2021). Available at: https://www.secjuice.com/apperta-data-breach-fiasco/ (Accessed June 18, 2023).

Keywords: cybersecurity, mental health, digital mental health, victim support, data protection

Citation: Inkster B, Knibbs C and Bada M (2023) Cybersecurity: a critical priority for digital mental health. Front. Digit. Health 5:1242264. doi: 10.3389/fdgth.2023.1242264

Received: 18 June 2023; Accepted: 21 August 2023;
Published: 14 September 2023.

Edited by:

John Alexander Waterworth, Umeå University, Sweden

Reviewed by:

Alicia Salamanca-Sanabria, Singapore Institute for Clinical Sciences (A*STAR), Singapore

© 2023 Inkster, Knibbs and Bada. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Becky Inkster becky@beckyinkster.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.