{"id":25421,"date":"2026-04-07T18:08:08","date_gmt":"2026-04-07T14:08:08","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25421"},"modified":"2026-04-07T18:08:08","modified_gmt":"2026-04-07T14:08:08","slug":"telehealth-issues-2026","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/telehealth-issues-2026\/25421\/","title":{"rendered":"Is telehealth actually safe?"},"content":{"rendered":"<p>April 7 marks World Health Day. The theme for 2026 is \u201c<a href=\"https:\/\/www.who.int\/news-room\/events\/detail\/2026\/04\/07\/default-calendar\/world-health-day-2026-together-for-health-stand-with-science\" target=\"_blank\" rel=\"noopener nofollow\">Together for health. Stand with science<\/a>\u201d\u00a0\u2014 a call to join forces in the fight for evidence-based medicine and scientific progress. Many people view telehealth as one of the crowning achievements of this progress: you can basically get a doctor\u2019s consultation in five minutes without ever leaving your couch. But\u00a0there\u2019s a catch\u2026<\/p>\n<p>Medical data sells on the <a href=\"https:\/\/www.kaspersky.com\/blog\/mental-health-apps-issues-2026\/55395\/\" target=\"_blank\" rel=\"noopener nofollow\">black<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/54209\/\" target=\"_blank\" rel=\"noopener nofollow\">gray<\/a> markets for dozens of times more than credit card info or social media logins. Unlike a credit card, which you can just block and replace, you can\u2019t exactly reset your medical history. Your name, birthday, address, phone number, insurance ID, diagnoses, test results, prescriptions, and treatment plans stay relevant for years. This is a goldmine for everything from targeted marketing to blackmail, fraud, or identity theft.<\/p>\n<p>And with the rise of AI, the internet is now flooded with fake websites that claim to offer medical services but are actually designed to strip-mine confidential info from unsuspecting victims. Today, we\u2019re diving into which medical details are at risk, why hackers want them, and how you can stop them in their tracks.<\/p>\n<h2>More valuable than credit cards<\/h2>\n<p>Scammers monetize stolen medical data both in bulk and through individual sales. Their first move is usually to extort a ransom from the companies they\u2019ve successfully hacked. (In fact, back in 2024, 91% of malware-related healthcare data leaks in the U.S. <a href=\"https:\/\/www.cyberdefensemagazine.com\/14-million-victims-of-malware-breaches-in-the-u-s-healthcare-sector\/\" target=\"_blank\" rel=\"noopener nofollow\">were the result<\/a> of ransomware attacks.) But later, the leaked data is then used for pinpointed, personal attacks. It allows hackers to build a medical profile of a victim\u00a0\u2014 what meds they buy, how often, and what they take long-term\u00a0\u2014 to then sell that info to big pharma or marketers, or to use it for targeted phishing scams like pitching a fake innovative treatment. They can even blackmail a patient over a sensitive diagnosis or use the info to fraudulently score prescriptions for controlled substances. On top of that, insurance companies are also hungry for this kind of data. They analyze these details to hike up insurance premiums for patients or, in some cases, refuse to provide coverage altogether. In short, there are plenty of ways they can use it against you.<\/p>\n<h2>How bad is it really?<\/h2>\n<p>The biggest medical data breach in history went down in February 2024, when the BlackCat hacking group <a href=\"https:\/\/www.kaspersky.com\/blog\/unitedhealth-ransomware-attack\/53065\/\" target=\"_blank\" rel=\"noopener nofollow\">broke into the systems of Change Healthcare<\/a>. This is a division of UnitedHealth Group, which processes around 15 billion insurance transactions a year and acts as the financial middleman between patients, healthcare providers, and insurance companies.<\/p>\n<p>For nine days, the attackers roamed freely through Change Healthcare\u2019s internal systems, siphoning off six terabytes of confidential data before finally launching their ransomware. UnitedHealth was forced to completely yank Change Healthcare datacenters offline to stop the encryptor from spreading, and they ended up paying a 22-million-dollar ransom to the extortionists. The attack effectively paralyzed the U.S. healthcare system. The number of victims was revised three times: first 100 million, then 190 million, and the final tally hit a staggering 192.7 million people, with total damages estimated at 2.9\u00a0billion dollars. And the reason (on the Change Healthcare\u2019s side) for this massive incident\u00a0\u2014 <a href=\"https:\/\/www.kaspersky.com\/blog\/unitedhealth-ransomware-attack\/53065\/\" target=\"_blank\" rel=\"noopener nofollow\">which we broke down in detail in a separate post<\/a>\u00a0\u2014 was simply\u2026 a lack of two-factor authentication on a remote desktop access portal.<\/p>\n<p>Before that, the mental health telehealth startup Cerebral <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cerebral-to-pay-7-million-settlement-in-facebook-pixel-data-leak-case\/\" target=\"_blank\" rel=\"noopener nofollow\">embedded<\/a> third-party <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">tracking tools<\/a> directly into its website and apps. As a result, the data of 3.2 million patients\u00a0\u2014 including names, medical and prescription histories, and insurance info\u00a0\u2014 leaked out to LinkedIn, Snapchat, and TikTok. The U.S. Federal Trade Commission slapped the company with a 7.1-million-dollar fine, and issued an unprecedented ban on using medical data for advertising purposes. By the way, that same startup also made the headlines for sending its clients <a href=\"https:\/\/thehackernews.com\/2024\/04\/ftc-fines-mental-health-startup.html\" target=\"_blank\" rel=\"noopener nofollow\">promotional postcards without envelopes<\/a>, displaying patient names and phrasing that made it easy for anyone to figure out their diagnosis.<\/p>\n<h2>Why telehealth is so vulnerable<\/h2>\n<p>Let\u2019s take a look at the main weak spots in telehealth services.<\/p>\n<ul>\n<li><strong>Ad trackers in medical apps.<\/strong> Trackers from Facebook, TikTok, Snapchat, and other tech giants are often <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/07\/ftc-gives-final-approval-order-banning-betterhelp-sharing-sensitive-health-data-advertising\" target=\"_blank\" rel=\"noopener nofollow\">baked<\/a> right into telehealth platforms, <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/02\/ftc-enforcement-action-bar-goodrx-sharing-consumers-sensitive-health-info-advertising\" target=\"_blank\" rel=\"noopener nofollow\">leaking patient data to advertisers<\/a> without users ever knowing.<\/li>\n<li><strong>Unsecured communication channels.<\/strong> Sometimes doctors chat with patients through regular messaging apps instead of certified medical platforms. It\u2019s convenient, sure, but it\u2019s illegal for the clinic and totally unsafe for the patient.<\/li>\n<li><strong>Platform vulnerabilities.<\/strong> Telemedicine platforms <a href=\"https:\/\/www.aha.org\/system\/files\/media\/file\/2025\/01\/hc3-analyst-note-tlp-clear-securing-telehealth-challenges-and-solutions-january-8-2025.pdf\" target=\"_blank\" rel=\"noopener nofollow\">are prone to classic web attacks<\/a>, such as <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sql-injection\/\" target=\"_blank\" rel=\"noopener\">SQL injections<\/a> that let hackers dump entire patient databases, <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">session hijacking<\/a>, and data interception when connection encryption is weak or nonexistent.<\/li>\n<li><strong>Poor staff training.<\/strong> Our <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/11\/22125239\/Kaspersky_Healthcare-report-2021_eng.pdf\">research<\/a> showed that 30% of doctors have dealt with compromised patient data specifically during telehealth sessions, and 42% of medical staff don\u2019t actually understand how their patients\u2019 data is being protected.<\/li>\n<li><strong>Outdated medical devices.<\/strong> Many wearable medical gadgets (like heart monitors or blood pressure cuffs) use an old data transfer protocol called MQTT. <a href=\"https:\/\/securelist.com\/telehealth-report-2020-2021\/105642\/\" target=\"_blank\" rel=\"noopener\">It\u2019s full of holes<\/a> that could potentially allow hackers to steal sensitive info or even mess with how the device functions.<\/li>\n<\/ul>\n<h2>Spam and phishing in telehealth<\/h2>\n<p>Hackers aren\u2019t the only ones interested in the medical field\u00a0\u2014 spammers and scammers are all over it, too. They pitch \u201cmedical services\u201d with deals that look way too good to be true, send out emails about supposed changes to your health insurance, or talk up \u201cancient Himalayan healing traditions\u201d. Of course, all the links they send lead to suspicious websites offering dubious goods or services.<\/p>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175350\/telehealth-issues-2026-01.png\" title=\"Spam posing as Medicare, the U.S. national health insurance program. The user is informed falsely that their insurance terms have changed in an attempt to lure them to a fake website\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175350\/telehealth-issues-2026-01-604x465.png\" alt=\"\" title=\"telehealth-issues-2026-01.png\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\tSpam posing as Medicare, the U.S. national health insurance program. The user is informed falsely that their insurance terms have changed in an attempt to lure them to a fake website\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175355\/telehealth-issues-2026-02.png\" title=\"&lt;s&gt; CURING DIABETES IS EASY: All you have to do is\u2026 &lt;\/s&gt; Scammers are promoting some kind of miraculous Himalayan tradition for treating diabetes. But losing your money is the only thing guaranteed here! \">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175355\/telehealth-issues-2026-02-604x465.png\" alt=\"\" title=\"telehealth-issues-2026-02.png\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t<s> CURING DIABETES IS EASY: All you have to do is\u2026 <\/s> Scammers are promoting some kind of miraculous Himalayan tradition for treating diabetes. But losing your money is the only thing guaranteed here! \n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175359\/telehealth-issues-2026-03.jpg\" title=\"And of course, we can't forget the classic \" miracle cure for a fungal infection now with discount naturally.>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175359\/telehealth-issues-2026-03-604x465.jpg\" alt=\"\" title=\"telehealth-issues-2026-03.jpg\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\tAnd of course, we can't forget the classic \"miracle cure\" for a fungal infection \u2014 now with a 70% discount, naturally.\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<p>Should you land on such a phishing site, scammers will try to squeeze every bit of private info they can out of you: photos of your ID, insurance policy, prescriptions, and sometimes even\u2026 photos of body parts that supposedly need medical attention. From there, this data can be dumped and sold on the dark web\u00a0\u2014 or used for blackmail, extortion, and follow-up phishing attacks. To learn more about how the underground data assembly line works, check out our post, <a href=\"https:\/\/www.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/54968\/\" target=\"_blank\" rel=\"noopener nofollow\">What happens to data stolen using phishing?<\/a><\/p>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175404\/telehealth-issues-2026-04.jpg\" title=\"A fake clinic website with a pretty convincing look. Scammers even created pages for \" medical staff and however for some reason you won find a privacy policy or terms of use anywhere on this site>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175404\/telehealth-issues-2026-04-689x465.jpg\" alt=\"\" title=\"telehealth-issues-2026-04.jpg\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\tA fake clinic website with a pretty convincing look. Scammers even created pages for \"medical staff\", \"departments\", and \"research\". However, for some reason, you won't find a privacy policy or terms of use anywhere on this site\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175407\/telehealth-issues-2026-05.png\" title=\"Another suspicious website offers AI diagnostics, asking for a ton of personal info: full name, phone number, email, requested medical services, medical history, and current medications\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175407\/telehealth-issues-2026-05-691x465.png\" alt=\"\" title=\"telehealth-issues-2026-05.png\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\tAnother suspicious website offers AI diagnostics, asking for a ton of personal info: full name, phone number, email, requested medical services, medical history, and current medications\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175412\/telehealth-issues-2026-06.png\" title=\"This scam site offers users \" visual health screening using ai all you have to do is upload photos of your tongue and eyes just a reminder: retinal scans are sometimes used for biometric authentication>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/07175412\/telehealth-issues-2026-06-689x465.png\" alt=\"\" title=\"telehealth-issues-2026-06.png\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\tThis scam site offers users \"visual health screening using AI\" \u2014 all you have to do is upload photos of your tongue and eyes! Just a reminder: retinal scans are sometimes used for biometric authentication\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<p>As a rule of thumb, fake clinic sites usually skip the privacy policy section, and bombard you with \u201ctoday only\u201d deals that seem too good to be true. That said, with the help of AI, creating a professional-looking site that\u2019s indistinguishable from the real thing is now a total breeze: you don\u2019t even need design skills or fluency in the victim\u2019s language. That\u2019s exactly why we recommend using <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">our comprehensive security suite<\/a>\u00a0\u2014 it\u2019s designed to sniff out spam, scams and phishing, and warn you about fake websites before you land on them.<\/p>\n<h2>Safety tips for telehealth patients<\/h2>\n<ul>\n<li><strong>Set up a dedicated email address for medical services.<\/strong> If this address leaks because a clinic gets hacked, it makes it much harder for scammers to track the rest of your digital life.<\/li>\n<li><strong>Avoid using Google, Apple, or social media sign-in for telehealth sites. <\/strong>Keeping things separate makes it way tougher to link your medical data to your personal accounts.<\/li>\n<li><strong>Double-check which platform is being used for your consultation.<\/strong> If the clinic suggests a call or chat through a standard messaging app, that\u2019s a red flag. A secure, encrypted patient portal provided by the clinic is significantly safer.<\/li>\n<li><strong>Never send medical documents via chat apps or social media.<\/strong> Always upload lab results, scans, and records through the clinic\u2019s official patient portal.<\/li>\n<li><strong>Use a unique, complex password for every account.<\/strong> Your government portal, clinic login, and doctor-booking app should each have a separate password. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0can generate and store all of them for you; it also regularly scans leak databases, and alerts you if any of your accounts are compromised.<\/li>\n<li><strong>Turn on two-factor authentication.<\/strong> Do this first of all for government services and medical organizations. We recommend using an authenticator app rather than SMS codes: it\u2019s more secure and totally anonymous. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0can help you out here, too.<\/li>\n<li><strong>Share only what\u2019s necessary.<\/strong> Don\u2019t feel obligated to fill out every optional field in medical apps or on websites. The less data a service stores, the less there is to leak.<\/li>\n<li><strong>Be careful about sharing health info on social media or in chat apps<\/strong>. Scammers love to exploit people when they\u2019re vulnerable. For instance, in 2024, hackers gained the trust of the XZ Utils developer who had publicly posted about burnout and depression. They convinced him to hand over control of his tool, which they then loaded with malicious code. Since XZ Utils <a href=\"https:\/\/www.kaspersky.com\/blog\/cve-2024-3094-vulnerability-backdoor\/50873\/\" target=\"_blank\" rel=\"noopener nofollow\">is used in tons of Linux systems and affects OpenSSH<\/a> (a protocol for remote server connections), the attack could have wrecked a huge chunk of the internet if it hadn\u2019t been caught in time.<\/li>\n<li><strong>Don\u2019t install telehealth apps from unknown developers.<\/strong> Check the reviews and take a minute to skim the privacy policy\u00a0\u2014 even major platforms might be sharing your data with third parties.<\/li>\n<li><strong>Keep an eye on your medical records.<\/strong> Strange prescriptions, doctor visits you never made, or meds you\u2019ve never heard of can all be signs that your account has been compromised.<\/li>\n<li><strong>Configure and regularly update your health gadgets.<\/strong> Fitness trackers, blood pressure monitors, smart scales, and <a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/52403\/\" target=\"_blank\" rel=\"noopener nofollow\">activity trackers<\/a> all send data to the web. Improper settings or unpatched vulnerabilities are an open door for data breaches.<\/li>\n<\/ul>\n<blockquote><p>What else you need to know about protecting your health online:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/mental-health-apps-issues-2026\/55395\/\" target=\"_blank\" rel=\"noopener nofollow\">Brain drain: vulnerabilities in mental health apps<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-remove-yourself-from-data-brokers-people-search-sites\/54209\/\" target=\"_blank\" rel=\"noopener nofollow\">Why data brokers build dossiers on you, and how to stop them doing so<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/chatbot-wrongful-death-cases\/55446\/\" target=\"_blank\" rel=\"noopener nofollow\">How chatting with a bot can lead to tragedy<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/reproductive-health-apps-privacy-and-security\/46570\/\" target=\"_blank\" rel=\"noopener nofollow\">Privacy in reproductive health apps<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/telehealth-report-2021\/43003\/\" target=\"_blank\" rel=\"noopener nofollow\">Five problems of telehealth<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Telehealth services and apps are blowing up in popularity right now, making the availability of medical services better than ever. But just how safe is telemedicine, and what kind of risks does it carry? <\/p>\n","protected":false},"author":2706,"featured_media":25429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1486],"tags":[893,1622,1183,1150,76,43,240,2876,783],"class_list":{"0":"post-25421","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"tag-health","10":"tag-healthcare","11":"tag-leaks","12":"tag-medicine","13":"tag-phishing","14":"tag-privacy","15":"tag-spam","16":"tag-telemedicine","17":"tag-tracking"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/telehealth-issues-2026\/25421\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/telehealth-issues-2026\/30371\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/telehealth-issues-2026\/30218\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/telehealth-issues-2026\/41651\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/telehealth-issues-2026\/55560\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/telehealth-issues-2026\/30487\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/telehealth-issues-2026\/36106\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/telehealth-issues-2026\/35758\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25421"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25421\/revisions"}],"predecessor-version":[{"id":25430,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25421\/revisions\/25430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25429"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}