In the third quarter of 2018 alone, 4.4 million patient records were compromised across 117 disclosed health data breaches. This shows that health care continues to be targeted by criminals. The largest breach was UnityPoint, with 1.4 million records compromised.
- Attackers use relatively simple phishing tricks and look-a-like domains to trick employees into compromising themselves or disclosing credentials.
- It remains important for users to have good security awareness, but there are a multitude of ways to register a domain so it looks like something legitimate.
- Using threat intelligence, it is possible to see these domains being registered in the wild or being flagged because they attacked another organization. It is important to get this data into a system and block them instead of merely generate an alert after the compromise has already happened.
- Using DNS Firewalls, it is possible to make sure that when a user clicks on a known phishing domain, the DNS request fails and they do not go to the attackers website and further compromise your organization.
Want to learn more about how DNS Firewalls protect against phishing and other attacks? Check out a quick, free demo of ThreatSTOP here.