<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;">In the third quarter of 2018 alone, <a href="https://www.healthcare-informatics.com/news-item/cybersecurity/44m-patient-records-breached-q3-2018-protenus-finds" rel="noopener" target="_blank">4.4 million</a> patient records were compromised across 117 disclosed health data breaches. This shows that health care continues to be targeted by criminals. The largest breach was UnityPoint, with 1.4 million records compromised.</p> <p style="text-align: left;"><!--more--><strong style="background-color: transparent;">Main Takeaways:</strong></p> <ul> <li>Attackers use relatively simple phishing tricks and look-a-like domains to trick employees into compromising themselves or disclosing credentials.</li> <li>It remains important for users to have good security awareness, but there are a multitude of ways to register a domain so it looks like something legitimate.</li> <li>Using threat intelligence, it is possible to see these domains being registered in the wild or being flagged because they attacked another organization. It is important to get this data into a system and block them instead of merely generate an alert after the compromise has already happened.</li> <li>Using DNS Firewalls, it is possible to make sure that when a user clicks on a known phishing domain, the DNS request fails and they do not go to the attackers website and further compromise your organization.</li> </ul> <p style="text-align: center;">Want to learn more about how DNS Firewalls protect against phishing and other attacks? Check out a quick, free demo of ThreatSTOP <a href="https://threatstop.com/solutions/threatstop-dns-firewall-overview"><em><strong>here</strong></em></a>.</p></span>