This summer, phishing attacks continued to hammer healthcare.
Florida: Compromised email accounts, at last count 73, were used to send a phish which led to a breach at NCH Healthcare.1
Ohio: Eye Care Associates was hit with ransomware. The regional eye care provider’s systems were locked for several weeks. 2
New York: In the biggest healthcare breach so far in 2019, American Medical Collection Agency was breached to the tune of 25 million patient records. While phishing hasn’t been positively identified as the culprit, it’s high on the suspect list.3
Need Phishing Defense Resources? Start Here.
To help healthcare companies better defend against phishing, CofenseTM maintains a healthcare hub with information and solutions including:
Case Study: Getting Creative to Stop Attacks
After getting targeted by a credential phishing attack, one healthcare company got serious about phishing awareness and response. They turned to Cofense to help educate users to report suspicious emails.
Now the reporting rate is 3-7 times higher than the susceptibility rate. Even better: employees are reporting real phish that security teams are stopping faster, including credential harvesting phish, malicious URLs, and malware campaigns.
Infographic: 5 Ways Healthcare Can Beat Phishing
At the heart of these 5 tips: educate users to report phishing and benchmark your success.
Our infographic shows that healthcare companies have made progress in email reporting, but still lag behind other industries. View exclusive Cofense data that shows where healthcare stands, plus best practices and some newer phishing tactics to watch for.
More Healthcare Content + Cofense Solutions
Watch a short video of a healthcare executive discussing how he trains users to spot phishing. Read blogs on healthcare security awareness, incident response, and how another healthcare company stopped a phishing attack in 19 minutes.
Plus, learn how Cofense solutions can protect your healthcare company from the inbox to the SOC.
Check out our healthcare hub now.
- HIPAA Journal, September 2, 2019
- Healthcare IT Security, August 15, 2019
- Ibid, July 23, 2019
All third-party trademarks referenced by Cofense whether in logo form, name form or product form, or otherwise, remain the property of their respective holders, and use of these trademarks in no way indicates any relationship between Cofense and the holders of the trademarks. Any observations contained in this blog regarding circumvention of end point protections are based on observations at a point in time based on a specific set of system configurations. Subsequent updates or different configurations may be effective at stopping these or similar threats.