This non-profit health organization began as a single, community-founded hospital in Newport News, Virginia. Since then, it has evolved into a flagship medical center with affiliates throughout the region.
All eyes are on Kelsey-Seybold as the first Accountable Care Organization in the US. Unfortunately, this also includes bad actors that want to impersonate their brand. The engineering team knew email was the number one way threats where getting in.
Carestream Health is a worldwide provider of medical and dental imaging systems and IT solutions; X-ray imaging systems for non-destructive testing; and advanced materials for the precision films and electronics markets.
The college of medicine is a renowned private health sciences university with activities spanning the full range of healthcare. Protecting academic, personal health, and proprietary research information is integral to the college’s operations and reputation.
Medstar Montgomery is using Proofpoint Email Protection, Targeted Attack Protection, Information Protection, and Email Encryption to increase accuracy of email threat detection and filtering, reduced incident remediation from up to 20 hours to less than 30 minutes, enhance security for sensitive data through automatic encryption, and gain control over email traffic and defense against email threats.
Perrigo is using Proofpoint Email Protection and Targeted Attack Protection to prevented outbreaks from threats such as phishing campaigns, ransomware, and other malware, limit risk from users potentially clicking on malicious URLs, and gain multilingual analysis to protect email communications around the world.
Akorn uses TAP to help it detect and stop advanced malware and credential phishing attacks. TAP typically stops 4,500–5,000 malicious emails per month, and Akorn hasn’t seen any recurrences of Cryptolocker.
The global threat environment continues to get more aggressive and sophisticated. PerkinElmer was seeing more fraudsters evade its spam and antivirus solutions and deliver email-based phishing attacks, spoofed emails, and malicious URLs.