Despite the many 2FA options, the real problem healthcare organizations need to solve is how to defend against the use of stolen credentials without having to reduce security, or having to complicate user routines.
Healthcare organizations spend millions of dollars each year on traditional endpoint and network security, yet breaches still occur on a daily basis. In fact, 2015 was a banner year for healthcare hacks. The Cyber Security Act of 2015 was a strong response, placing increased pressure on healthcare organizations to implement better access control. Because compromised valid user credentials are used upwards of 60% of the time during attacks, the key to better security is to focus on the identity and treat that identity as the new security perimeter.
Findings show 74 percent of respondents who use two-factor authentication admit that they receive complaints
IRVINE, Calif. – Jan. 11, 2017 – SecureAuth® Corporation, the leader in adaptive access control, today announced the results of a survey that reveals challenges associated with two-factor authentication (2FA). Commissioned in conjunction with Amplitude Research, the responses surveyed 300 IT decision makers and cybersecurity professionals on industry perspectives and concerns with 2FA.
One of the largest challenges that organizations face when implementing multi-factor authentication is user adoption. Balancing user experience against security has always been a difficult task and seems to be getting harder every day for security organizations around the globe. One of the largest hits to multi-factor adoption has been against SMS (AKA Text Message) delivery of One-Time Passcodes.
At SecureAuth, we know that constant innovation is needed in security to stay ahead of the evolving threat landscape. Recently, we added some crucial features to our RADIUS server support: IP based threat detection, Geo-Location, and Geo-Velocity – all parts of SecureAuth adaptive authentication. The reason is simple, to stop attackers from using stolen credentials to access critical resources like a corporate VPN.
To understand why these features are crucial to a security strategy, let’s look a little deeper into the anatomy of an attack.
There’s a reason companies have hired us to strengthen security in the aftermath of some of the biggest breaches in history. We know how to implement strong defenses that stop and contain attacks while protecting IT budgets and delivering a ﬁrst-class user experience. Here are our recommendations for security best practices, as well as tips on how we build the most advanced security programs on the market.
Listen in as James Romer, Chief Security Architect - Europe, is interviewed by IP EXPO Live about SecureAuth. Romer quickly sums up our access control with adaptive authentication solution, "We make sure you are who you say you are - from wherever you are!"