Adaptive authentication can help healthcare fight cybercrime

Adaptive authentication can help prevent cyberattacks and protect user identity

Adaptive authentication can help healthcare fight cybercrime

Just demanding two-factor authentication doesn’t go far enough, expert says.

May 16, 2017 - On the heels of the WannaCry ransomware assault, security experts around the globe are touting their cybersecurity best practices to help healthcare fight off cybercriminals.

2017 DBIR: Misuse of Stolen Credentials Unchecked, Out of Control

Verizon’s Data Breach Investigations Report outlines  the percentage of hacking related breaches has increased
Stephen Cox, Chief Security Architect


Verizon’s Data Breach Investigations Report (DBIR) has once again hit the streets with much fanfare. The 2017 report is Verizon’s tenth DBIR and details findings from over 42,000 security incidents analyzed by the company in 2016. As expected, the report is packed with information absolutely critical to the success of information security industry. 

Want to Improve ADFS Authentication? Just Add SecureAuth

Adaptive Multi-factor authentication protection layers
James Romer


Many organizations have already deployed and invested in an Active Directory Federation Services (ADFS) installation, providing basic authentication and access into cloud applications.

ADFS now supports limited MFA support via voice OTP, SMS OTP and Push to Accept technologies. This approach does provide a minimal approach to authentication, is it enough? The challenge is really bringing ADFS authentication up to world class levels, improving the ADFS authentication story, yet not having to replace ADFS.

Think Before You Accept – Attackers Exploit Popular ‘Push-to-Accept’ 2FA Method

Push to accept authentication vulnerability resolved by SecureAuth symbol to accept
Marc Miller, Sales Engineer


The general feeling by security analysts and specialists around user authentication is that two factor authentication alone is not enough to protect against the misuse of stolen credentials.  This is in part because many forms of second factor authentication can be exploited.

SecureAuth IdP

SecureAuth? IdP provides adaptive access control, empowering organizations to determine identities with confidence. Two-factor authentication is no longer enough to protect enterprise identities. Progressive companies are looking for next generation technologies to help them determine their varying identities with confidence and even prevent attackers with valid user credentials.

Best Practices Guide to Strong Identity Access Control for Healthcare

Despite the many 2FA options, the real problem healthcare organizations need to solve is how to defend against the use of stolen credentials without having to reduce security, or having to complicate user routines.

Download the guide below:

SecureAuth IdP Adaptive Access Control for Healthcare

Healthcare organizations spend millions of dollars each year on traditional endpoint and network security, yet breaches still occur on a daily basis. In fact, 2015 was a banner year for healthcare hacks. The Cyber Security Act of 2015 was a strong response, placing increased pressure on healthcare organizations to implement better access control. Because compromised valid user credentials are used upwards of 60% of the time during attacks, the key to better security is to focus on the identity and treat that identity as the new security perimeter.

IT Decision Makers Reveal Two-Factor Authentication Dislike and Rise in Adaptive Authentication Adoption

Rise in Adaptive Authentication Adoption


Findings show 74 percent of respondents who use two-factor authentication admit that they receive complaints

IRVINE, Calif. – Jan. 11, 2017 – SecureAuth® Corporation, the leader in adaptive access control, today announced the results of a survey that reveals challenges associated with two-factor authentication (2FA). Commissioned in conjunction with Amplitude Research, the responses surveyed 300 IT decision makers and cybersecurity professionals on industry perspectives and concerns with 2FA.