2 min read

[Security Tip!] What's MFA and Why's It Important?

By Prime Care Tech Security Team on Thu, Oct 21, 2021 @ 08:45 AM

Maintaining a strong security posture means being vigilant and aware of threats and vulnerabilities across the vast IT spectrum. An additional security layer to consider is multi-factor authentication (MFA). MFA is also known as two-factor authentication (2FA).

If cyber insurance is in your plans, you should know more and more insurance carriers require organizations to implement MFA before issuing a policy. Depending on the carrier, MFA may be required for web-based mail, system login, or even devices.

What exactly is MFA?

Multi-factor authentication protects against hackers by ensuring digital users are who they say they are. Users must provide two or more pieces of evidence (or factors) to verify their identity to access an app or digital resource. There are three main types of MFA:

  1. Things only you know (knowledge), such as a password or PIN
  2. Things only you have (possession), such as a badge, fob, or smartphone
  3. Things only you are (inherence), or biometric details such as fingerprints, retina, or voice

MFA blends at least two separate factors to verify it's actually you requesting access to your data.

Why is MFA important?

It makes stealing information much harder for the average criminal. Because MFA requires one more piece of information, in addition to user ID and password, it's likely hackers will choose someone else to target. It is a simple but powerful way to add an extra protection layer so only authorized users can access your data.

How do I obtain MFA?

Two common and effective MFA options are to install/use a client app on mobile phones or a key fob. Both receive a random number generated at regular intervals, usually 60 seconds, for users to enter along with a user ID and password. Prime Care Tech partners with MFA vendors and would be happy to help you connect.

Conclusion

MFA strengthens your security posture, making hacking into user accounts much more arduous. Even with MFA installed, you should not let your guard down! It takes effort and vigilance on the part of all staff members, particularly when it comes to email phishing attempts. Every organization must build a human firewall to prevent compromises to your data and systems.

Topics: primeCLOUD cyber security cyber insurance MFA multi-factor authentication user identification password
1 min read

McKnight's Recaps Key Points from April Cyber Webinar

By Prime Care Tech Marketing on Fri, Apr 30, 2021 @ 01:51 PM

In an April 19 article, Ransomware ‘bull’s eye’ grows, clouding telehealth’s rise in long-term care, McKnight's Long-Care News recapped suggestions from Prime Care Tech's Mark Owens.

  • Providers pursue a multipronged approach to data protection, with a "modern and managed firewall" with:
    • Geo-blocking to limit access to out-of-area attackers
    • Access that is restricted to specific users and departments
    • Backups that are stored on separate servers in different locations.
  • Facilities require repeated employee training about IT security, keeping in mind the going rate for resale of medical records is about $250 per record.

Related resources:

Topics: Webinar cyber security cyber insurance ransomware mcknights ltc teleheath
1 min read

4/14 WEBINAR: SMB CYBER SECURITY ESSENTIALS WITH WILLIS TOWERS WATSON

By Prime Care Tech Marketing on Tue, Mar 16, 2021 @ 12:48 PM

Want to Avoid Cyber Sharks? Swim With The School.

Join Willis Towers Watson and Prime Care Tech for this April 14 webinar to get advice on cyber security essentials for small businesses.

Cost of cyber attacks

The cost of a cyber security event can be well into six figures – no matter what size your business is. The top causes...1) human error and 2) ransomware.

Industries impacted

The below industries reported the most cyber claims, but truly, any industry is vulnerable. 

  1. Healthcare
  2. IT and telecom
  3. Insurance
  4. Retail and wholesale
  5. Manufacturing

How can smaller businesses cost-effectively protect?

We've brought together experts in cyber insurance and technology to tell you. Here's our agenda:

  • Trending cyber risks
  • Introduction to cyber insurance
  • Must-have IT protection
  • Supplementing IT with cyber insurance

Webinar takeaways

Simple safeguards to reduce risk can include employee training, work laptop safety, safeguarding sensitive information, and cyber liability policies.

Get schooled on avoiding cyber sharks!

RSVP Today 
Topics: cyber security cyber insurance small business medium business SMB
1 min read

[On-Demand Webinar] 3-Prong Preparation Strategy for HIPAA Audits

By Prime Care Tech Marketing on Fri, Jan 18, 2019 @ 11:20 AM

If you missed our January 17 webinar with experts from HIPAA OneWillis Towers Watson and Prime Care Technologies, you can download the resources below. Our solution partners offered timely tips on performing a risk analysis and how cyber insurance and key technologies can help protect you.

Solution information:

Or if you're interested in an assessment...

GET IN TOUCH 

Topics: cybersecurity HIPAA compliance HIPAA One HIPAA One Risk Assessment Willis Towers Watson cyber insurance
1 min read

[Webinar] 3-Prong Preparation Strategy for HIPAA Audits

By Prime Care Tech Marketing on Thu, Dec 20, 2018 @ 07:34 AM

HIPAA Webinar AdJoin us January 17 with our experts from HIPAA One, Willis Towers Watson and Prime Care Technologies to ensure you are HIPAA compliant and audit-ready. Expect informative tips on: 

  • Conducting risk analysis
  • Leveraging cyber insurance
  • Employing key technologies

With the OCR promising harsher investigative tools to “hold bad actors accountable” and with reports of 2018 fines in the millions, you won't want to miss advice from our three HIPAA-savvy experts.

Register Now

 

 

Topics: cybersecurity HIPAA compliance HIPAA One HIPAA One Risk Assessment Willis Towers Watson cyber insurance

Featured

Posts by Tag

See all