Healthcare organizations must protect patient data. Yet, protecting devices only with passwords increases risk and frustrates users. Multi-factor authentication (MFA) can help.
Why Multi-Factor Authentication
MFA is the next level in device and identity protection and it supports regulatory compliance with the Health Insurance Portability and Accountability Act (HIPAA) — requiring entities to verify and authorize the identity of a person seeking access to electronic protected health information (PHI). MFA requires two or more layers of authentication, none of which need to be passwords. It can include any combination of PIN number, password, location, proximity of a phone or a biometric factor such as fingerprint or facial recognition.
Devices with integrated MFA features protect data and identities while improving the user experience. By passively authenticating users, you are making your organization much more secure, and reducing reliance on complex passwords.
How to Implement MFA?
Be careful about using authentication solutions that are not grounded in hardware. Many fingerprint readers or cameras you find in end user devices store the biometric data at the software layer in the OS, leaving them vulnerable to hacking.
With MFA based on hardware, it is much harder for malicious code to snoop and capture password data because its located deep in the silicon, isolated from the OS and applications.
MFA Features to Consider
Look for devices with Intel® vPro™ Technology, which includes Intel® Authenticate; this not only helps to enable hardware-level protection, but makes it easier for IT to mix and match identification factors such as the following:
- Facial Recognition: Infrared (IR) cameras are more secure than regular cameras for facial recognition. In addition, ThinkPad Glance utilizes face, eye and gaze-tracking to automatically lock a device if the user is not present.
- Fingerprints: Lenovo Match on Chip Fingerprint Reader (MoC FPR) stores biometric credentials on a separate chip, making it almost impossible to hack.
- PIN: Short numeric codes can be used alongside other authentication factors as part of an MFA solution.
- Consider the following as supplementary MFA factors:
- Phone Proximity: Users can pair their smartphone with their PC via Bluetooth and securely use the proximity of their phone as an authentication factor.
- Location: Use location-based services to determine if a user is in an expected location like their office.