Apac
  • Home
  • CXO Insights
  • CIO Views
  • News
  • Conferences
  • Newsletter
  • Whitepapers
  • About us
Apac
  • Admired Tech

    Agile

    AI Healthcare

    Artificial Intelligence

    Augmented Reality

    Aviation

    Big Data

    Blockchain

    Cloud

    Cryptocurrency

    Cyber Security

    Digital Transformation

    Drone

    HPC

    Infrared

    Internet of Things

    Networking

    PropTech

    Remote Work

    Scheduling Software

    Simulation

    Startup

    Storage

    Wireless

  • Banking

    E-Commerce

    Education

    FinTech

    Food and Beverages

    Healthcare

    Insurance

    Legal

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • CISCO

    Microsoft

    Oracle

    Salesforce

    SAP

    ServiceNow

  • Business Intelligence

    CEM

    Cloud-based Planning

    Cognitive

    Compliance

    Contact Center

    Contact Tracing

    Contactless Payments

    Corporate Finance

    CRM

    Custom Software Development

    Data Center

    Enterprise Architecture

    Enterprise Communications

    Enterprise Contract Management

    Field Service

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Product Management

    RegTech

    Revenue Management

Menu
    • CISCO
    • Collaboration
    • Compliance
    • Contact Center
    • Healthcare
    • IT Service Management
    • Microsoft
    • Retail
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • News
    • Compliance
    Editor's Pick (1 - 4 of 8)
    left
    Welcoming Big Data Technology amidst Changes

    Darren Cockrel, CIO, Coyote Logistics

    Leveraging Compliance to Your Advantage

    Mark Bloom, Global CIO, Aegon

    Demystifying the Role of IT in Millennial Organizations

    Jeff Fithian, VP, Strategic Initiatives and CIO, Dynamic Materials Corporation

    Productivity and Security- Can you ever have both?

    Julie Cullivan, SVP, Business Operations & CIO, Fireeye

    Lessons Learned from a CIO

    John Miller, Vice President and CIO, American Textile Company

    Digital Transformation: Prerequisites for Success in the Insurance Industry

    Nicole Kellenberger, Global Eadmin Lead, Swiss RE and Sven Scandella, Head of ITP&C Business Management, Swiss RE

    Compliance in the Cloud

    Vasyl Nair, Chief Risk Officer, Mine Super & Louis Leung, Executive General Manager Group Risk and Compliance, Mine Super

    Lessons Learnt on Compliance and Culture Change

    Paula Cristina Spirandio, Compliance Manager, Gunvor Group

    right

    Fortifying Healthcare Facilities with 2FA

    By Apac CIO Outlook | Tuesday, August 11, 2020
    Tweet

    With an endless stream of hackers and cybercriminals around the globe finding new chinks in IT armor every day, and increasing numbers of digitized, sensitive information to plunder, it is essential for both individuals and businesses to reinforce their electronic locks. This is where two-factor authentication (2FA) steps up a covered entity’s game in security.

    Two-factor authentication is a security measure which authenticates individuals through two series of validation and security procedure. It is based on a combination of logical, physical, or biometric validation techniques which help secure a facility, service or product.

    The health insurance portability and accountability act (HIPAA) is federal legislation which lays ground rules and mandatory standards which have to be followed by hospitals, physicians, health plans, and other health providers with regard to safeguarding the Protected Health Information (PHI) of the patients. The sole purpose of the HIPAA password requirements is to limit unnecessary or inappropriate access to and disclosure of PHI. Authentication with two factors perfectly fulfills this requirement. An individual using a username and password to log into a database containing PHI must also insert a PIN code to confirm his identity, whether by SMS notification or push notification.

    Check Out: Top Healthcare Technology Companies

    A compromised password on its own will not give a hacker access to the secure database as a unique PIN code is issued with each login attempt. Before implementing two-factor authentication to protect PHI, the only aspect which needs to be remembered is that the reasons for implementing the alternative solution need to be documented because the HIPAA Password requirements are addressable safeguards. This will meet the HIPAA requirements for conducting a risk analysis and also satisfy auditors if HHS HIPAA audit program selects the covered entity to be investigated.

    Accessing password-protected accounts from secondary devices, due to keylogging malware, increases the risk of data breach. On mobile devices and computers, this type of malware runs undetected, secretly recording each keystroke in a file for a hacker to retrieve later. As this is a predictable risk to the security of PHI, covered entities must either introduce policies to limit users to the devices from which they can access password-protected accounts, or find an alternative to meet the requirements of HIPAA password.

    Two-factor authentication indeed plays a crucial role in enabling enterprises to meet the security rule parameters and maintain an ecosystem that is compliant with HIPAA.

    tag

    Healthcare Technology

    Weekly Brief

    loading
    Top 10 Cyber Security Service/Consulting Companies - 2020
    Top 10 Cyber Security  Companies - 2020

    Featured Vendors

    I-Sprint Innovations

    Dutch Ng, CEO

    HP

    Richard Bailey, President - Asia Pacific & Japan (APJ)

    ON THE DECK

    Cyber Security 2020

    Top Vendors

    Cyber Security 2019

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Key Cybersecurity Challenges in 2021

    Key Cybersecurity Challenges in 2021

    Unleashing the Potential of ERP Systems

    Unleashing the Potential of ERP Systems

    Cloud-Based AR/VR Technologies Transform the Retail Sector

    Cloud-Based AR/VR Technologies Transform the Retail Sector

    How Credible is Cloud Storage Security?

    How Credible is Cloud Storage Security?

    How Internet of Medical Things Changing the Facets of Healthcare

    How Internet of Medical Things Changing the Facets of Healthcare

    IoT and the Challenges it Faces

    IoT and the Challenges it Faces

    Loading...

    Copyright © 2021 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy  |  Sitemap |  Subscribe

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/fortifying-healthcare-facilities-with-2fa-nwid-6289.html