Why You Should Use MFA to MASSIVELY Save on Insurance Premiums for Your Business?
Carl Hughes • June 9, 2022

With the increasing rise of ransomware attacks on industries within education, government, construction and industry in 2022, it is no wonder that they are looking for new ways of trying to secure their digital and physical assets. The method they have their eyes on is MFA or multi-factor authentication. According to Okta’s 2021 State of Zero Trust Security Report, 85% of businesses worldwide are using an MFA solution for their employees with 19% using it for external users such as the general populace. This means that there are still many businesses who will need to use MFA to secure their entire presence as external users are being left unprotected.

As a result, insurance companies are noticeably adopting new standards that require MFA methods of login to avoid the issues relating to ransomware holding PII (Personally Identifiable Information) hostage.

Learn why ransomware attacks have become ubiquitous and why that should be a signal to adopt an MFA solution for your business.

Ransomware is costly.

The average cost of a ransom payment in 2021 was $220,298 with the loss ratio going from 44.8% to 67.8% from 2019 to 2020. Hackers use this as a means to make money while requiring the business to pay for a decryption key. Many of these companies are targeted based off their willingness to pay the ransom rather than the quantity of PII that they have stored.

So, how can you use MFA to prevent this large loss of financial capital from your business?

Introducing MFA

MFA or multi-factor authentication is a method of computer or application login using multiple types of authentication methods.

There are three important concepts that you must understand about MFA.

They are based off:

  • Something that you know
  • Something you have
  • Something that you are

When thinking about something that you know , you should think of a password or PIN which you might write down on a Post-it note or hopefully, use a password manager for. These are the most common forms of authentication that are out there and have issues with security. Much of the attacks that are seen in the world today have to do with password cracking given their ubiquity on all the website that you try to access. PINS are common when confirming a credit or debit card transaction at the store or the ATM. Your credit/debit card is one form of identification while the other is the PIN that you type in on the PIN pad reader. You may also have seen PINS being used with physical access controls (PACS) such as doors. A PACS device that we carry for example, the Identiv SPR332v2 PIN Pad Reader is an example of that.

The Identiv SPR332 PIN Pad Reader is an example of how pin pads are used in the context of reading credit/debit cards.

Something that you have is similar to a smart card which you carry in the form of an ID badge for work or a credit/debit card. You are to insert this or wave it in front of the smart card reader that you have in order to authenticate yourself. It could also come in the form of a security key such as the Identiv FIDO 2 Security Key which we carry. This is great for authenticating yourself into online accounts such as Google, DropBox and even eBay thanks to their support of the FIDO standards. Feel free to read more about what the FIDO Alliance means and how that will change the way that we login into online accounts in the future.

The Identiv uTrust FIDO2 Security Token is useful in all situations where online account login is needed in addition to a password.

READ MORE ABOUT HOW TO USE THIS KEY!

Something that you are includes biometrics such as your fingerprint, iris or finger vein. You are the only person that has each of these unique characteristics. No two fingerprints and finger veins are alike. We actually have written a lot about finger vein authentication in the past with regards to the Hitachi H-1 Finger Vein Scanner (Check out those blog posts!) with a nearly impenetrable authentication method thanks to the uniqueness and internal nature of finger veins. We have many other biometric types of reader for both mobile and desktop usage from companies such as SecuGen ( SecuGen Hamster Pro Duo CL USB Fingerprint Reader ) and Identos ( Identos Tactivo mini Smart Card Reader and Optical Sensor Fingerprint Scanner ).

The SecuGen Hamster Pro Duo CL USB Fingerprint Reader is reliable, durable, secure and supportive of smart card applications.

So, multi-factor authentication is certainly not a new solution or one that is only now being tested as the U.S. federal government has required it for all their agencies. Certain laws have also been passed in New York State from their New York Department of Financial Services along with the NAIC (National Association of Insurance Commissioners) and their Insurance Data Security Model Law. So, using MFA is understood to be quite a viable solution in the government’s eyes.

To implement MFA technology, take a look at below at one of the best solutions that we have to offer.

Who is Tx Systems?

We are a licensed distributor within the smart card industry for large manufacturers such as ACS, HID and Identiv. We offer a wide variety of both contact and contactless readers and have a selection of NFC readers for NFC tag applications. In addition to hardware, we also offer software solutions such as  Open Domain Sphinx  and  Access Smart PowerLogOn.

We are a  Platinum Partner of HID’s smart card readers and software solutions  which include  HID Digital PersonaHID ActivClient  along with well-known smart card readers such as the  HID OMNIKEY 3021  and the  3121.

You can trust that we will do a fantastic job with implementing HID’s solutions into your workplace.

Tx Systems is a trusted Platinum Partner for HID Global hardware and software meaning your order of DigitalPersona is legitimate and secure.

What are Cyber Insurance Companies?

You more than likely have some form of insurance for your business such as disaster insurance and employee liability insurance, and you also know that there are certain requirements that you must meet in order to qualify for these plans whether that be a certain number of employees or even the dollar amount of coverage that you are required to get.

However, given the large-scale ransomware attacks that have occurred, you may be required to adopt MFA technology for your business.

So be aware that given these recent events that insurance companies are looking for ways to cut their losses and this may include increasing premiums. They are becoming much more aware of concerns that come with certain industry classes, durations, risk size and offer limits. So, if you are in some of the hardest hit industries such as education, industrial services­­ education, government entities, healthcare, construction and manufacturing , you will need to adopt an MFA method in order to avoid paying higher insurance premiums or not being issued an insurance policy whatsoever .

Pexels.com

" data-medium-file="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-257700.jpeg?w=300" data-large-file="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-257700.jpeg?w=646" src="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-257700.jpeg" alt="" class="wp-image-2562" id="1832146154" onerror="handleImageLoadError(this)"/>
If you are in one of the hardest hit ransomware industries then you should be prepared to face scrutiny when applying or renewing your insurance. Be proactive and start adopting MFA technology for your business today!
Photo by Pixabay on Pexels.com

These industries are facing more issues with capacity and are having to deal with many insurers at once , so this will be another consequence that you may have to deal with when applying or renewing your insurance policy.

This also means that these underwriters or agents will be asking much in-depth questions about your security practices at your office and when interacting with clients. These may be around:

Learn more about how insurance companies are changing their requirements for businesses and their security stances to protect against the threat of ransomware attacks.

So, be sure to keep this in mind when you try to access policy information. There might also be clauses to specifically address not covering ransomware losses because of how big they can become. Just, make sure that they cover issues relating to business downtime when you are spending the time solving the problem and cleaning up the mess afterwards.

So, do not be surprised about all the new questions and concerns that come up.

*BE ON THE LOOKOUT! *

[Policies may include clauses that do not cover issues relating to ransomware losses to prevent insurance companies from being on the hook for a large number of expenses. Business interruptions may also be included within the policy.]

So, What is the Big Deal About Ransomware Attacks?

Ransomware has always been an issue but was put in the spotlight in 2020 because of government policies aimed at forcing employees to work from home. This left corporate hardware and software in the hands of employees who may not have had the securest set-up at their home offices. Attackers saw this as a prime target for their methods and went straight ahead on the attack.

Multiple companies have fallen prey to this form of hacking such as Colonial Pipeline, JBS Meats and SolarWinds which were widely mentioned in many news outlets across the country which involves stealing data and using that as a means to garnish money that a company has. Usually, this involves paying for a decryption key that allows for access to the data that was taken.

Pexels.com

" data-medium-file="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-8964873.jpeg?w=225" data-large-file="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-8964873.jpeg?w=646" src="https://txsystemssolutions.files.wordpress.com/2022/06/pexels-photo-8964873.jpeg" alt="" class="wp-image-2565 size-full" id="1409515936" onerror="handleImageLoadError(this)"/>

Colonial Pipeline based in Georgia was a large pipeline that was attacked by ransomware in 2021.


READ MORE ABOUT IT ON OUR PREVIOUS BLOG POST

That is why you need a software solution that will protect not only your assets but will show to the company that you are working with for insurance that you know what you are talking about. Your premiums will diminish, and you will maintain the relationship that you build with your account manager. You can also slow down the efforts of a hacker who will have to do twice the effort in order to get the same reward that they could get with a password-only setup. So, they will stop before they even start.

How Does HID DigitalPersona Help You with Using MFA to Secure an Ideal Insurance Premium?

HID Global is a powerhouse when it comes to cybersecurity software and hardware.

HID’s DigitalPersona is a Windows-based online solution (Windows 8.1 or higher for clients) (Windows Server 2012 R2 or higher for servers) that will allow you to integrate your cloud or server-based applications with new methods of authentication such as with:

  • OTP (HID ActivID Mini Token) * Various types are available . With DigitalPersona, you have the ability to login to your Windows PC and supported web applications with methods such as:
  • Mobile-based push apps (DUO)
  • Smart Cards ( Crescendo 2300 Smart Card ) thanks to its support of FIDO2 authentication
  • Security keys ( Identiv FIDO2 Security Key ) thanks to its support of FIDO2 authentication ( HID Crescendo FIDO Key and YubiKey)
  • Risk- and context-based methods (Google)
  • Biometrics ( SecuGen Hamster Pro 30 ) thanks to its support of ADFS integration allows for biometric authentication (Face/Fingerprint)
Get a feel for how DigitalPersona would work for your business when trying to adopt an MFA solution.

We offer many hardware devices that will support these types of methods from not only HID but also companies such as ACS and Identiv which are both trusted in their fields. So, take a look at our selection of hardware for logging into your account with your traditional password.

It is made for real-time monitoring and maintaining of hardware.

If you have Windows Active Directory, Azure or LDS (Light Directory Service) set up on your workplace network then you are in luck because it integrates with those services for a seamless experience with the apps that you use most. Its single dashboard allows for a SSO or Single-Sign On into the apps that you use the most along with SAML-supported applications that allow for online account access which is thanks to the Access Management API, OpenID Connect, WS-Fed protocols.

To learn more about SAML-supported apps, see :

AND, don’t get rid of that Prox card system just yet though as you can use a proximity card with HID Digital Persona to be able to login to your apps as well. If you need a smart card reader to go with that then you can try the HID OMNIKEY 5025 CL ID Badge Smart Card Reader that supports both Prox and smart card formats.

The HID OMNIKEY 5025 supports both PROX and smart card applications allowing you to integrate PROX for logical computer access.

If you are looking for additional features, there are multiple configurations that are available of Digital Persona that support your specific needs with your business. If you need something much more robust then look for the Premium Edition which includes more features such as password management and the ability to secure all your business’ applications, systems and networks. There are also features such as SSO (SAML), Access Management API and Password Management Modules to login to online accounts in one integrated online dashboard.

It is also great for Windows login which can support up to three credentialing methods (3FA or three-factor authentication) for an added layer of security. So, for example, you could have a password then a smart card and a security key prompt in order to login to your computer. This is ideal for industries that are highly regulated as finance or even scientific research & development. It also allows for the self-enrollment of credentials and authentication policy enforcement that are based on time-based, velocity and location parameters.

Overall, the main takeaways about HID’s DigitalPersona is that it is easy-to-use, works straight out of the box without need for additional software, supports multiple workstations and offers strong protection .

We also offer more MFA methods beyond DigitalPersona including:

Where Can I Find Out More About DigitalPersona?

So, if you want to keep your business protected by your insurance and remove the high premiums that will decidedly come with the lack of MFA technology then Tx Systems has your back.

You can book a demo with us here where you can set up a call to see just how powerful DigitalPersona will be for your business. These calls are FREE and should not take too much of your time. Feel free to ask any more questions through our email at sales@txsystems.com or 858-622-2004, and we would be happy to provide the best solution for your business.

By Kate Bennett February 12, 2025
Updates to HID's Credential Management System
By Kate Bennett January 31, 2025
FIDO2 with ENTRA ID
By Kate Bennett December 12, 2024
A Strong Dosage of RFID Protects Healthcare Organizations
More Posts
Share by: