Defense in Depth Strategies to Mitigate Data Breaches

Sep 13, 2017

The 2017 Data Breach Investigations Report from Verizon recently found that cyberespionage and ransomware attacks are on the rise. The report found that ransomware attacks have increased by 50 percent since last year and organized criminal groups have even escalated their use of ransomware to extort money from victims.

It comes as no surprise that financial services and healthcare organizations are among the top industries targeted. A report from the Identity Theft Resource Center (ITRC) and CyberScout showed that the majority of healthcare data breaches are attributed to hacking and IT incidents, while unauthorized access to PHI is reported as the second largest threat to healthcare data.

As we know, with the ever-evolving digital environment comes an overwhelming amount of risk and, unfortunately, there is no guarantee that your healthcare, financial, legal, insurance, or enterprise organization won’t be targeted. However, to mitigate security threats and ensure your organization’s data remains protected, etherFAX has implemented the following defense in depth strategies:

Two-Factor Authentication

Reports show that stolen and/or weak passwords attribute to 81 percent of hacking-related breaches. This is why etherFAX requires all employees, resellers, integrators, and customers to utilize two-factor authentication when accessing the etherFAX portals. To maintain the highest possible security, etherFAX uses Google Authenticator which requires a second step of verification upon sign in.

Advanced Encryption

Encrypting sensitive data renders it useless in the event that hackers successfully breach your organization’s network. etherFAX utilizes military-grade encryption to ensure all communications remain secure between remote client sites and the etherFAX network.

In-Network Routing

The etherFAX Secure Exchange Network (SEN) is the world's largest ecosystem with a total of six million connected endpoints. etherFAX SEN supports every major fax server, application and fax-enabled device. With the ability to route documents to other etherFAX peers within the etherFAX network, sensitive data is never transmitted through an external telephone network.

Monitoring and Support

etherFAX’s entire network and data center operations have been built with multiple layers of redundancy to ensure reliability, performance and uptime. Additionally, our global team and strategically located data centers in North America, Europe, and Asia continuously monitor events around the clock to ensure that all transmissions remain secure. etherFAX Disaster Recovery (DR) guarantees uptime when existing telephony equipment fails due to technical failures, catastrophic events or natural disasters.

Protecting business-critical documents and patient health information is a top priority for etherFAX. Our network is engineered with two-factor authentication, advanced encryption, in-network routing, disaster recovery and monitoring for 100% secure communications. To learn more about our defense in depth technology and secure fax solutions, contact us here.

Select News