Multi-Walled Protection Implementation
Supplementary Layers for Higher Security
In order to really make sure that someone is who they claim to be, it's also possible to implement additional layers of security. An example is to require a user to provide an answer to a random security question that has a reasonable number of characters in the answer. Finally, one of the more common ways to secure access even further is by requiring the user to complete a multi-factor authentication.
This can be accomplished on a per machine basis where once a device is recognized upon user login, that device signature gets stored in the application. This enables the medical billing portal to recognize that the right user is signing in from a familiar device. But whenever a new device is used, the system will require a multi-factor authentication to be completed before authorization can be granted. From a data safety perspective, the device signature concept elevates the overall security of the medical billing portal.
This practice can be extended to include the IP address of the user. If the administrator carries a laptop, the IP address in the office is going to be different than their IP when working from home. We may want to force users to re-authenticate when their IP address changes. Administrative users can be asked to complete a secondary authentication form for a different signature assignment to the new IP address.
Based on the administrator's preferences, that could just be an email or a text message with a security code that users have to enter within a certain amount of time (typically 10 or 15 minutes from receipt of the attempt to log in). The system would need to send that email or text to the administrative user, and in turn the user would need to provide that information for successful authentication.