Between all the firewalls, vulnerability testing, automated identification and response to security events, and encryption everywhere, Collaborate does a lot to keep client data secure.

Unfortunately, passwords themselves remain inherently insecure (experts believe they’re to blame for the vast majority of all data breaches). To address this problem, we’ve added an additional layer of security to Collaborate: Multi-Factor Authentication, or MFA.

The Verizon Data Breach Investigations Report (DBIR) found that passwords account for 81 percent of data breaches.

MFA greatly reduces the chances of unauthorized access to your Collaborate implementation. It requires an additional “factor” - in this case, a one-time use code generated by your mobile device, and synced to the server - to authenticate a user login. This means that a hacker would not only need to know your Username and Password, but also have access to your mobile phone or tablet, in order to login to your account.

How MFA Works in Collaborate

Once MFA is activated by an administrator, each user goes through a quick setup that pairs their Collaborate account with their mobile device. From then on, logging into Collaborate remains a simple, straightforward process.

collaborate login

collaborate mfa

collaborate check

Logging in with MFA
  1. Submit your Username and Password on the Collaborate login screen,
  2. Check your mobile device for a one-time use code in the the Google Authenticator app, and enter the code into Collaborate.
  3. That’s it! You’re now logged into your Collaborate account.

To help maintain a secure environment, users are required to re-authorize with MFA once per day.

What’s Next for MFA

MFA is gaining widespread adoption across many industries. Since it’s significantly more secure than a password alone, you should enable it in all accounts where it’s offered.

“You should use MFA whenever possible, especially when it comes to your most sensitive data…”

nist headshot Multi-factor authentication
National Institute of Standards and Technology

In the near future, many organizations that store sensitive info - such as protected health information (PHI) - will likely be required through federal, state, or local regulations to use MFA.

We hope you’ll join us in embracing better security through Multi-Factor Authentication, and if you have any questions, we’re here to help.