Cybersecurity: 24/7/365

Blog

How to Set Up MFA at Your Medical Practice

How to Set Up MFA at Your Medical Practice
by 4MEDNET Team
February 23, 2026
Cybersecurity

In February 2024, hackers used stolen employee credentials to access a Change Healthcare portal that lacked multi-factor authentication. The result: 190 million patient records compromised — the largest healthcare data breach in US history. One missing MFA setting on one system caused billions in damages.

MFA blocks 99.9% of automated credential attacks. It is the single most effective security control you can deploy, and it costs little or nothing for most practices. Yet many small medical offices still haven't implemented it — or have deployed it only partially, leaving gaps that attackers exploit.

This guide walks you through setting up MFA across your practice, from choosing the right method to handling shared workstations and resistant staff.

Why MFA Is No Longer Optional

Stolen credentials are the top attack vector in healthcare. The Verizon 2025 Data Breach Investigations Report found that 31% of all breaches involve compromised credentials. In healthcare specifically, 79% of providers were targeted by email-based hacking attacks in 2024. The average healthcare breach costs $7.42 million.

Beyond the security case, MFA now affects two critical business concerns:

Cyber insurance. Every major carrier requires MFA for coverage. Coalition reports that 82% of denied claims involved organizations without proper MFA. If your application says MFA is deployed but it isn't, your claim gets denied when you need it most. See our cyber insurance buyer's guide for the full picture.

HIPAA compliance. Under the current rule, MFA is "addressable" — meaning you should implement it unless you can document a reasonable alternative. The proposed 2026 HIPAA Security Rule eliminates that distinction. MFA becomes flat-out required on every system that touches ePHI, with a compliance deadline of roughly 180 days after the final rule publishes.

Choose Your MFA Method

Not all MFA is equal. Here are your options, ranked from weakest to strongest:

SMS text codes (avoid as primary method). A one-time code sent to your phone via text. It works, but it's vulnerable to SIM-swapping attacks where an attacker convinces your carrier to port your number to their SIM card. Cyber insurers flag SMS-only MFA as a concern. Use it only as a backup, never as your sole method.

Authenticator apps (recommended starting point). Microsoft Authenticator, Google Authenticator, or Duo Mobile generate time-based codes on your phone that refresh every 30 seconds. Codes are created locally and never transmitted over a network, so they can't be intercepted like SMS. Free, works offline, and supported by nearly every system your practice uses.

Push notifications (fast and convenient). A login attempt triggers a notification on your phone — tap "Approve" to authenticate. Duo Push and Microsoft Authenticator both support this. It's faster than typing a code. The risk: "MFA fatigue" attacks where hackers flood you with push requests hoping you'll tap approve by accident. Enable number matching (the app shows a number you must confirm) to prevent this.

Hardware security keys (strongest, ideal for admin accounts). A physical USB or NFC device like a YubiKey ($29-$55 each) that generates cryptographic proof of presence. Cannot be phished remotely — an attacker would need the physical key. Use these for practice owners, office managers, and IT admin accounts.

Badge-tap or biometric (best for shared clinical workstations). RFID badge readers or fingerprint scanners attached to shared computers. Staff tap their badge or fingerprint to authenticate in under a second. The session locks when they walk away. Solutions like Imprivata and GateKeeper are built for this exact clinical workflow.

What Systems Need MFA

Every system that touches patient data needs MFA. Prioritize in this order:

Week 1 — Email and remote access. These are the most targeted entry points. Microsoft 365 includes MFA free on all plans via Security Defaults. Google Workspace includes 2-Step Verification on all plans. Enable and enforce for all users immediately. Also enable MFA on any VPN or remote desktop access — this is exactly what Change Healthcare missed.

Week 2 — EHR and patient portal. Epic supports TOTP authenticator apps and Duo integration. eClinicalWorks supports Google and Microsoft Authenticator via QR code enrollment. athenahealth supports SMS and authenticator apps. NextGen requires MFA with phone and email verification. Check your vendor's documentation — nearly all modern EHRs support MFA natively.

Week 3 — Billing, cloud storage, and admin accounts. Your RCM system, clearinghouse portals, OneDrive or Google Drive, and any IT admin consoles. Admin accounts are the highest-value targets — they should have the strongest MFA (hardware keys if possible).

Step-by-Step Setup

Microsoft 365 (Most Common for Medical Practices)

  1. Sign in to the Microsoft 365 admin center
  2. Go to Settings > Security & Privacy > Multifactor Authentication (or enable Security Defaults under Microsoft Entra ID)
  3. Security Defaults enforces MFA for all users via Microsoft Authenticator — no extra cost
  4. Have each staff member install Microsoft Authenticator on their phone
  5. On their next login, they'll scan a QR code to link their account

Google Workspace

  1. Sign in to the Google Admin console
  2. Go to Security > 2-Step Verification
  3. Enable "Allow users to turn on 2-Step Verification," then set Enforcement to "On"
  4. Give staff a one-week enrollment grace period
  5. Staff install Google Authenticator and link their account

EHR Systems

Contact your EHR vendor or hosting provider to enable MFA policies. For eClinicalWorks, it's in the admin settings — users scan a QR code with their authenticator app on first login. For Epic, your Community Connect host or hosting provider configures the MFA policy, and users enroll via authenticator app or Duo.

Solving the Shared Workstation Problem

Shared computers in exam rooms, nursing stations, and the front desk are the biggest MFA pain point in clinical settings. Clinicians authenticate dozens of times daily. Typing a six-digit code every time is impractical.

Here are the practical solutions, from simplest to best:

"Remember this device" for the shift. Configure MFA to trust a device for 8-12 hours. Staff authenticate with MFA once at shift start, then use only username and password for the rest of the day on that same machine. Not the most secure option, but a workable starting point.

YubiKey at the workstation. Attach a YubiKey to each shared computer. Users tap the key and enter a short PIN. The key stays at the station. Simpler and cheaper than badge readers — a YubiKey costs $29-$55 one time.

Fingerprint readers. USB fingerprint scanners ($50-$150 each) attached to shared workstations. Each staff member enrolls their fingerprint. Authentication takes less than a second. Cannot be shared, borrowed, or forgotten.

Badge-tap systems. RFID or Bluetooth badge readers that detect your employee badge. Tap plus PIN authenticates you. Walk away and the session locks. Solutions like Imprivata and GateKeeper support roaming EHR sessions — tap your badge at a new workstation and your EHR session follows you from the last one. This is the gold standard for clinical environments.

Handling Staff Resistance

You will get pushback. Here's how to handle the most common objections:

"It's too slow." Push notifications take one tap — under three seconds. Authenticator codes take under ten seconds. Frame it this way: MFA adds a few seconds per login. A ransomware attack shuts your practice down for days or weeks.

"I forgot my phone." Every user should configure two methods. Backup options: printed backup codes in a locked drawer, a hardware key on a keychain, or a secondary phone number. For Duo, users can receive a phone call as a fallback.

"I'm not tech-savvy." The authenticator app flow takes five minutes to learn. Create a one-page quick-reference card with screenshots. Train two or three "super users" in each department first — they help colleagues through enrollment.

"What if I get locked out?" Designate an MFA admin (office manager or IT contact) who can reset or bypass MFA in emergencies with identity verification. Document the lockout procedure so it doesn't become a fire drill.

Cost Breakdown

MFA is one of the least expensive security controls available:

  • Microsoft 365 Security Defaults: $0 — included with all M365 plans
  • Google Workspace 2-Step Verification: $0 — included with all plans
  • Duo Free: $0 for up to 10 users (push notifications, TOTP, unlimited apps)
  • Duo Essentials: $3/user/month for 11+ users
  • YubiKey Security Key: ~$29 each (one-time purchase)
  • YubiKey 5 NFC: ~$50-$55 each (recommended for admin accounts)

For a 15-person practice using Microsoft 365 Security Defaults plus two YubiKeys for the practice owner and IT admin, total additional cost is $110 one time and $0 per month. Even with Duo Essentials for everyone plus hardware keys, you're looking at $45/month plus $750 in keys — a fraction of what a single breach would cost.

Ten Mistakes to Avoid

  1. SMS-only MFA. Vulnerable to SIM-swapping. Use authenticator apps or hardware keys as primary.
  2. MFA on email but not on VPN. Attackers target the weakest link. Cover every system.
  3. No backup method. One lost phone shouldn't lock someone out for a day.
  4. Not revoking MFA when staff leave. Deactivate the account and the MFA enrollment within one hour of termination.
  5. Skipping admin accounts. These are the highest-value targets. They need the strongest MFA.
  6. Enabling but not enforcing. If MFA is optional, staff won't use it. Make it mandatory.
  7. Ignoring shared workstations. Don't disable MFA on shared computers — use badge-tap, biometric, or session persistence instead.
  8. No session timeouts. MFA at login doesn't help if the session stays open on an unattended computer. Set auto-lock after 2-5 minutes of inactivity.
  9. Thinking MFA makes you invincible. MFA blocks 99.9% of automated attacks, but determined attackers use MFA fatigue, token theft, and social engineering. Combine MFA with security awareness training and endpoint protection.
  10. Waiting for the HIPAA mandate. The proposed rule is expected mid-2026 with a 180-day compliance window. A calm, phased rollout now beats a panicked scramble later.

How 4MEDNET Helps

We deploy and manage MFA across your entire practice — EHR, email, VPN, billing, and cloud services — as part of our managed IT and cybersecurity services.

Managed IT: We handle MFA enrollment, configuration, backup methods, and ongoing user support so your staff doesn't need to troubleshoot authentication issues. We also manage patch management, endpoint protection, and monitoring — the other controls insurers and HIPAA require.

Cybersecurity: MFA is one layer. We add EDR, network segmentation, ransomware protection, and 24/7 threat monitoring to cover the gaps MFA alone can't address.

HIPAA Compliance: We document your MFA deployment as part of your HIPAA risk assessment and produce the evidence your cyber insurer needs during underwriting.

Check our pricing plans — every tier includes MFA deployment, management, and support.

Schedule a free consultation to get MFA deployed across your practice — before the next breach hits or the next insurance renewal arrives.

Tags:
Share:
Categories
  • Cybersecurity (12)
  • Managed IT (12)
  • AI & Automation (9)
  • HIPAA Compliance (7)
  • HIPAA (2)
Recent Posts
Popular Tags
HIPAACybersecurityManaged ITRansomwareComplianceEHRData BreachAI AutomationBackup & DR
4MEDNET
Need Help? We Are Here To Help You
Contact Us

Ready to secure your practice?
Schedule a free IT assessment today

Book Your Free IT Assessment