Prime Factors Blog

Gwen Fremonti

Recent Posts

Famous Data Breaches – and What They Cost

Posted by Gwen Fremonti on May 4, 2017 10:00:00 AM

While it's the largest data breaches that grab our attention, even smaller information security failures can have a big impact on a business, reducing its credibility, turning off current and potential clients, and making individuals far more vulnerable to fraud and identity theft.

In this article, we’ll look at some of the biggest data breaches ever and examine just how they affected the companies that were victimized. We’ll also answer other questions you might have about some of the biggest (and worst) information security incidents in recent history, such as: How much have the biggest breaches cost? How many customer or user accounts did they expose? How do they compare in size and scope to the Yahoo breach? Let’s find out.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, data breach, encryption keys

Navigating the Shifting Sands of Data Security and Compliance

Posted by Gwen Fremonti on Apr 25, 2017 10:00:00 AM

One thing that will never change about cyber security is that there will always be change. Protecting sensitive and private information in this age of digital hackers and scammers is more important than ever. Any organization can become a target, and the tools needed to fight the invaders must keep up; industry standards will be updated and new regulations will be added, and your business has to stay on top of all of it.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, encryption keys, PCI Compliance

Let's Talk Tokenization

Posted by Gwen Fremonti on Apr 18, 2017 10:00:00 AM

In our modern era of cyber-attacks and security breaches, the value of sensitive data detailing our financial transactions and personal lives is at a premium. From groceries to government, the threat of our potentially lucrative online existence being hijacked and sold to the highest bidder is foremost on the minds of both the public and digital security experts. And while it may sound counterintuitive, one of the safer data transfer processes could be one that attempts to render your valuable details completely worthless: tokenization. 

A marked shift toward tokenization has been underway since 2014, when EMVCo LLC  implemented specifications via EMV (Europay, MasterCard, and Visa). EMVCo's members also include Discover and American Express, so this change in how sensitive data is delivered and processed is set to become America's standard. It's not just financial data: everything from your driver's license, medical details, and voting profile all stand to benefit from being tokenized. So how does it work?

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, encryption keys

6 Statistics that will Help Make the Case for Encryption and Data Security to the C-Suite

Posted by Gwen Fremonti on Apr 11, 2017 3:33:34 PM

If you’re not taking an active role in encrypting and securing your company’s most sensitive data, you might as well be leaving the key to your corporate safe unlocked. In today’s digital world, our increasing reliance on technologies like corporate cloud computing and file storage systems, online banking, and virtual email servers are leaving many businesses significantly more vulnerable to cybercrime.

Despite the threat, not all executives understand just how dangerous cybercrime can be to their company’s bottom line; and whether you’re an IT manager or an outside consultant, you may need to convince them of the need to take data security precautions seriously. This shouldn’t be too difficult, considering that the average data breach costs an incredible $4 million. However, if that statistic doesn’t do the trick, here are five more that might:

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

Dropbox in Healthcare: What File Sharing Means for Patients

Posted by Gwen Fremonti on Mar 21, 2017 10:00:00 AM


Cloud sharing is on everyone’s mind, even though some people still don't really understand what it is. It often helps to put a brand name to these generic services, and Dropbox is one of the most recognizable names when it comes to identifying cloud service providers. Dropbox is used at businesses around the country as a way to gain access and edit files from one central, user-friendly place. Accounts can be activated and deactivated in line with the projects employees are working on, and larger file sizes can be shared without hassle between multiple people. 

While other services like Google docs promote many of the same services, Dropbox has won the loyalty of millions of people with its free and paid packages alike. Many who use Dropbox use it primarily as a means to pass administrative files back and forth, but healthcare professionals have long recognized the potential for improving the level of patient care too. As file sharing is likely to increase across non-affiliated hospitals in the coming years, it's worth understanding what that really means for PHI.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa