Prime Factors Blog

Pete Flagella

Find me on:

Recent Posts

Effective Data Security Solutions Balance Security Needs While Optimizing User Experience

Posted by Pete Flagella on Apr 20, 2017 10:00:00 AM

When it comes to deciding how, when, and what to secure and encrypt, companies face a variety of difficult choices – and one of them is whether to prioritize system security or to emphasize ease of use for employees. In many cases, making the right trade-offs between security and usability can be tough; some systems and protocols are highly usable, but not very safe, while others are highly safe, but very difficult to use. Organizations need to find solutions that consistently strike an effective balance between the two.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

Stay Adaptable, Stay Safe: How Encryption Key Management Can Thwart Hackers

Posted by Pete Flagella on Apr 13, 2017 10:00:00 AM

While you likely would never give your house keys to a stranger, many of us are doing this when it comes to securing important information online. Many applications that we use every day allow third-party providers to access our data, and it can be difficult to know if these providers are properly securing this information. By adding encryption key management to your current security procedures, you can use apps without worrying about compromising private data.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

How HSMs Keep a Massive Number of Encryption Keys Secure and Usable

Posted by Pete Flagella on Apr 4, 2017 10:00:00 AM


Hardware Security Modules, also known as HSMs, are physical computing devices that protect digital encryption keys that are used to provide strong authentication for data. Strong authentication is needed for processing information in a variety of secure functions, especially in banking and financial services, where access to accounts must be accurately, quickly, and securely linked to the proper person or business in order to prevent hacking, theft, and other cybercrimes.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

What a Full-Service Encryption Tool Looks Like

Posted by Pete Flagella on Mar 28, 2017 10:00:00 AM


Businesses are typically concerned with hiring employees, securing additional office space, growing revenue, generating sales, and other metrics that directly translate into a better bottom line. This focus sometimes overlooks proactively addressing other aspects of corporate strategy that have less obvious but crucial ROI, like effective cybersecurity. And often the most effective (and cost-effective) way to secure data is through encryption.

Encryption is the process of modifying data to make it unreadable to everyone except authorized users. It can help organizations protect critical data from a range of potential threats, many of which can directly and sometimes catastrophically impact revenue. Businesses typically use encryption to protect customer data, personal information, trade secrets, tax information, employee files, credit card information and ultimately, their brand and the trust of their customers.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Potential HIPAA Changes in 2017

Posted by Pete Flagella on Mar 14, 2017 10:00:00 AM


A new government means new priorities and agendas — which can lead to new compliance rules that you'll inevitably need to learn. These changes can throw a company into chaos as everyone struggles to decide upon the straightest line from current policies to better security. Understanding more about the political, economic, and tech climate can make these changes easier to digest.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

What Does Fraud Look Like in the EMV Era?

Posted by Pete Flagella on Mar 7, 2017 10:00:00 AM


The sad truth of life is that criminals will never be completely thwarted when it comes to achieving their goals. No matter how sophisticated safety techniques are, there is always someone ready to challenge them. EMV chips have been hailed as the new way to reduce fraud, but while it's making it harder on criminals, hackers are still finding ways to apply their talents to this new form of payment. We'll take you through what EMV fraud looks like at the stores, on the internet, and at the ATM.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, EMV

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

Leadership Tips for CIOs Needing to Push Security

Posted by Pete Flagella on Feb 23, 2017 10:00:00 AM


CIOs are likely seen as the leader of the IT department, as opposed to an executive leader of the entire company. Most IT team members tend to keep to themselves and complete tickets as they arise, but this is a fatal flaw when it comes to the well-being of the company. The CIO has to be as integral to the company's direction as any member of the executive team — especially when it comes to security measures. By taking a passive role, a CIO can cripple a company's security and technology vision. Leadership in this case can't be a show of force, but rather a show of support and passion. It may be the only way to get better security approved and implemented.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

A Year in Review: Breaches in 2016

Posted by Pete Flagella on Feb 16, 2017 10:00:00 AM


In just one year, hackers and outsiders gained access to billions of records across the world. This is an astonishing, record-breaking achievement that only a criminal could celebrate. The top 10 breaches of the year comprised the vast majority of these records, making certain leaks more destructive than others. The numbers of hacks and breaches exposing more than 10 million records appears to have jumped substantially from past years, which means that the stakes for better security are even higher for 2017. 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

The Surprising Aftermath of Data Breaches

Posted by Pete Flagella on Oct 20, 2016 10:00:00 AM


Data breaches get a lot of press when reporters first get word of them, but the stories tend to drop off quickly unless the public spurs them on. It doesn't help that these stories are brought to you by people who often don't understand the exact nature of the breaches or their true consequences. Since reporting guides everyone's impression as to causes and consequences, it may be time to bring you more information about what happens after a breach.

 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach