Prime Factors Blog

Stay Adaptable, Stay Safe: How Encryption Key Management Can Thwart Hackers

Posted by Pete Flagella on Apr 13, 2017 10:00:00 AM

While you likely would never give your house keys to a stranger, many of us are doing this when it comes to securing important information online. Many applications that we use every day allow third-party providers to access our data, and it can be difficult to know if these providers are properly securing this information. By adding encryption key management to your current security procedures, you can use apps without worrying about compromising private data.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

6 Statistics that will Help Make the Case for Encryption and Data Security to the C-Suite

Posted by Gwen Fremonti on Apr 11, 2017 3:33:34 PM

If you’re not taking an active role in encrypting and securing your company’s most sensitive data, you might as well be leaving the key to your corporate safe unlocked. In today’s digital world, our increasing reliance on technologies like corporate cloud computing and file storage systems, online banking, and virtual email servers are leaving many businesses significantly more vulnerable to cybercrime.

Despite the threat, not all executives understand just how dangerous cybercrime can be to their company’s bottom line; and whether you’re an IT manager or an outside consultant, you may need to convince them of the need to take data security precautions seriously. This shouldn’t be too difficult, considering that the average data breach costs an incredible $4 million. However, if that statistic doesn’t do the trick, here are five more that might:

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

How HSMs Keep a Massive Number of Encryption Keys Secure and Usable

Posted by Pete Flagella on Apr 4, 2017 10:00:00 AM


Hardware Security Modules, also known as HSMs, are physical computing devices that protect digital encryption keys that are used to provide strong authentication for data. Strong authentication is needed for processing information in a variety of secure functions, especially in banking and financial services, where access to accounts must be accurately, quickly, and securely linked to the proper person or business in order to prevent hacking, theft, and other cybercrimes.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

What a Full-Service Encryption Tool Looks Like

Posted by Pete Flagella on Mar 28, 2017 10:00:00 AM


Businesses are typically concerned with hiring employees, securing additional office space, growing revenue, generating sales, and other metrics that directly translate into a better bottom line. This focus sometimes overlooks proactively addressing other aspects of corporate strategy that have less obvious but crucial ROI, like effective cybersecurity. And often the most effective (and cost-effective) way to secure data is through encryption.

Encryption is the process of modifying data to make it unreadable to everyone except authorized users. It can help organizations protect critical data from a range of potential threats, many of which can directly and sometimes catastrophically impact revenue. Businesses typically use encryption to protect customer data, personal information, trade secrets, tax information, employee files, credit card information and ultimately, their brand and the trust of their customers.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Dropbox in Healthcare: What File Sharing Means for Patients

Posted by Gwen Fremonti on Mar 21, 2017 10:00:00 AM


Cloud sharing is on everyone’s mind, even though some people still don't really understand what it is. It often helps to put a brand name to these generic services, and Dropbox is one of the most recognizable names when it comes to identifying cloud service providers. Dropbox is used at businesses around the country as a way to gain access and edit files from one central, user-friendly place. Accounts can be activated and deactivated in line with the projects employees are working on, and larger file sizes can be shared without hassle between multiple people. 

While other services like Google docs promote many of the same services, Dropbox has won the loyalty of millions of people with its free and paid packages alike. Many who use Dropbox use it primarily as a means to pass administrative files back and forth, but healthcare professionals have long recognized the potential for improving the level of patient care too. As file sharing is likely to increase across non-affiliated hospitals in the coming years, it's worth understanding what that really means for PHI.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Potential HIPAA Changes in 2017

Posted by Pete Flagella on Mar 14, 2017 10:00:00 AM


A new government means new priorities and agendas — which can lead to new compliance rules that you'll inevitably need to learn. These changes can throw a company into chaos as everyone struggles to decide upon the straightest line from current policies to better security. Understanding more about the political, economic, and tech climate can make these changes easier to digest.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

What Does Fraud Look Like in the EMV Era?

Posted by Pete Flagella on Mar 7, 2017 10:00:00 AM


The sad truth of life is that criminals will never be completely thwarted when it comes to achieving their goals. No matter how sophisticated safety techniques are, there is always someone ready to challenge them. EMV chips have been hailed as the new way to reduce fraud, but while it's making it harder on criminals, hackers are still finding ways to apply their talents to this new form of payment. We'll take you through what EMV fraud looks like at the stores, on the internet, and at the ATM.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, EMV

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

Leadership Tips for CIOs Needing to Push Security

Posted by Pete Flagella on Feb 23, 2017 10:00:00 AM


CIOs are likely seen as the leader of the IT department, as opposed to an executive leader of the entire company. Most IT team members tend to keep to themselves and complete tickets as they arise, but this is a fatal flaw when it comes to the well-being of the company. The CIO has to be as integral to the company's direction as any member of the executive team — especially when it comes to security measures. By taking a passive role, a CIO can cripple a company's security and technology vision. Leadership in this case can't be a show of force, but rather a show of support and passion. It may be the only way to get better security approved and implemented.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

A Year in Review: Breaches in 2016

Posted by Pete Flagella on Feb 16, 2017 10:00:00 AM


In just one year, hackers and outsiders gained access to billions of records across the world. This is an astonishing, record-breaking achievement that only a criminal could celebrate. The top 10 breaches of the year comprised the vast majority of these records, making certain leaks more destructive than others. The numbers of hacks and breaches exposing more than 10 million records appears to have jumped substantially from past years, which means that the stakes for better security are even higher for 2017. 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach