Prime Factors Blog

Effective Data Security Solutions Balance Security Needs While Optimizing User Experience

Posted by Pete Flagella on Apr 20, 2017 10:00:00 AM

When it comes to deciding how, when, and what to secure and encrypt, companies face a variety of difficult choices – and one of them is whether to prioritize system security or to emphasize ease of use for employees. In many cases, making the right trade-offs between security and usability can be tough; some systems and protocols are highly usable, but not very safe, while others are highly safe, but very difficult to use. Organizations need to find solutions that consistently strike an effective balance between the two.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

Let's Talk Tokenization

Posted by Gwen Fremonti on Apr 18, 2017 10:00:00 AM

In our modern era of cyber-attacks and security breaches, the value of sensitive data detailing our financial transactions and personal lives is at a premium. From groceries to government, the threat of our potentially lucrative online existence being hijacked and sold to the highest bidder is foremost on the minds of both the public and digital security experts. And while it may sound counterintuitive, one of the safer data transfer processes could be one that attempts to render your valuable details completely worthless: tokenization. 

A marked shift toward tokenization has been underway since 2014, when EMVCo LLC  implemented specifications via EMV (Europay, MasterCard, and Visa). EMVCo's members also include Discover and American Express, so this change in how sensitive data is delivered and processed is set to become America's standard. It's not just financial data: everything from your driver's license, medical details, and voting profile all stand to benefit from being tokenized. So how does it work?

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, encryption keys

Stay Adaptable, Stay Safe: How Encryption Key Management Can Thwart Hackers

Posted by Pete Flagella on Apr 13, 2017 10:00:00 AM

While you likely would never give your house keys to a stranger, many of us are doing this when it comes to securing important information online. Many applications that we use every day allow third-party providers to access our data, and it can be difficult to know if these providers are properly securing this information. By adding encryption key management to your current security procedures, you can use apps without worrying about compromising private data.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

6 Statistics that will Help Make the Case for Encryption and Data Security to the C-Suite

Posted by Gwen Fremonti on Apr 11, 2017 3:33:34 PM

If you’re not taking an active role in encrypting and securing your company’s most sensitive data, you might as well be leaving the key to your corporate safe unlocked. In today’s digital world, our increasing reliance on technologies like corporate cloud computing and file storage systems, online banking, and virtual email servers are leaving many businesses significantly more vulnerable to cybercrime.

Despite the threat, not all executives understand just how dangerous cybercrime can be to their company’s bottom line; and whether you’re an IT manager or an outside consultant, you may need to convince them of the need to take data security precautions seriously. This shouldn’t be too difficult, considering that the average data breach costs an incredible $4 million. However, if that statistic doesn’t do the trick, here are five more that might:

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

How HSMs Keep a Massive Number of Encryption Keys Secure and Usable

Posted by Pete Flagella on Apr 4, 2017 10:00:00 AM


Hardware Security Modules, also known as HSMs, are physical computing devices that protect digital encryption keys that are used to provide strong authentication for data. Strong authentication is needed for processing information in a variety of secure functions, especially in banking and financial services, where access to accounts must be accurately, quickly, and securely linked to the proper person or business in order to prevent hacking, theft, and other cybercrimes.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

What a Full-Service Encryption Tool Looks Like

Posted by Pete Flagella on Mar 28, 2017 10:00:00 AM


Businesses are typically concerned with hiring employees, securing additional office space, growing revenue, generating sales, and other metrics that directly translate into a better bottom line. This focus sometimes overlooks proactively addressing other aspects of corporate strategy that have less obvious but crucial ROI, like effective cybersecurity. And often the most effective (and cost-effective) way to secure data is through encryption.

Encryption is the process of modifying data to make it unreadable to everyone except authorized users. It can help organizations protect critical data from a range of potential threats, many of which can directly and sometimes catastrophically impact revenue. Businesses typically use encryption to protect customer data, personal information, trade secrets, tax information, employee files, credit card information and ultimately, their brand and the trust of their customers.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Dropbox in Healthcare: What File Sharing Means for Patients

Posted by Gwen Fremonti on Mar 21, 2017 10:00:00 AM


Cloud sharing is on everyone’s mind, even though some people still don't really understand what it is. It often helps to put a brand name to these generic services, and Dropbox is one of the most recognizable names when it comes to identifying cloud service providers. Dropbox is used at businesses around the country as a way to gain access and edit files from one central, user-friendly place. Accounts can be activated and deactivated in line with the projects employees are working on, and larger file sizes can be shared without hassle between multiple people. 

While other services like Google docs promote many of the same services, Dropbox has won the loyalty of millions of people with its free and paid packages alike. Many who use Dropbox use it primarily as a means to pass administrative files back and forth, but healthcare professionals have long recognized the potential for improving the level of patient care too. As file sharing is likely to increase across non-affiliated hospitals in the coming years, it's worth understanding what that really means for PHI.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Potential HIPAA Changes in 2017

Posted by Pete Flagella on Mar 14, 2017 10:00:00 AM


A new government means new priorities and agendas — which can lead to new compliance rules that you'll inevitably need to learn. These changes can throw a company into chaos as everyone struggles to decide upon the straightest line from current policies to better security. Understanding more about the political, economic, and tech climate can make these changes easier to digest.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

What Does Fraud Look Like in the EMV Era?

Posted by Pete Flagella on Mar 7, 2017 10:00:00 AM


The sad truth of life is that criminals will never be completely thwarted when it comes to achieving their goals. No matter how sophisticated safety techniques are, there is always someone ready to challenge them. EMV chips have been hailed as the new way to reduce fraud, but while it's making it harder on criminals, hackers are still finding ways to apply their talents to this new form of payment. We'll take you through what EMV fraud looks like at the stores, on the internet, and at the ATM.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, EMV

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach