Prime Factors Blog

Data Security Breach Responsibility Shifting to C-Suite, Costly Blind Spots Affect Company’s Financial Landscape

Posted by Pete Flagella on Sep 27, 2017 12:45:49 PM

Data breaches through all industry verticals are on the rise and the responsibility for those breaches has shifted to the C-Suite. According to 2017 data breach reports by Forrester and Verizon, “45% of IT Practitioners don’t believe that brand protection is taken seriously in the C-Suite and 42% of CMO’s don’t believe that brand protection is taken seriously in the C-suite.”  This kind of “in the dark” thinking creates blind spots with costly consequences resulting in decreased bottom line, shareholder value, and damage to the brand.  Additionally, the reports state, “31% of consumers discontinue relationship after a breach.”   The C-Suite miscalculation of risk must be taken seriously and can no longer be viewed only as an IT issue, but rather must be treated as a shared responsibility.

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, data breach, equifax

Famous Data Breaches – and What They Cost

Posted by Gwen Fremonti on May 4, 2017 10:00:00 AM

While it's the largest data breaches that grab our attention, even smaller information security failures can have a big impact on a business, reducing its credibility, turning off current and potential clients, and making individuals far more vulnerable to fraud and identity theft.

In this article, we’ll look at some of the biggest data breaches ever and examine just how they affected the companies that were victimized. We’ll also answer other questions you might have about some of the biggest (and worst) information security incidents in recent history, such as: How much have the biggest breaches cost? How many customer or user accounts did they expose? How do they compare in size and scope to the Yahoo breach? Let’s find out.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, data breach, encryption keys

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

Leadership Tips for CIOs Needing to Push Security

Posted by Pete Flagella on Feb 23, 2017 10:00:00 AM


CIOs are likely seen as the leader of the IT department, as opposed to an executive leader of the entire company. Most IT team members tend to keep to themselves and complete tickets as they arise, but this is a fatal flaw when it comes to the well-being of the company. The CIO has to be as integral to the company's direction as any member of the executive team — especially when it comes to security measures. By taking a passive role, a CIO can cripple a company's security and technology vision. Leadership in this case can't be a show of force, but rather a show of support and passion. It may be the only way to get better security approved and implemented.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

A Year in Review: Breaches in 2016

Posted by Pete Flagella on Feb 16, 2017 10:00:00 AM


In just one year, hackers and outsiders gained access to billions of records across the world. This is an astonishing, record-breaking achievement that only a criminal could celebrate. The top 10 breaches of the year comprised the vast majority of these records, making certain leaks more destructive than others. The numbers of hacks and breaches exposing more than 10 million records appears to have jumped substantially from past years, which means that the stakes for better security are even higher for 2017. 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

The Surprising Aftermath of Data Breaches

Posted by Pete Flagella on Oct 20, 2016 10:00:00 AM


Data breaches get a lot of press when reporters first get word of them, but the stories tend to drop off quickly unless the public spurs them on. It doesn't help that these stories are brought to you by people who often don't understand the exact nature of the breaches or their true consequences. Since reporting guides everyone's impression as to causes and consequences, it may be time to bring you more information about what happens after a breach.

 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach