Prime Factors Blog

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

Leadership Tips for CIOs Needing to Push Security

Posted by Pete Flagella on Feb 23, 2017 10:00:00 AM


CIOs are likely seen as the leader of the IT department, as opposed to an executive leader of the entire company. Most IT team members tend to keep to themselves and complete tickets as they arise, but this is a fatal flaw when it comes to the well-being of the company. The CIO has to be as integral to the company's direction as any member of the executive team — especially when it comes to security measures. By taking a passive role, a CIO can cripple a company's security and technology vision. Leadership in this case can't be a show of force, but rather a show of support and passion. It may be the only way to get better security approved and implemented.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

A Year in Review: Breaches in 2016

Posted by Pete Flagella on Feb 16, 2017 10:00:00 AM


In just one year, hackers and outsiders gained access to billions of records across the world. This is an astonishing, record-breaking achievement that only a criminal could celebrate. The top 10 breaches of the year comprised the vast majority of these records, making certain leaks more destructive than others. The numbers of hacks and breaches exposing more than 10 million records appears to have jumped substantially from past years, which means that the stakes for better security are even higher for 2017. 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

The Surprising Aftermath of Data Breaches

Posted by Pete Flagella on Oct 20, 2016 10:00:00 AM


Data breaches get a lot of press when reporters first get word of them, but the stories tend to drop off quickly unless the public spurs them on. It doesn't help that these stories are brought to you by people who often don't understand the exact nature of the breaches or their true consequences. Since reporting guides everyone's impression as to causes and consequences, it may be time to bring you more information about what happens after a breach.

 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

What You Need to Know About PCI DSS 3.2

Posted by Pete Flagella on Oct 11, 2016 10:00:00 AM


Unless you draft regulations or hired someone specifically to study the details of the regulations, it can be hard to keep up with their many changes. Merchants have had a variety of responses when it comes to the requirements of the PCI DSS, from indifference to total acceptance and everything in between. Regardless of how you feel about them though, you will need to be aware of how they're changing and what it means to you. The new version of PCI, 3.2, was developed earlier this year and takes effect on October 31, 2016. The overarching theme is to push more responsibility onto the merchant for keeping their security measures up to date. Some of the updates will require major upheaval for some merchants in order to keep pace with new security standards.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, PCI Data Security Standards, PCI DSS 3.2

Why Your Current Cloud Protection Methods Likely Aren't Enough

Posted by Pete Flagella on Oct 4, 2016 10:00:00 AM


The cloud has exploded in popularity and companies of all kinds are realizing how much time and money they can save by letting someone else take the reins in regards to maintaining servers and storing information. However, talk to those in the computer industry and they may not exhibit universal support. When even Apple's cloud can be hacked to release private photos and messages, it is obvious that there is no company immune from these types of threats. It's the main reason businesses choose not to utilize the cloud — the leaders do not feel comfortable relinquishing control over the security of their information to anyone else. There is such a thing as effective cloud management though, and there are ways to protect information that a decision maker wouldn't want to release under any circumstances. It all starts with understanding the basics of encryption and key management. Learn more about the major problems with storing data in the cloud and the most effective solutions to mitigate against the dangers.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption

How the Black Market (Dark Web) Works When Buying and Selling Information

Posted by Pete Flagella on Sep 29, 2016 10:00:00 AM


When you hear about a security breach your first reaction might be to feel a sense of relief because it didn't happen to you. After those feelings of relief subside, you may wonder more about what went wrong so you can avoid making that same mistake. However, it may be wise to carry those thoughts one step further by asking yourself what happens to the information that is stolen.  You may stand a better chance of ensuring that it never happens to you. Learn about a much more threatening world, and how you can protect yourself from such threats. 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption

5 Advantages of Using Encryption Technology for Data Protection

Posted by Patrick Riley on Sep 15, 2016 10:00:00 AM



Article that speaks about some key advantages and benefits of implementing encryption technology. With cybercrime on the rise and the number of data breaches increasing, criminals are becoming more savy ramping up attacks more frequently.

http://www.smartdatacollective.com/ryanayers/435800/5-advantages-using-encryption-technology-data-protection

Read More

Topics: Enterprise Data Protection

Should I Consider Tokenization in My Business?

Posted by Pete Flagella on Sep 13, 2016 12:27:25 PM


The term tokenization is used in a variety of ways, which can make the concept confusing even for security professionals. Like everyone, you're probably used to working with a limited budget, and it may seem like you couldn't consider adding another expense into the mix. However, there are ways that you can actually save money using this method of protecting your information, and we'll tell you how to approach the decision.

 

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption

5 Common Mistakes Made When Implementing Encryption (And How to Avoid Them)

Posted by Pete Flagella on Sep 8, 2016 10:00:00 AM


Encryption is a fickle friend to a lot of businesses. It certainly protects the company when performed correctly, but it also creates logistical IT challenges that even the highest level staff can feel ill-equipped to coordinate. Mistakes are common, and they're often made without anyone catching them. Considering that hackers only improve their technique day by day, it is simply not worth the risk leave anything to chance. We'll give you 5 common encryption implementation mistakes and how they can be avoided.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption