Prime Factors Blog

Turnover in the IT Department Have You Feeling Lost in Transition?

Posted by Pete Flagella on Oct 18, 2017 4:13:13 PM

Find me on:


Are you ready to face the impact of losing a key resource in the IT department?

Companies work extremely hard to recruit and retain top-notch employees with valuable skills and knowledge. While there are respective costs and metrics used to quantify the monetary value of loss, what about the measurement of value in knowledge? While there are a number of reasons that losing a key IT resource can be harmful to your company, security may be at the top of the list. The security and encryption tools that you use in your organization can be greatly affected if the knowledge surrounding how these solutions are implemented walks out the door.

Knowledge of encryption is vital in today’s business climate.

Today, there are thousands, if not millions of digital threats to businesses of all sizes. One of the ways that companies safeguard their corporate data from these attacks is with encryption.

A widely used encryption tool is called PGP, or Pretty Good Privacy, which is an open source encryption option that allows individuals and businesses alike to safeguard data from potential threats. While many IT professionals applaud the fact that PGP is available for free for all to use, there are complications surrounding the way it works and how it is supported. Employing more than one person with the knowledge and experience of PGP eliminates confusion and allows for a better understanding of which encryption tools will work best for the organization.

How is PGP Maintained and Updated?

In addition to having staff who are knowledgeable and experienced with your company's security and encryption tools, you may want to be sure your tools will also be available in the long term.

PGP was originally developed by Phil ZimmermannIt has now largely morphed into GnuPG, which is maintained by one man, Werner Koch. Koch is a developer that has been updating the software from his home in Germany since 1997. Through company and individual donations, Koch has managed to keep the software up to date. While his efforts to keep GnuPG running are admirable and thus far successful, some wonder whether the technology will be around in the next 5 to 10 years.

Do You Know How Encryption Works at Your Company?

If you take anything away from this blog, it should be that you and your management team must know exactly how encryption works at your company. While this may be the last thing that you want to worry about, it’s critical to understand what type of encryption tools you are using and whether or not they could be maintained and supported in the event of a key IT resource leaving your company. 

If you learn that your company would have encryption management difficulties with the exit of a key IT professional, it’s critical to learn exactly how your tools work and what can be done to ensure other individuals within the company understand the solutions extremely well. A loss of vital knowledge could mean a lapse in your security or worse – the permanent loss of your data.

How Can We Help?

  • Prime Factors' EncryptRIGHT makes it easy to deploy encryption and tokenization in many different environments, even for the non-technical.  Check out our deployment options.
  • An optional tokenization module that reduces the scope and cost of a PCI audit among other features. 
  • Our solution is cross-platform compatible, giving you the flexibility to launch on a wide range of large computers and PCs.

Still feeling lost?  To learn more about Prime Factors' integrated data security software EncryptRIGHT, click here to watch a 5-minute overview.  We provide data security solutions regardless of your platform, architecture, or industry sector.

Contact us today and let us know how we can help or if you have additional questions about any of our other data security solutions!

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption.  



Topics: encryption, PCI Data Encryption, PCI Data Security Standards