Prime Factors Blog

Pete Flagella

Find me on:

Recent Posts

Bang for the Buck: Why Encryption Provides Effective (and Cost-Effective) Data Security

Posted by Pete Flagella on May 11, 2017 10:00:00 AM

Unfortunately, keeping data secure is no longer as simple as placing items in a locked file cabinet. With the adoption of cloud computing, companies now have data that is located across a myriad of different providers and platforms, and ensuring this data is safe can be a challenge. While it may be difficult to institute a perfect security system, encryption offers companies perhaps the most powerful and cost-effective way to protect data – both at rest and while in transit. 

In this blog, we’re going to discuss why it should be a requirement for any company doing business in today’s environment.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, encryption keys

Encryption: The Cost, The Protection, and the ROI

Posted by Pete Flagella on Apr 27, 2017 10:00:00 AM

It's no longer only the concern of governments and corporations: encryption is both lock and key to cybersecurity across a range of organizations, of all sizes.  In 2016, the Ponemon Institute calculated the average total cost of a data breach to be $4 million. The next two years sees the chances of 10,000 lost or stolen records at the average organization sitting at 26 percent. As more businesses and private users upload and store data in digital cloud environments, encryption is a topic that can't be avoided and a responsibility that shouldn't be ignored.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, encryption keys, PCI Compliance

Effective Data Security Solutions Balance Security Needs While Optimizing User Experience

Posted by Pete Flagella on Apr 20, 2017 10:00:00 AM

When it comes to deciding how, when, and what to secure and encrypt, companies face a variety of difficult choices – and one of them is whether to prioritize system security or to emphasize ease of use for employees. In many cases, making the right trade-offs between security and usability can be tough; some systems and protocols are highly usable, but not very safe, while others are highly safe, but very difficult to use. Organizations need to find solutions that consistently strike an effective balance between the two.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

Stay Adaptable, Stay Safe: How Encryption Key Management Can Thwart Hackers

Posted by Pete Flagella on Apr 13, 2017 10:00:00 AM

While you likely would never give your house keys to a stranger, many of us are doing this when it comes to securing important information online. Many applications that we use every day allow third-party providers to access our data, and it can be difficult to know if these providers are properly securing this information. By adding encryption key management to your current security procedures, you can use apps without worrying about compromising private data.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

How HSMs Keep a Massive Number of Encryption Keys Secure and Usable

Posted by Pete Flagella on Apr 4, 2017 10:00:00 AM


Hardware Security Modules, also known as HSMs, are physical computing devices that protect digital encryption keys that are used to provide strong authentication for data. Strong authentication is needed for processing information in a variety of secure functions, especially in banking and financial services, where access to accounts must be accurately, quickly, and securely linked to the proper person or business in order to prevent hacking, theft, and other cybercrimes.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, encryption keys

What a Full-Service Encryption Tool Looks Like

Posted by Pete Flagella on Mar 28, 2017 10:00:00 AM


Businesses are typically concerned with hiring employees, securing additional office space, growing revenue, generating sales, and other metrics that directly translate into a better bottom line. This focus sometimes overlooks proactively addressing other aspects of corporate strategy that have less obvious but crucial ROI, like effective cybersecurity. And often the most effective (and cost-effective) way to secure data is through encryption.

Encryption is the process of modifying data to make it unreadable to everyone except authorized users. It can help organizations protect critical data from a range of potential threats, many of which can directly and sometimes catastrophically impact revenue. Businesses typically use encryption to protect customer data, personal information, trade secrets, tax information, employee files, credit card information and ultimately, their brand and the trust of their customers.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

Potential HIPAA Changes in 2017

Posted by Pete Flagella on Mar 14, 2017 10:00:00 AM


A new government means new priorities and agendas — which can lead to new compliance rules that you'll inevitably need to learn. These changes can throw a company into chaos as everyone struggles to decide upon the straightest line from current policies to better security. Understanding more about the political, economic, and tech climate can make these changes easier to digest.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: encryption, PCI Data Encryption, hipaa

What Does Fraud Look Like in the EMV Era?

Posted by Pete Flagella on Mar 7, 2017 10:00:00 AM


The sad truth of life is that criminals will never be completely thwarted when it comes to achieving their goals. No matter how sophisticated safety techniques are, there is always someone ready to challenge them. EMV chips have been hailed as the new way to reduce fraud, but while it's making it harder on criminals, hackers are still finding ways to apply their talents to this new form of payment. We'll take you through what EMV fraud looks like at the stores, on the internet, and at the ATM.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Tokenization, encryption, PCI Data Encryption, EMV

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Posted by Pete Flagella on Feb 28, 2017 10:00:00 AM


What's more exciting than a trip to the Alps to hit the slopes and kick up some snow? Apparently the answer for hackers is a virtual break-in against the hotel that hosts the skiers of the world. Romantik Seehotel Jägerwirt in Austria saw hackers use ransomware to gain control of their locks, making it impossible for guests to come and go. While the direct financial costs could have been a lot worse, there's a lot that every company should learn from this incident. Here's what happened, why the hospitality industry is so enticing to hackers, and what could have been done to prevent this.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach

Leadership Tips for CIOs Needing to Push Security

Posted by Pete Flagella on Feb 23, 2017 10:00:00 AM


CIOs are likely seen as the leader of the IT department, as opposed to an executive leader of the entire company. Most IT team members tend to keep to themselves and complete tickets as they arise, but this is a fatal flaw when it comes to the well-being of the company. The CIO has to be as integral to the company's direction as any member of the executive team — especially when it comes to security measures. By taking a passive role, a CIO can cripple a company's security and technology vision. Leadership in this case can't be a show of force, but rather a show of support and passion. It may be the only way to get better security approved and implemented.

To learn how encryption can lower the cost of regulatory compliance while enhancing security, download our white paper Reducing the Cost of Regulatory Compliance with Encryption 

Read More

Topics: Enterprise Data Protection, encryption, data breach