Tagged as: tokenization as a service

18 Jan
2017

Don’t be Next – Securing Usernames and Passwords with Tokenization

Don’t be Next – Securing Usernames and Passwords with Tokenization Yahoo- 1 Billion, Myspace– 427 Million, Oracle’s Micros- 330 Million, Ashley Madison– 300 Million, LinkedIn- 167 Million, Dropbox- 68 million: these are the amounts of exposed usernames, passwords, and numerous pieces of valuable PII breached in 2016. What’s incredible is

17 Nov
2016

Managing Risk – Not All Tokenization Solutions Are Equal Part 1 of 3

Managing Risk – Not All Tokenization Solutions Are Equal Part 1 of 3 It happens. Your team finally decides it’s time to tokenize your organization’s sensitive data, but now you have to pick through the maze of tokenization solutions to determine which best meets your needs. You have complex challenges

02 Nov
2016

Securing and Tokenizing Sensitive Data with Browser Based Encryption

Securing and Tokenizing Sensitive Data with Browser Based Encryption Your e-commerce and mobile payment channels are probably the most important ways your organization takes payments.  Countless hours are invested in these technologies to ensure your customers have the best buying experience possible while interacting with your digital assets.  Because of

21 Oct
2016

Exposing Customer PII Has Lifetime Impact

Exposing Customer PII Has Lifetime Impact Negligence, personal injury, breach of contract, consumer protection, invasion of privacy, and data breach notification are terms you’ll need to familiarize yourself with as you enter the new landscape of exposing valuable customer information. Data Breaches get uglier by the day, and with each

22 Aug
2016

When Malware Threatens Access: Mitigating Risk in a World of Open Doors

When Malware Threatens Access: Mitigating Risk in a World of Open Doors When even software giant Oracle confirms that its Micros POS systems have been infected with malware, it’s time to admit the obvious — no organization or software is invulnerable to data theft. With pervasive web-based platforms, file sharing,

08 Aug
2016

It’s Not Worth the Risk. Remove Toxic PII with Tokenization

It’s Not Worth the Risk. Remove Toxic PII with Tokenization Sometimes the struggle with data security seems like a game of whack-a-mole. Just as you start to get a handle on preventing payment card data breaches, new worries pop up: malware injections, spear phishing schemes, ransomware and other nefarious hacks

16 Jun
2016

Browser Based Encryption vs. Hosted Tokenization Page – An Issue of Control

Browser Based Encryption vs. Hosted Tokenization Page – An Issue of Control While E-Commerce tokenization solutions reduce the cost and scope of PCI compliance, a more important benefit is they remove toxic data from your environment, so that when a breach does occur, the result is simply: No Data, No

12