Tagged as: tokenization

21 Oct

Exposing Customer PII Has Lifetime Impact

Negligence, personal injury, breach of contract, consumer protection, invasion of privacy, and data breach notification are terms you’ll need to familiarize yourself with as you enter the new landscape of exposing valuable customer information. Data Breaches get uglier by the day, and with each new breach the consequences grow. Data

08 Aug

It’s Not Worth the Risk. Remove Toxic PII with Tokenization

Sometimes the struggle with data security seems like a game of whack-a-mole. Just as you start to get a handle on preventing payment card data breaches, new worries pop up: malware injections, spear phishing schemes, ransomware and other nefarious hacks that seek out and steal Personally Identifiable Information (PII). What

16 May

The Case for Volume-based Vs Transaction Pricing for Tokenization

Whether your organization is an online merchant, a storefront retailor, a non-profit charity organization, or a university bursar’s office, you are familiar with the growing costs of using payment service providers (PSPs) that take a healthy cut from every payment transaction. Now, PSPs are starting to layer in other services

23 Feb

TokenEx Provides Freedom of Choice to Use Multiple PSPs

Without the right integration partner, global organizations face a complicated situation when trying to use multiple Payment Service Providers (PSPs) to conduct business. They may need to tokenize payment data across multiple PSPs for business purposes, such as for in-country settlement. Or an e-commerce web site builder needs to provide

15 Feb

TLS 1.0 Is Going Away – How Does That Impact JavaScript Browser-Based Encryption?

In the early days of the Internet, before e-commerce was a major force, the simple browsers made use of an equally simple security protocol called Transport Layer Security (TLS version 1.0) based on the Secure Socket Layer (SSL) protocol. TLS 1.0 was intentionally modified to make it easy for multiple

27 Jan

Gone Phishing – Malware Wants your PII Part 2

  Part 2 of 2 In our last blog installment, we discussed the rash of data breaches that are hitting all industries, aimed at stealing very valuable Personally Identifiable Information (PII). The current generation of malware attacks faster and is nearly undetectable, deploys more insidious ransomware, and contains far more