flash_area

Have any questions?

contactUs


The Futurex Blog. News, Announcements and Much More.


Data Security & Fraud Prevention Roundup – April 3rd, 2015

by Futurex on April 3rd, 2015

Our Data Security & Fraud Prevention Roundup contain links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the last few weeks and our thoughts on them.

#1: Verizon 2015 PCI Compliance Report by Verizon (March 2015)

This new report on PCI DSS outlines some startling statistics on the state of compliance over the past year, including the rate at which businesses consistently fail their initial audit assessment. It’s not all bad news, though, because this report offers some excellent recommendations on best practices for security and audit preparation.

#2: Adapting to the Changing Global Enterprise Security Landscape by Randy Sabett, Lindsy Solanki, Tech Crunch (March 26, 2015)

The technology landscape is fast-paced and ever changing, but security concerns and legislative action are catching up to strengthen regulations for data security. Randy Sabett, the former commissioner on cyber security for the White House, outlines the current landscape of data security in governments all over the world as well as how these new laws can affect the companies and industries that manage large volumes of sensitive data.

#3: Internet of Things: The New Frontier for Data Security and Privacy by Benjamin Kleine, Bethany Lobo, and Amanda Levendowski, Inside Counsel (March 27, 2015)

Imagine a future where all your devices are “smart” and can communicate with each other, from cars to refrigerators to your bank account. Along with this new communication capability, there needs to be an extra layer of security protecting the vast amounts of sensitive data that will be produced. In this breakdown of the inevitable Internet of Things, these authors from Inside Counsel highlight the security and privacy concerns that companies should recognize.

#4: Financial Services: Investing in Data Security Risk Mitigation by Ryan St. Hilaire, TECHZONE360 (March 30, 2015)

If your financial institution’s risk mitigation plan is unsatisfactory or nonexistent, this article is a must-read. Ryan St. Hilaire discusses every aspect of a complete plan to protect your company from risk, including infrastructure assessment, security technologies, response protocols, and more.

If you find something interesting that you’d like to see considered for our next Data Security & Fraud Prevention Roundup, don’t hesitate to let us know. We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices. Send your best links to [email protected], or share them with us on Twitter (@Futurex).


Bookmark and Share

Securing the Electronic Invoicing Process

by Futurex on March 24th, 2015

Electronic invoicing is a digitized format that has become the most used and practical method of delivering a summary of goods or services issued to a customer. This electronic document is the direct replacement of a hand written or printed invoice.

There are many advantages to a digital invoice over a paper copy. Some of these benefits include improved data tracking, better client accountability, prompt delivery, and overall cost reduction. Electronic invoices are utilized all over the world by various types of business markets ranging from freelancers, various private sector businesses, and government offices.

Electronic invoices, while faster and inherently more secure than a piece of paper, still need to be processed securely to ensure fraud protection, particularly in the case of sensitive and personal information that will travel through government channels. Some countries have begun using invoices to track tax information and process transactions between businesses and government.

The content in these digital documents is confidential and should only be known to the recipient and issuer. It is important to assure safe delivery and integrity of these files. So how do you keep your electronic invoices safe? A simple and most secure solution is to employ the use of hardware security modules, otherwise known as HSMs. Futurex HSMs are capable of transmitting data securely over networks and digitally signing these invoices. This digital signature is a form of encryption that is applied real-time and on the fly to each invoice, giving it a unique ID that can be validated at any time, this way we can be sure it was produced by the issuer and the content is authentic.

Here is an example: In some countries, governments use a certified third-party business to receive records, digitally certify and sign these records, and then send them to the government.

Futurex’s Excrypt SSP9000 is an HSM that is capable of performing this kind of encryption, adding an important layer of security to your digital invoices. It is also important to mention that security standards require the use of compliant processes and equipment. The Excrypt SSP9000 is fully compliant with today’s security standards and equipped to adapt to any emerging standards.

For more information on an applied solution, download our case study illustrating how the Excrypt SSP9000 helps Mis e-Folios, a third-party organization that processes electronic invoicing for Servicio de Administración Tributaria in Mexico.


Bookmark and Share

Truly Xceptional Support: Our Promise to You

by Rachel Barnett on March 16th, 2015

Just how important is customer service when choosing to use a new business? At Futurex, we believe it is a chief component of the decision-making process, which is why we put great thought and effort into making our Xceptional Support best-in-class. Recently, Forbes Insights released a study titled “Modern Customer Service: Are You Outpacing Your Executive Peers?” that gave some insight into the current state of customer service among businesses spanning 10 different industries, including technology companies.

The study revealed that only 35% of businesses emphasize “knowledge management” in their customer service strategies, but that 51% of companies plan to invest in that area this year. Knowledge management refers to the idea that customer service employees should be skilled and knowledgeable in responding to their customers’ issues, with the ability to resolve any questions with little to no escalation. This concept is an integral part of Futurex’s Xceptional Support methodology; we employ CTGA-accredited Solutions Architects who handle both infrastructure implementation AND on-going support. This cross-departmental method ensures the people handling our customers’ issues are well-equipped to handle any problems expertly and efficiently.

One of the main features of Futurex’s support services is that our customers have choices on the level of support they want. Whether they’re opting for our extended hardware warranty, our Non-Business Critical Xceptional Support, or our Business-Critical Xceptional Support, Futurex will be there for them. Curious about what Futurex support can do for you? Check out this infographic:


Bookmark and Share

Data Security & Fraud Prevention Roundup – March 5th, 2015

by Futurex on March 5th, 2015

Our Data Security & Fraud Prevention Roundup contain links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the last few weeks and our thoughts on them.

#1: Adopting Enterprise Storage: What You Need to Know by Jimmy Winskowski, Business 2 Community (February 26, 2015)

What are your business’ options for enterprise data storage? This article compares cloud vs on-premise storage, SSD vs HDD, network protocols, and more through a visually appealing infographic. Personally, we’re fans of the SAS9000, available both on-premise or through the VirtuCrypt cloud.

#2: 3 lessons privacy and security teams can learn from each other by Rick Kam, Government Health IT (March 3, 2015)

What do Reese’s peanut butter cups have to do with data security? Let Rick Kam tell you in this article that discusses how to avoid data siloes by utilizing the best technologies and practices from both the IT industry and the privacy profession.

#3: Data Security is a ‘Lifecycle’ Commitment by Scott Gnau, Forbes (March 3, 2015)

Data security plans can quickly become complex and unwieldy, with companies losing focus of the big picture as they seek to secure every endpoint. Scott Gnau goes back to the basics and talks about high-level approaches to ensure your system is strong and secure throughout its lifecycle.

#4: How Cloud is Being Used in the Financial Sector: Survey Report by Cloud Security Alliance (March 2015)

The Cloud Security Alliance recently conducted a study within the financial sector in order to determine if and how cloud services are being used. The CSA stated, “The objective of this study is to understand the needs for adopting secure cloud services in the financial industry by enabling the adoption of best practices.” Topics covered within this survey include any concerns regarding the cloud, the security requirements for the cloud, and security strategies for your data. For more information on secure cloud services and offerings, check out the VirtuCrypt Hardened Enterprise Cloud Service.

If you find something interesting that you’d like to see considered for our next Data Security & Fraud Prevention Roundup, don’t hesitate to let us know. We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices. Send your best links to [email protected], or share them with us on Twitter (@Futurex).


Bookmark and Share