article thumbnail

Unencrypted Vistaprint Database Exposed Personal Customer Data

PYMNTS

Printing company Vistaprint left an online database containing customer interactions unencrypted, according to a report. A security researcher named Oliver Hough discovered the unprotected database on Nov. After the report was published, the company quietly took down the database.

article thumbnail

American Express India Database Accessible To Anyone In October

PYMNTS

American Express India enabled a database to be accessible to anyone for longer than five days in October, according to a report in The Next Web. According to the report , the Hacken cyber consultancy team’s director of cyber risk research, Bob Diachenko, discovered the unprotected database on Oct. 20, but potentially even longer.

article thumbnail

Advanced Data Security: Safeguarding Your Business In The Digital Age  

VISTA InfoSec

Implement a solid backup strategy to renew your operations after disruptive incidents like ransomware encryptions, hardware failures, or accidental deletions. Encrypt Sensitive Data Scrambling sensitive data into indecipherable code shields it from prying eyes, even if intercepted.

article thumbnail

What to Know About Tokenization

Basis Theory

As a merchant, to understand tokenization for your own benefit, it’s critical to understand: What tokenization is, why it’s important for payments, and how it compares to encryption. As an additional layer of protection, these systems may encrypt the sensitive data so that it’s protected against unauthorized access.

article thumbnail

Data Breaches 101: What They Are And How To Prevent Them

VISTA InfoSec

Encrypt Data Flows Implement encryption for data in transit over networks and at rest within databases/servers to ensure meaningless ciphertext even if intercepted.

article thumbnail

JCrush’s Open Database Exposes 200K User Records

PYMNTS

The app, designed for the Jewish community, left the database open without a password, exposing user data and private messages, said security researchers Noam Rotem and Ran Locar, according to reports. In addition, none of the data was encrypted. Dating app JCrush potentially exposed the records of around 200,000 users.

article thumbnail

What Is Data Tokenization and How Does It Work?

Stax

There are various methods of enforcing data security, such as data masking, encryption, authentication, and data tokenization. Tokenization vs encryption Data encryption is another popular data security technique where data is transformed into an illegible format. The resulting token is essentially a proxy and has no real value.