5 Must-do Steps for Practicing Your Data Breach Response Plan

Posted on Nov 30 2015 by

Remember how you felt as a kid when the fire alarm rang in school? Your heart raced, adrenaline surged through your body … and you left your seat, got in line and filed out of the building calmly and efficiently because you’d practiced, practiced, practiced what to do in such an emergency. Even as an […]

Facing Unique Breach Circumstances? Learn What to Do at Experian’s IAPP Seminar

Posted on Sep 29 2015 by

You need only watch the headlines about data breaches to realize how different each one can be. Some trace their source to a careless or disgruntled insider, some compromise thousands of records of especially vulnerable consumer groups, and others go on for months before they’re detected and stopped. Every breach stems from a unique set […]

Experian Named a Leader in Recent Analyst Report

Posted on Sep 24 2015 by

An effective data breach response plan isn’t just about protecting your business from lawsuits or regulatory penalties; it also impacts customer experience, and customer experience is directly tied to revenue. That’s one of the key premises underlying the newly released Forrester Wave report on Customer Data Breach Notification and Response Services. In preparation for the […]

Following Personal Identifying Information (PII) Down the Black Net Road

Posted on Aug 11 2015 by

As a business manager savvy to security risks, you may be well aware of the costs consumers and businesses incur when personal identifying information (PII) is stolen in a data breach. But once the information is taken from your system, do you know what happens next? Do you understand the route PII travels from its […]

After a Data Breach: Keeping Customers Informed

Posted on Jul 29 2015 by

A data breach can increase a consumer’s risk of falling victim to identity theft. In order to mitigate this risk, federal and state governments have instituted regulations regarding the notification of affected consumers. But many consumers – inundated by news of mega breaches – may experience data breach fatigue, and do little or nothing at […]

Are Your Employees Data Breach Risks?

Posted on Jul 14 2015 by

Your employees are your greatest asset, but they may also pose the greatest data breach risk to your organization. Unfortunately, multiple studies and research point to employees as the leading cause of data breaches. Employees may put your data at risk in a number of ways; from failing to practice good password habits to losing a […]

Cyber Criminals, Spies and Activists – Know the Enemy

Posted on Jun 30 2015 by

Who are behind cybercrimes? When it comes to these thieves behind computers, not all perpetrators are the same, and how they ply their attacks can vary greatly, too. To effectively protect your organization from cybercrime, it’s vital to understand the many ways in which it occurs, and the many types of cyber criminals who perpetrate […]

Data breach legislation continues to be on policymakers’ radar

Posted on Jun 24 2015 by

While there is momentum for data breach legislation, there continues to be hurdles to seeing any laws come to fruition. But there is certainly optimism. The most pressing issue today is whether a national data breach law will be passed. Most support this concept, however there is a lack of agreement on the details and […]

Recognize Internet Safety Month As a Reminder To Keep Data Secure

Posted on Jun 02 2015 by

Airtight firewalls and current-to-the-minute defensive software aren’t enough to keep your organization safe from cyber attacks. Your IT team could be doing everything right, and your company may still be at risk from internal threats – because just one employee thinks that cybersecurity isn’t his or her job. Our Second Annual Data Breach Preparedness Study […]

Could Wireless-enabled Devices Pose a Data Breach Risk?

Posted on May 19 2015 by

Do your cyber security measures address the possibility of a data breach occurring through the wireless-enabled refrigerator in the break room of your corporate headquarters? Have you made provisions if a hacker accesses sensitive data through wearable technology? Will your data breach response plan provide adequate guidance if a breach occurs through the Internet of […]