Involving Head Honchos in Data Breach Response

Posted on Feb 09 2016 by

Shouldn’t it be easy to convince your senior executives of the importance of cyber security? High-profile data breaches make the news, and your top decision-makers surely read the same headlines you do. Those reports — and numerous studies — make it clear that cyber security incidents continue to grow in volume, frequency and impact. Yet […]


Video: 2016 Predictions – Katherine Keefe

Posted on Jan 27 2016 by

        There have been no shortage of changes in the medical world in the last few years, many triggered by the arrival of the Affordable Care Act. As providers look to unify to provide services, what effects might their consolidation efforts have on information security? Katherine Keefe of Beazley Breach Response joins […]


Updated Data Breach Response Guide Can Help Your Breach Survival

Posted on Jan 13 2016 by

More companies than ever are taking a proactive approach to data breaches; our second annual data breach preparedness study, conducted by Ponemon, found that 72 percent of polled companies had a data breach response plan in place, a 5 percent increase from the year before. Experian Data Breach Resolution believes that figure needs to reach […]


Your Employees Can Be Breach Victims, Too

Posted on Jan 12 2016 by

Employees: A Data Breach’s Hidden Victims Headline-grabbing data breaches have raised awareness of the devastating impact data loss can have on the affected consumers and the breached company. Hopefully, stories like the SONY and Anthem breaches have inspired your company to step up its data breach preparedness and prevention efforts. But are you overlooking the […]


Industry Experts Share Top Data Breach Threats in 2016

Posted on Dec 31 2015 by

      There’s no shortage of frontiers in the world of data breaches, with new avenues expanding each year. Watch our short video to hear what top threats industry experts foresee for 2016, ranging from political campaigns to healthcare and more. To hear full predictions, stay tuned for more dialogue between Michael Bruemmer with […]


5 Must-do Steps for Practicing Your Data Breach Response Plan

Posted on Nov 30 2015 by

Remember how you felt as a kid when the fire alarm rang in school? Your heart raced, adrenaline surged through your body … and you left your seat, got in line and filed out of the building calmly and efficiently because you’d practiced, practiced, practiced what to do in such an emergency. Even as an […]


Hacktivism and More: Predictions for the Data Breach Landscape in 2016

Posted on Nov 30 2015 by

The EMV liability shift went into effect, 62% of companies reported experiencing payments fraud and nearly 120 million records were exposed in healthcare related data breaches. The year is drawing to a close and many of the predictions Experian Data Breach Resolution made for 2015 came to fruition. As the data breach landscape continues to […]


Facing Unique Breach Circumstances? Learn What to Do at Experian’s IAPP Seminar

Posted on Sep 29 2015 by

You need only watch the headlines about data breaches to realize how different each one can be. Some trace their source to a careless or disgruntled insider, some compromise thousands of records of especially vulnerable consumer groups, and others go on for months before they’re detected and stopped. Every breach stems from a unique set […]


Experian Named a Leader in Recent Analyst Report

Posted on Sep 24 2015 by

An effective data breach response plan isn’t just about protecting your business from lawsuits or regulatory penalties; it also impacts customer experience, and customer experience is directly tied to revenue. That’s one of the key premises underlying the newly released Forrester Wave report on Customer Data Breach Notification and Response Services. In preparation for the […]


Following Personal Identifying Information (PII) Down the Black Net Road

Posted on Aug 11 2015 by

As a business manager savvy to security risks, you may be well aware of the costs consumers and businesses incur when personal identifying information (PII) is stolen in a data breach. But once the information is taken from your system, do you know what happens next? Do you understand the route PII travels from its […]