Top 6 Mistakes Companies Make in Data Breach Handling

Posted on Aug 23 2016 by

Top 6 Mistakes Companies Make in Data Breach Handling A data breach can be a character-defining moment for any company. Whether you’re an international conglomerate or a small business, how you handle a data breach speaks volumes about the kind of company you are, how well you treat customers, and your long-term prognosis for business […]

How Can you Trim Costs in Breach Response and Service?

Posted on Aug 09 2016 by

Data breach costs should no longer come as a surprise to any company; in fact, you should be budgeting for data breach expenses just as you would any other expected expense. That’s one of the key messages to come out of the now-indispensable annual “Cost of a Data Breach” report.

Pay, Resist or Punt? How Will Your Organization Handle a Ransomware Attack?

Posted on Jul 27 2016 by

Ransomware is on the rise. If it becomes as ubiquitous as identity theft and data breaches — and signs point in that direction – how will your organization deal with it when a hacker uses malicious code to lock you out of your own computer systems?

6 Best Practices to Ensure Success When Purchasing Cyber Insurance

Posted on Jul 13 2016 by

          Hopefully, by now you’re convinced of the value of cyber insurance. In case you’re not, here’s a brief recap of the advantages of having a cyber insurance policy in place prior to a data breach: Reduce the per-record cost of a data breach by $4.40, according to Ponemon Institute’s 2015 […]

Are You Updating Your Breach Response Plan Often Enough?

Posted on Jun 28 2016 by

Are you updating your data breach response plan to respond to new threats and forensic analysis? Discover how often updates may be needed.

Identity theft knows no season: Why credit monitoring should be a year-round effort

Posted on Jun 14 2016 by

When do your customers think about credit monitoring? When do you, as a business, think about offering it to them? Many consumers don’t independently monitor their credit on a regular basis – multiple surveys tell us that, including those by Javelin Strategy & Research. Most of those who don’t monitor their credit probably won’t think about […]

Employee-Related Security Risks Are Addressed in our Latest Ponemon Institute Study

Posted on Jun 01 2016 by

What keeps your cyber security team up at night, and does it weigh equally on the minds of managers? Do they lose sleep worrying about malicious attacks from outside your organization? Or do they fear a careless employee will leave a laptop in an unlocked car or use an unsecured personal mobile device to access […]

Best Practices for ID Theft Services and Programs

Posted on May 18 2016 by

While there are some critics of identity theft protection and credit monitoring services, consumers need a tool to fight against identity theft and fraud in today’s data breach climate. As a result of this demand, there has recently been a flurry of new services to the market.

Experian Acquires CSID

Posted on May 11 2016 by

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading provider of consumer identity management and fraud detection services.

Video: IAPP Panel on Employee Security Threats

Posted on May 05 2016 by

Did you miss Experian’s panel at the recent IAPP event in April? A red-hot topic in many industries, employees negligence is the primary cause of a majority of breaches. How can companies address this liability?