About bkrenek

Website: http://www.experian.com/databreach

Profile: As a Senior Director with Experian Data Breach Resolution, Bob Krenek is responsible for managing multiple national accounts including several within the financial and healthcare sectors. Bob has a depth of experience in data breach resolution and has managed many of the largest data breach incidents in the country including incidents in the government, healthcare and financial sectors. Bob has held numerous management positions in the banking industry and is currently the dedicated data breach resolution account manager for one of the nation’s largest healthcare plans. Prior to joining Experian, he served as vice president of sales and regional vice president for Clarke American where he managed the national sales force for the credit union division and regional sales force for the banking division. He was also an officer of the company. Bob received a bachelor’s administration degree in business from the University of Kentucky and has had continuing executive management training from J.L. Kellogg School of Management, Wharton School and Darden Graduate School of Business. He can be contacted at 770.619.1778 or bob.krenek@experian.com


Posts by bkrenek

Online holiday shopping is also big business for fraudsters

Posted on Dec 18 2012 by

According to EMC’s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]

Share

The next big cyber security threat: Your fingers

Posted on Nov 27 2012 by

We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo [...]

Share

Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?

Posted on Nov 07 2012 by

As Superstorm Sandy demonstrated to the East Coast during the last week of National Cyber Security Awareness Month; life happens so do you know where your data is? Data breach protection is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national cyber [...]

Share

Companies Beware: Cyber security escalates in importance

Posted on Oct 09 2012 by

How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.

Share

What does increased enforcement mean to you?

Posted on Sep 18 2012 by

  Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance [...]

Share

Three things you should never do to identity theft victims

Posted on Aug 21 2012 by

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]

Share

Three data protection strategies to catch a “phish”

Posted on Jul 31 2012 by

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s [...]

Share

A mobile test of human threats

Posted on Jul 17 2012 by

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with [...]

Share

The compliance risks of social media

Posted on May 29 2012 by

Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory [...]

Share

Healthcare breaches & fraud are here to stay

Posted on May 15 2012 by

Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than [...]

Share