<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; bkrenek</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/bkrenek/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Online holiday shopping is also big business for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 18:47:08 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[online shopping]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1901</guid>
		<description><![CDATA[According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Cyber+Security,Data+Breach,Data+Security,Federal+Trade+Commission,hackers,Identity+Theft,online+shopping&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg"><img class="aligncenter  wp-image-1905" title="online-shopping" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg" alt="" width="476" height="316" /></a></p>
<p>According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> measures in order to avoid illegal online activity.  Of the 1.4 billion dollars spent in online sales during 2011’s holiday shopping season (November 1 to December 31), $82 million of those dollars were identified as fraudulent, resulting in a 219% increase from 2010.  Cyber Monday alone accounted for $2.5 million of online fraud.</p>
<p>Most web-based fraud activity is due to stolen credit cards and since <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is at an all time high, online merchants of all sizes need to implement fraud protection procedures and be proactive in watching for signs of unscrupulous activity.  Early detection is the key to stopping con artists who like to prey on new, inexperienced online businesses.  However, if they discover a merchant has implemented active data security procedures, fraudsters generally won’t waste their time and will most likely move on to their next victim.  The best way for businesses to protect themselves from fraud is to be diligent in watching out for signs of suspicious activity.  These include bulk orders for items that are not usually bought in bulk, orders for multiple high end items, international orders and several orders placed by the same person within a short time.  Con artists try to make as many purchases as possible before a fraud alert is sent to the real owner so they tend to order as much merchandise as they can.</p>
<p>Although it’s impossible to erase online credit card fraud, here are several strategies to reduce it:</p>
<ol start="1">
<li>Use an Address Verification Service (AVS) to make sure the billing address entered online matches the cardholder’s billing information. Institute a policy that merchandise will not ship unless the addresses match.</li>
<li>Always ask for the Card Verification Number (CVN) on all credit card orders. The number must be read from the actual card so more than likely the person has the card in his possession. Although it’s not a guarantee that he is its rightful owner, this step provides a small measure of protection.</li>
<li>Send a confirmation email or letter to customers when you send an item telling them their order has shipped and when they can expect it to appear on their bill. This can help flag any illegal activity and enable the customer to report credit fraud to the proper authorities before the perpetrator has a chance to do any further credit damage. It will also help businesses to reduce complaints and chargebacks from people who sometimes simply forget they placed an order.</li>
</ol>
<p>Retailers should keep in mind that once an order has been sent, it is very difficult to regain any loss so prevention is the number one way to combat online fraud.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/&via=Experian_DBR&text=Online holiday shopping is also big business for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F&amp;title=Online%20holiday%20shopping%20is%20also%20big%20business%20for%20fraudsters" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The next big cyber security threat: Your fingers</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/#comments</comments>
		<pubDate>Tue, 27 Nov 2012 19:43:27 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[typo-squatting]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1832</guid>
		<description><![CDATA[We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,data+privacy,Data+Security,typo-squatting&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg"><img class="aligncenter  wp-image-1836" title="typo-squatting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg" alt="" width="491" height="266" /></a></p>
<p>We’re all familiar with well-known causes of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data security breaches</a><strong> </strong>and<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity fraud</a>; phishing, malware attacks, and lack of <a href="http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/">cyber security</a><strong> </strong>protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of <a href="http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/">data breaches</a> is surprisingly, a person’s typing skills due to the fact that a simple typo can lead to typo-squatting also known as URL hijacking.</p>
<p>Typo-squatters count on accidental misspellings and typing errors of web addresses in a web browser’s address bar to get people to their page which can often be unscrupulous hacker sites designed to extract a person’s private information.  Typo-squatters buy up domains that are similar to popular domain addresses to lie in wait for web surfers to make typing mistakes which is now even more widespread with the popularity of touch screen devices.  For example, instead of typing dot-com, you mistakenly type dot-org and are transferred to an authentication or login page that asks you to input your account information and password before proceeding.  These pages are actually typo-squatted pages that were created to not only steal your information but they can also make you vulnerable to a computer virus or <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">identity theft</a>.  The most dangerous scenario is when a person uses the same user name and password for every website since a hacker then can access financial information such as banking and credit cards accounts using the stolen log-in information.  </p>
<p>Typo-squatters can also cause a <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">business data breach</a><strong> </strong>by<strong> </strong>creating<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/">doppelganger domains</a> for large companies that use subdomains for their various worldwide offices.  Business emails are intercepted when a user mistypes a recipient’s e-mail address.  Using a doppelganger domain, a hacker configures an email server to intercept any correspondence addressed to a person with that name.  Extra large companies with many subdomains are at the biggest risk since they have more employees with more email addresses which means more chances for typos.<strong></strong></p>
<p>A key way to practice <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data breach protection</a> in preventing typo-squatting is to use a search engine to find a website instead of directly typing in the web address especially if you are searching for a financial institution.  All the big search engines will have companies’ legitimate web addresses as well as <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">data protection and security</a><strong> </strong>software to<strong> </strong>scan for malware and prevent hacking.  Common sense is also another powerful tool to prevent a <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">breach of data;</a> if a site doesn’t look right, it probably isn’t so exit quickly and try again through a search engine.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/&via=Experian_DBR&text=The next big cyber security threat: Your fingers&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F&amp;title=The%20next%20big%20cyber%20security%20threat%3A%20Your%20fingers" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/#comments</comments>
		<pubDate>Wed, 07 Nov 2012 00:30:44 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1797</guid>
		<description><![CDATA[As Superstorm Sandy demonstrated to the East Coast during the last week of National Cyber Security Awareness Month; life happens so do you know where your data is? Data breach protection is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national cyber [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F07%2Fsuperstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/data-protection.jpg"><img class="aligncenter  wp-image-1798" title="data protection" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/data-protection.jpg" alt="" width="486" height="324" /></a></p>
<p>As Superstorm Sandy demonstrated to the East Coast during the last week of <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">National Cyber Security</a> Awareness Month; life happens so do you know where your data is?</p>
<p><a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/">Data breach protection</a> is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national <a href="http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/">cyber security</a> protection at an event in Washington.  During her speech, Napolitano spoke about how Sandy’s devastation left many financial institutions vulnerable to <a href="http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/">business data breaches</a><strong> </strong>due to lack of electricity and other utilities.  She also highlighted the exorbitant <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">costs of a data breach</a> which total billions of dollars annually and are generally paid for by consumers and companies.  From Washington to Wall Street, Superstorm Sandy was a forceful reminder the best thing businesses can do to mitigate natural disasters is to have a <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> plan in place to not only protect their business data but to ensure that their disaster recovery time is brief, enabling their business to return to functioning as quickly as possible.</p>
<p>In developing an IT disaster recovery plan, companies need to first address the potential threats to hardware and data caused by natural disasters. Earthquakes can destroy physical infrastructures and floods can prevent offices from being accessed for days until the water subsides, creating a need for long term <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">business data breach</a> protection.  And hurricanes such as Sandy create both problems, potentially destroying hardware and software.  Therefore, the most effective way a business can protect itself from a breach of data in the event of a natural disaster is to implement a strategy that combines <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">data protection solutions</a> with a disaster recovery plan.</p>
<p>Since IT systems are comprised of hardware, software, data and connectivity, without one component, business recovery will be halted.  An IT recovery plan needs to address how to deal with the loss of each of these parts.  First, every recovery strategy needs to create an inventory list of hardware, software applications and data.  Then there must be a plan as to how to replicate and reimage hardware if the hardware is destroyed.  Next, copies of software programs need to be accessible for re-installation with multiple copies kept in more than one place.  The final piece of a data recovery plan is to reclaim the actual data so it is crucial that all business data is constantly backed up and protected using data protection solutions that are reliable and accessible.  Companies then should periodically test their recovery plan to make sure that it works.</p>
<p>Recovering from a disaster is not all about technology; a company’s disaster recovery strategy needs resources such as people, processes and a plan.  However, if a company is well prepared and their recovery plan is well-executed, their disaster recovery time will be less and hopefully, less painful.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/&via=Experian_DBR&text=Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F07%2Fsuperstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature%2F&amp;title=Superstorm%20Sandy%E2%80%99s%20wake-up%20call%3A%20Is%20your%20data%20protected%20from%20Mother%20Nature%3F" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Companies Beware: Cyber security escalates in importance</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/#comments</comments>
		<pubDate>Tue, 09 Oct 2012 17:35:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1660</guid>
		<description><![CDATA[How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F09%2Fcyber-security-escalates-in-importance%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,Data+Breach,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg"><img class="aligncenter  wp-image-1665" title="Communications connectivity" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg" alt="" width="448" height="335" /></a></p>
<p>How important is <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html ">cyber security</a>? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.</p>
<p>So important that a top U.S. cyber warrior is recommending that his cyber command division be elevated into a top-level military unit under the Department of Defense. The Cyber Command, created two years ago, is currently under the U.S. Strategic  Command, which is responsible for U.S. nuclear and space operations.</p>
<p>Rear Admiral Samuel Cox, the cyber command’s top intelligence officer, believes his unit needs more power to combat the growing number of cyber threats facing the nation, according to Reuters. Many of those threats come from foreign hackers who are trying to pierce the Pentagon’s computer networks to obtain highly-classified information.</p>
<p>But cyber attacks aren’t just a threat to the military. Look at the numerous banks that experienced online outages due to cyber attacks in the past few weeks. And what about the flurry of data breaches reported this year by healthcare organizations?</p>
<p>The fact is that no organization &#8211; large or small &#8211; is immune from cyber attacks, hackers or simply the loss of a portable device containing the personal identifying information of consumers. Every organization and &#8211; every individual for that matter &#8211; needs to take cyber security seriously. And what better time to check on your security measures than during <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html">National Cyber Security Awareness Month</a>. So here’s a checklist to help you keep your data safe.</p>
<ul>
<li> Install the most up-to-date firewall, anti-spam and anti-virus software.</li>
<li>Establish policies for handling sensitive data, mobile devices and computers. Educate everyone from C-suite executives to employees to contractors and vendors.</li>
<li>Upload patches to fix any problems with your software programs.</li>
<li>Use passwords on laptops, computers and mobile devices. Educate employees and contractors on the importance of using long, strong passwords.</li>
<li>Encrypt laptops and mobile devices. Also encrypt sensitive files.</li>
<li>Back up sensitive files and properly dispose of files you no longer need. Store backup data in a separate location &#8211; ideally off-site &#8211; from your main servers. To dispose of sensitive data, you should physically destroy the hard drive that contains the data. Otherwise, someone may be able to retrieve that data if the computer is sold or donated.</li>
</ul>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_100912_article_CTA">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/&via=Experian_DBR&text=Companies Beware: Cyber security escalates in importance&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What does increased enforcement mean to you?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/#comments</comments>
		<pubDate>Tue, 18 Sep 2012 17:33:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1618</guid>
		<description><![CDATA[&#160; Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Compliance,Fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg"><img class="aligncenter  wp-image-1627" title="Healthcare costs" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg" alt="" width="458" height="305" /></a></p>
<p>Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage.</p>
<p>The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance plans. These tools include technology that’s being used to spot fraud and suspicious activity before any claims are paid.</p>
<p>The law is also creating partnerships between government agencies and private organizations that are working together to fight fraud and health care abuse. One of the more visible examples of this increased collaboration is the Health Care Fraud Prevention and Enforcement Action Team or “HEAT,” which is a joint effort between the U.S. Department of Health and Human Services and the Department of Justice. </p>
<p>So where do you fit into this battle against health care fraud? What defense counsel advice could you give your clients in this era of increased enforcement?</p>
<p>Join us at the Fraud &amp; Compliance Forum to find out. Experian will be one of the exhibitors at the conference, which will be held Sept. 30-0ct. 2, in Baltimore, MD. The forum is sponsored by the American Health Lawyers Association (AHLA) and the Health Care Compliance Association (HCCA).  It will feature speakers from the Inspector General’s Office, Department of Justice and Centers for Medicare and Medicaid Services, along with private practitioners.</p>
<p>In addition to discussing increased enforcement, there will also be sessions on some of the following topics:</p>
<ul>
<li>50 Shades of Gray: Strategies for hospital-physician alignment in the light of recent developments</li>
<li>CIAs: What enhanced Corporate Integrity Obligations tell us about OIG expectations for compliance programs</li>
<li>Compliance, criminal and civil liability for overpayments</li>
<li>Strategies for a medical necessity case</li>
<li>Exit strategies for voluntary disclosures</li>
</ul>
<p>For more information, call HCCA at 888-580-8373 or visit <a href="http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx" class="broken_link" rel="nofollow">http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/&via=Experian_DBR&text=What does increased enforcement mean to you?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F&amp;title=What%20does%20increased%20enforcement%20mean%20to%20you%3F" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three things you should never do to identity theft victims</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 18:16:31 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1555</guid>
		<description><![CDATA[Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg"><img class="aligncenter size-full wp-image-1558" title="Identity_Theft_Victim" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg" alt="" width="371" height="282" /></a></p>
<p>Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft.</p>
<p>In fact, 90% of the respondents in a <a title="Ponemon Institute: Third Annual Study on Medical Identity Theft " href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">recent study </a>knew the definition of medical identity theft this year, compared with 77% last year, according to the Ponemon Institute.</p>
<p>Awareness of the crime, along with its number of victims, is obviously rising. But interestingly, a majority of victims are either not sure what to do or don’t do anything about having their medical identities stolen. What about your organization? Does it know what to do?</p>
<p>Here are three things you should never do if your organization experiences a data breach that puts patients or consumers at risk of identity theft:</p>
<ul>
<li>Ignore the incident thinking no one will find out</li>
<li>Take one year or longer to notify potential victims. Or even worse, don’t notify them at all if you’re not required to do so by law.</li>
<li>Don’t offer any compensation or services to help potential victims</li>
</ul>
<p>So what should you do? Here’s what people expect when their medical records are lost or stolen.</p>
<p>1)      Reimbursement for the cost of finding another provider. If you’re a doctor, this may seem worse than it actually is, as most victims take no action. But if they do leave, reimbursing them is an act of goodwill that can only benefit your organization in the long run.</p>
<p>2)      <a title="Ponemon Institute: 2012 Consumer Study on Data Breach Notification " href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">To be notified of the loss </a>or theft within 30 days. It may behoove you to be honest and forthright. Some organizations maintained the loyalty of their patients by issuing a press release and developing a website dedicated to the breach.</p>
<p>3)      To be provided with free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity protection </a>for one year.</p>
<p>The best remedy for identity theft is to avoid it altogether by taking precautions to protect data and train your staff on security measures. But if you do experience a breach that leads to identity theft, the best thing you can do is help your victims. It’s not only the right thing to do, it’s also the best way to protect your brand and reputation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_082112_article">Download your free Data Breach Response Guide! </a></div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/&via=Experian_DBR&text=Three things you should never do to identity theft victims&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F&amp;title=Three%20things%20you%20should%20never%20do%20to%20identity%20theft%20victims" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three data protection strategies to catch a “phish”</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/#comments</comments>
		<pubDate>Tue, 31 Jul 2012 23:38:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1509</guid>
		<description><![CDATA[Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Security,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg"><img class="aligncenter size-full wp-image-1523" title="phishing1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg" alt="" width="500" height="334" /></a></p>
<p>Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected.</p>
<p>So how does an organization protect data from vicious phishing and spear-phishing attacks?</p>
<p>Here’s a comprehensive data loss protection plan:</p>
<p><strong>1) Protect your organization’s computers. </strong>Shop for the newest software that provides spam filters, firewalls, anti-virus, anti-spyware and reputation services. Look for data protection programs that offer automatic updates and free patches from manufacturers to fix problems.</p>
<p><strong>2) Consider hiring a vendor that specializes in software data security. </strong>Data security firms can go beyond traditional data protection programs and conduct audits to determine your risk for phishing and data breach. They can isolate emails that have been quarantined and scan outbound emails to see if any data has been extracted outside of your organization. As experts, they can also provide technical support with the latest email data security technology. Be careful, however, not to overlap your own software with that provided by the vendor or you may be spending too much.</p>
<p><strong>3) Educate your computer users. </strong>Data security software is far from full proof so perhaps the most important cyber security strategy is to keep educating your users. Remind them:</p>
<ul>
<li>To be suspicious of emails with generic salutations, typos or those that try to create a sense of urgency.</li>
<li> Not to open attachments they aren’t expecting. If the attachment looks legitimate, ask your users to call the person to verify that they really did send it.</li>
<li>To be wary of email links. Instead of clicking on the link, users may want to visit the website manually by typing the address into their browser. They can also check a link by hovering their mouse over it to see where it came from.</li>
</ul>
<p><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Resolution Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_073112_article  ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div><strong></strong></p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/&via=Experian_DBR&text=Three data protection strategies to catch a “phish”&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F&amp;title=Three%20data%20protection%20strategies%20to%20catch%20a%20%E2%80%9Cphish%E2%80%9D" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A mobile test of human threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/#comments</comments>
		<pubDate>Tue, 17 Jul 2012 20:39:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1447</guid>
		<description><![CDATA[Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F17%2Fa-mobile-test-of-human-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,Fraud,hackers&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/mobile-threats.jpg"><img class="aligncenter size-full wp-image-1451" title="mobile threats" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/mobile-threats.jpg" alt="" width="402" height="330" /></a></p>
<p>Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down.</p>
<p>In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with fake corporate and personal information.  The phones included a tracking device so Symantec could monitor what happened once the devices were found.  The purpose of the test was to assess the human threats to a lost smartphone’s data and the connected corporate systems.  Specifically, Symatec set out to assess the following circumstances: </p>
<p>● Likelihood of a finder attempting to access data on the smartphone<br />
● Likelihood of a finder attempting to access corporate applications and data<br />
● Likelihood of a finder attempting to access personal applications and data<br />
● Likelihood of attempted access to particular types of apps<br />
● Amount of time before a lost smartphone is moved or accessed<br />
● Likelihood of a finder attempting to return a device to its owner<br />
 <br />
On every count, the results were a disappointment to anyone hoping for better from their fellow mankind.  Bottom line: if you lose your business-connected mobile device, there’s more than an 80% chance that an attempt will be made to breach corporate data and/or networks.  A total of 83% of the devices showed attempts to access corporate-related apps or data, and attempts to access a corporate email client occurred on 45% of the devices.  A file titled “HR Salaries” was accessed on 53% of the phones and another titled “HR Cases” was accessed on 40% of the devices.</p>
<p>The study underscored yet again that businesses must impress upon employees the importance of adhering to strict security guidelines regarding their mobile devices.  What does that look like?  Here are five key reminders:<br />
   <br />
1. Require that employees use <a title="Do passwords pass the hack test?" href="http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/">password protection </a>on all electronic devices especially if they use it to access work related files and email.<br />
2. Implement software that allows you to use remote wiping so a device can be killed if its lost or untraceable.<br />
3. Invest in employee <a title="Preparing for a data breach" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/">training and education </a>about <a title="Are you hiding after a data breach?" href="http://www.experian.com/blogs/data-breach/2012/01/31/947/">data breaches </a>and the impact it has not only on the business but also on the employees themselves since most people also program their personal information into business devices.<br />
4. Account for every device that has access to your company’s networks and take inventory often so nothing slips through the cracks or gets lost.<br />
5. Use business security software for all your electronic devices and implement a security management program. When a device is lost or stolen, have a recovery system in place so employees know what to do immediately in order to prevent any lost of data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/&via=Experian_DBR&text=A mobile test of human threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F17%2Fa-mobile-test-of-human-threats%2F&amp;title=A%20mobile%20test%20of%20human%20threats" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The compliance risks of social media</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/#comments</comments>
		<pubDate>Tue, 29 May 2012 15:49:04 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1274</guid>
		<description><![CDATA[Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg"><img class="aligncenter size-full wp-image-1277" title="social_media" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg" alt="" width="381" height="315" /></a></p>
<p>Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory obligations using social media platforms. </p>
<p>According to the report, critical reliance on third parties for information collection and capture, rapidly rising social media content volume and fast-changing applications, and the difficulty of ensuring authentication all make it difficult for security professionals to keep up with the<a title="Create a social media policy to protect you and your employees" href="http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/"> legal and regulatory compliance </a>associated with social media.</p>
<p>The report suggested that security pros should look to financial services for guidance on social media risks, keeping in mind that retention obligations clearly apply to social media, retention obligations also apply to both corporate- and employee-owned mobile devices, and firms should monitor and provide ongoing training to employees.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_052912_article ">Download this free checklist</a> to learn what steps to take when it&#8217;s go-time for data breach response. </div></div>
<p>Above all, critical steps that security professionals must take in order to respond to the risks that social media poses include the following:</p>
<p>1.  Build effective policies governing social media usage in your enterprise.<br />
Your <a title="Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/">social media policy </a>should cover what your organization will and will not do online, what your employees can and cannot do, and what members of the public can and cannot do on your social media sites.</p>
<p>2.  Determine how tools that control social media fit into broader information governance.<br />
Look before you leap when it comes to adopting tools that help enforce social media controls and make sure they’ll integrate with your company’s existing systems.</p>
<p>3.  Incorporate flexibility and continuous monitoring in social media.<br />
Social media is constantly innovating end evolving &#8211; your organization will need to do so as well.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/&via=Experian_DBR&text=The compliance risks of social media&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F&amp;title=The%20compliance%20risks%20of%20social%20media" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Healthcare breaches &amp; fraud are here to stay</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/#comments</comments>
		<pubDate>Tue, 15 May 2012 14:49:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1213</guid>
		<description><![CDATA[Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg"><img class="aligncenter size-full wp-image-1224" title="electronic-medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg" alt="" width="425" height="282" /></a></p>
<p>Don’t expect <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">medical breaches</a> and healthcare fraud to drop off the radar anytime soon. Here’s why.</p>
<p>First, the number of breaches in the industry is still escalating. In 2011, <a title="5 Differentiating factos of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/" target="_blank">healthcare breaches</a> occurred 32% more frequently than in 2010.<sup>1</sup></p>
<p>Second, the profitably of medical records on the black market is high – 192% more profitable than Social Security numbers. Estimates put the former at $50 and the latter at $1, according to a GovTech.com article.</p>
<p>It’s this frequency and profitability that, in part, help to ensure the continuation of data loss and fraud. The sooner the industry accepts and prepares for incidents, the better.</p>
<p>Healthcare organizations still have a lot to do in that regard. Forty-three percent rank their ability to counter internal and external data security threats as “needs improvement,” “poor” or “failing.”<sup>2</sup> And their actions – or lack thereof – can adversely affect patients. Medical identity theft can cost a consumer $20,663 to resolve.<sup>3</sup></p>
<p> So what exactly is compromising data security at healthcare organizations? In a recent study, most organizations (54%) agreed that a lack of budgetary resources dedicated to security and privacy is the greatest weakness in preventing a breach.<sup>4</sup> The study also named the top three causes of data breaches as:</p>
<ul>
<li>Lost or stolen computing devices</li>
<li>Third-party errors</li>
<li>Unintentional employee actions<sup>5</sup></li>
</ul>
<p>Looking at the list, it’s clear that budgeting for security and privacy needs to encompass protecting mobile and other computing devices, training employees and verifying that third party partners uphold a high level of security as well.</p>
<p>Without a well-rounded approach to data security, organizations make themselves even more vulnerable at a time when vulnerability is a given. Organizations big and small can’t do without computers, third parties and employees – or at least two of the three. So the risk of a breach and resulting fraud can never be completely eradicated. Human error alone is impossible to eliminate.</p>
<p>But risks can be managed with a comprehensive plan that addresses a full spectrum of weaknesses and threats. A plan that includes access controls and encryption for sensitive data as well as a response guide to handling a data breach if one occurs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_051512_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now! </a></div></div>
<p>[footnotes]</p>
<p>1. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
2. Healthcare Information Security Today (2011)<br />
3. Second Annual National Study on Medical Identity Theft, Ponemon Institute (2011)<br />
4. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
5. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/&via=Experian_DBR&text=Healthcare breaches & fraud are here to stay&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F&amp;title=Healthcare%20breaches%20%26%20fraud%20are%20here%20to%20stay" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>