<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; mbruemmer</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/mbruemmer/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Little progress made in the prevention of medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/#comments</comments>
		<pubDate>Tue, 01 Jan 2013 16:32:55 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1919</guid>
		<description><![CDATA[Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been 495 medical data breaches involving 21 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security,HIPAA,HITECH+Act,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> has made very little improvement according to the latest <a href="http://www.hitrustalliance.net/breachreport/HITRUST%20Report%20-%20U.S.%20Healthcare%20Data%20Breach%20Trends.pdf" class="broken_link" rel="nofollow">study</a> from Health Information Trust Alliance (HITRUST)<sup>1</sup>.  The study reports that from 2009 to the first half of 2012, there have been 495 <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">medical data breaches</a> involving 21 million records costing roughly $4 billion.  Government organizations including VA hospitals accounted for the highest number of lost records and the states with the most health care data breaches are California, Texas and New York.  Since 2009 the total number of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breaches</a> at hospitals and health systems decreased only slightly but increased at smaller private physician practices, which accounted for more than 60% of the 459 breaches reviewed in the study.</p>
<p> The report also found that the majority of breaches (70 percent) were electronic and the leading cause data breach incidents were due to stolen devices such as laptops and mobile media.  However, paper records still play a role in data breaches, totaling 24 percent of medical data breaches, second only to lost laptops.  Mailing errors and improper disposal of records were the main reasons for paper-based breaches. </p>
<p>The Health Information Technology for Economic and Clinical Health (HITECH) Act states that healthcare organizations have 60 days in which to notify victims about a data breach but over 50 percent of companies failed to meet this deadline after a breach.</p>
<p>And it may get worse before it gets better if the medial industry does not find a way to protect themselves from BYOD (bring your own device) policies.  BYOD has become commonplace at smaller physician offices where medical personnel commonly look up patient information on their own smartphones without sufficient encryption or passwords in place which could pose a problem in the event that the device is lost.  In addition, due to the smaller sizes of this group, they lack the resources and awareness to properly arm themselves with the proper data breach protection<strong> </strong>in all areas of their practice.<strong>  </strong>This could expose a larger problem for the entire healthcare industry since community health records and health information is often shared between medical institutions of all sizes. </p>
<p>&nbsp;</p>
<p><sup>1</sup> HITRUST is a non-profit coalition of healthcare, business, technology and information security leaders, established to insure information security is a core value in the broad adoption of health information systems and exchanges.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/&via=Experian_DBR&text=Little progress made in the prevention of medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F&amp;title=Little%20progress%20made%20in%20the%20prevention%20of%20medical%20data%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: The security of patient data in a virtual universe</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/infographic-the-security-of-patient-data-in-a-virtual-universe/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/infographic-the-security-of-patient-data-in-a-virtual-universe/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 22:39:27 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1883</guid>
		<description><![CDATA[Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2Finfographic-the-security-of-patient-data-in-a-virtual-universe%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=%23databreach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/Infographic_-The-security-of-patient-data-in-a-virtual-universe3.jpg"><img class="aligncenter  wp-image-1891" title="Infographic_ The security of patient data in a virtual universe" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/Infographic_-The-security-of-patient-data-in-a-virtual-universe3.jpg" alt="" width="649" height="741" /></a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/infographic-the-security-of-patient-data-in-a-virtual-universe/&via=Experian_DBR&text=Infographic: The security of patient data in a virtual universe&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2Finfographic-the-security-of-patient-data-in-a-virtual-universe%2F&amp;title=Infographic%3A%20The%20security%20of%20patient%20data%20in%20a%20virtual%20universe" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/infographic-the-security-of-patient-data-in-a-virtual-universe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>‘Tis the season for National Identity Theft Prevention and Awareness</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/04/tis-the-season-for-national-identity-theft-prevention-and-awareness/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/04/tis-the-season-for-national-identity-theft-prevention-and-awareness/#comments</comments>
		<pubDate>Tue, 04 Dec 2012 18:38:12 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1844</guid>
		<description><![CDATA[December is not only the shop ‘til you drop season, it’s also National Identity Theft Prevention and Awareness month, reminding retailers and businesses that they need to not only protect themselves from a data breach but also make their employees aware of identity fraud scammers who target seasonal help.  According to the Federal Trade Commission, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F04%2Ftis-the-season-for-national-identity-theft-prevention-and-awareness%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/tis-the-season-identity-theft1.jpg"><img class="aligncenter size-full wp-image-1849" title="tis-the-season-identity-theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/tis-the-season-identity-theft1.jpg" alt="" width="400" height="311" /></a></p>
<p>December is not only the shop ‘til you drop season, it’s also National Identity Theft Prevention and Awareness month, reminding retailers and businesses that they need to not only protect themselves from a <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">data breach</a> but also make their employees aware of <a href="http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/">identity fraud</a> scammers who target seasonal help.  According to the Federal Trade Commission, <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is the number one type of consumer fraud in the U.S., resulting in about 9 million people annually having their identity stolen.  In 2011, eight percent of reported identity theft incidents were employment-related.  Thieves usually exploit their victims by impersonating them after stealing their Social Security number and credit card information or worse, selling valuable Social Security numbers on the black market.</p>
<p>Companies need to protect themselves from an identity theft “double whammy” in which cyber thieves attack hiring employers and job applicants at the same time through online job scams.  Fraudsters will first pose as a representative of a legitimate business and list fake job listings, sometimes even going so far as to create bogus websites in order to steal personal information of potential employees.  Cyber thieves take advantage of the fact that many times, job seekers are desperate for work and will give out personal information willingly in exchange for potential employment.</p>
<p>Here are some tips for employers to minimize data breaches when hiring:</p>
<p>1)       Avoid using Social Security numbers to identify applicants.</p>
<p>2)       Collect only essential personal information needed for the job application.</p>
<p>3)       Shred unnecessary documents on non-hired applicants and former employees, including temps and contract workers.</p>
<p>4)       For existing employees, do not keep medical records, EEO data, immigration forms and background check information in personnel files.</p>
<p>5)       Have a data breach response and notification plan in place. Act quickly if a data breach occurs.</p>
<p>Data security experts warn that simply having data protection and security policies are not enough.  The policies need to be taken seriously by everyone at the company and the regulations need to be firmly enforced.  In addition, the repercussions and cost of a data breach need to be explained to employees on every level since companies can be held liable for negligence in handling personal data and fined by the FTC and other government agencies.  All departments, including human resources and accounting should be well-trained in protection from identity theft procedures and data security information policies.  Employees who have access to personnel data should be carefully screened and pass a security clearance.  Businesses should also periodically review their data storage processes and determine whether or not to keep the information and how to keep it protected.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/04/tis-the-season-for-national-identity-theft-prevention-and-awareness/&via=Experian_DBR&text=‘Tis the season for National Identity Theft Prevention and Awareness&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F04%2Ftis-the-season-for-national-identity-theft-prevention-and-awareness%2F&amp;title=%E2%80%98Tis%20the%20season%20for%20National%20Identity%20Theft%20Prevention%20and%20Awareness" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/04/tis-the-season-for-national-identity-theft-prevention-and-awareness/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Feds seek remedies for medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 13 Nov 2012 18:13:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1806</guid>
		<description><![CDATA[As medical data breaches continue to spike, the federal government is seeking remedies to try and prevent medical identity theft.   Nearly 21 million Americans are at risk of having their medical identities stolen after having their healthcare records exposed in data breaches.1 And that’s just since September 2009, when a new breach notification rule took [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F13%2Ffeds-seek-remedies-for-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/medical-identity-theft.jpg"><img class="aligncenter size-full wp-image-1810" title="medical identity theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/medical-identity-theft.jpg" alt="" width="424" height="283" /></a></p>
<p>As medical data breaches continue to spike, the federal government is seeking remedies to try and prevent medical identity theft.  </p>
<p>Nearly 21 million Americans are at risk of having their medical identities stolen after having their healthcare records exposed in data breaches.<sup>1</sup> And that’s just since September 2009, when a new breach notification rule took effect and the U.S. Department of Health and Human Services (HHS) began enforcing the rule and tracking healthcare breaches.  </p>
<p>As the problem continues to worsen – theft of medical data increased by 50% last year<sup>2</sup> – the federal government is looking for ways to both stem the tide of breaches and help consumers whose medical records have been exposed.    </p>
<p>The Centers for Medicare and Medicaid Services (CMS) – which provides coverage to 100 million people &#8211; can play an important role in this effort. As the single largest healthcare payer in the nation, CMS can help consumers by responding to breaches a little quicker and by providing more information in its notifications, according to the HHS Office of the Inspector General (OIG).</p>
<p>But the OIG’s recommendations can apply to all healthcare organizations that want to help their patients, clients or employees whose personal information has been exposed due to a data breach. </p>
<p>OIG officials believe if organizations send out breach notifications on-time and provide enough information, then potential victims can take steps to protect themselves. They can be more diligent about checking their credit reports, financial statements and medical records. They can also subscribe to credit and identity monitoring services, if these services aren’t already provided to them by their organizations.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_111312_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers.</a></div></div>
<p>If everyone does their part, perhaps the healthcare industry will eventually see the tide turn on data breaches and medical identity theft.</p>
<p><sup> </sup></p>
<p><sup> </sup></p>
<p><sup>1</sup> U.S. Department of Health and Human Services Office for Civil Rights.</p>
<p><sup>2</sup> Identity Theft Resource Center</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/&via=Experian_DBR&text=Feds seek remedies for medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F13%2Ffeds-seek-remedies-for-medical-identity-theft%2F&amp;title=Feds%20seek%20remedies%20for%20medical%20identity%20theft" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three tips for choosing a cloud provider</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/#comments</comments>
		<pubDate>Tue, 23 Oct 2012 23:44:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cloud provider]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1688</guid>
		<description><![CDATA[To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cloud+provider,data+privacy,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg"><img class="aligncenter  wp-image-1692" title="choosing-cloud-provider" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg" alt="" width="488" height="296" /></a></p>
<p>To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure <a href="http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/">cloud storage</a> really is.</p>
<p>Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when using a cloud provider:</p>
<p><strong>Look for robust authentication:</strong> If a cloud provider offers a one-step login, i.e. password-only security, that’s a red flag. If there’s just a single password standing between your sensitive data and hackers, how long until that password gets cracked? Or it could be accidentally or <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">maliciously shared</a> with the wrong person or written down on a piece of paper that’s later lost. The bottom line is, you need more than a password. Look for and use a cloud provider that has a robust login and authentication process. Yes, it takes longer every time you log in. But it also helps to keep hackers out. Be sure to change your passwords and other authentication data regularly. And remember that not everyone in your organization needs to know how to access the cloud.</p>
<p><strong>Take your time:</strong> It’s good to be cautious when you’re talking data storage, especially when it’s an outsourced service. So take your time choosing a cloud provider. Ask questions about what security measures are in place and how they are maintained. A dependable cloud provider should be able to answer all of your questions quickly. That likely means they know their service well and have anticipated your concerns. If you’re getting the runaround or don’t feel confident with the answers you’re receiving, look elsewhere. There’s not just one cloud in the sky.</p>
<p><strong>Sign on the dotted line:</strong> You’ve thoroughly vetted a cloud provider’s security and authentication measures and have determined you’ll actually have a higher level of security using the cloud than with internal, on-site storage. You’ve asked about risk management, documented policies, incident preparedness, encryption levels, employee training and all of your other concerns. You’ve conducted a thorough audit and you’re happy with what you’ve found. Then and only then enter into a service agreement with a cloud provider.</p>
<p>Just remember that any type of <a href="http://www.experian.com/data-breach/cyber-security.html">cyber security</a> is never foolproof and new threats constantly emerge in the cyber world. So keep up with what’s going on at your cloud provider and keep access to the cloud restricted only to individuals in your organization who really need it. If one of those individuals leaves your organization, change all of your cloud passwords and authentication data at once.</p>
<p>The fewer people who have access to your sensitive data – both inside and outside your organization – the more secure it is.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/&via=Experian_DBR&text=Three tips for choosing a cloud provider&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F&amp;title=Three%20tips%20for%20choosing%20a%20cloud%20provider" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IAPP Privacy Academy: Will you be there?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/#comments</comments>
		<pubDate>Tue, 25 Sep 2012 07:00:54 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[IAPP]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1633</guid>
		<description><![CDATA[Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an Apple® MacBook Air.

]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F25%2Fiapp-privacy-academy-will-you-be-there%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,data+breach+response,IAPP&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/conference_room1.jpg"><img class="aligncenter  wp-image-1638" title="conference_room" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/conference_room1.jpg" alt="" width="480" height="357" /></a></p>
<p>You see stories about data breaches all the time. Earlier this month, in fact, a small medical facility was fined $1.5 million following a data breach that resulted from a stolen, unencrypted laptop. News like that makes security, legal and compliance professionals shudder. But could the medical facility have avoided that fine? Absolutely. What about after a data breach? What happens during the recovery and remediation process? Do you know what you should do and shouldn’t do to avoid fines and litigation?    </p>
<p>Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the <a title="IAPP Website" href="https://www.privacyassociation.org/events_and_programs/iapp_privacy_academy_2012/breakout_sessions15" rel="nofollow" target="_blank" class="broken_link">IAPP Privacy Academy</a> in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an Apple® MacBook Air.</p>
<p>I will be participating on the data breach panel to discuss the best ways to respond to a breach to avoid potential fines and legal action. The panel will also discuss how to protect your customers or patients to maintain their loyalty and how to recover losses through insurance. You’ll leave with:</p>
<ul>
<li>Key lessons from significant breaches and  issues arising from their investigations, including consequences and challenges</li>
<li>Best practices for handling some of the most unusual situations</li>
<li>Tips for handling notification and communication effectively</li>
</ul>
<p>For more information about the IAPP Privacy Academy<a title="Data Breach Events page" href="http://www.experian.com/data-breach/events.html" target="_blank"> click here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/&via=Experian_DBR&text=IAPP Privacy Academy: Will you be there?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: Our clients speak out</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/#comments</comments>
		<pubDate>Tue, 11 Sep 2012 21:12:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1603</guid>
		<description><![CDATA[Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our services. Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Finfographic-our-clients-speak-out%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=%23databreach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our services.</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/experian-clients-speak-out.jpg"><img class="aligncenter size-full wp-image-1614" title="experian-clients-speak-out" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/experian-clients-speak-out.jpg" alt="" width="612" height="792" /></a></p>
<p style="text-align: center;">
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/&via=Experian_DBR&text=Infographic: Our clients speak out&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Finfographic-our-clients-speak-out%2F&amp;title=Infographic%3A%20Our%20clients%20speak%20out" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/#comments</comments>
		<pubDate>Tue, 28 Aug 2012 20:29:00 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1564</guid>
		<description><![CDATA[The U.S. tops Germany, the U.K. and France when it comes to data breach notification costs. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen. The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png"><img class="aligncenter  wp-image-1565" title="data-breach-cost" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png" alt="" width="500" height="344" /></a></p>
<p>The U.S. tops Germany, the U.K. and France when it comes to<a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp"> data breach notification costs</a>. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen.</p>
<p>The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. companies an average of $561,500 to notify victims per breach, compared to $303,600 for German companies and $223,100 for companies in the U.K. Even more interesting, is that in some countries – like India and Australia – companies only spend an average of $31,000 (India) and $80,000 (Australia) to notify customers of a data breach. (All figures are U.S. dollars)</p>
<p>So why do American companies spend so much more on <a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">data breach notification</a>?</p>
<p>The answer is mainly due to numerous laws and regulations. Currently, 46 states have breach notification laws and several federal agencies, such as the Department of Health and<strong> </strong>Human Services, require organizations to notify potential victims when their unsecured protected health information is breached.</p>
<p>In contrast, countries without breach notification laws – like India and Australia – spend much less because they don’t have to notify all of their data breach victims. Countries like Germany and the U.K. have strict notification requirements, although not as tough as the U.S.</p>
<p>American companies and organizations may not be able to do much about notification costs, which are expected to continue to rise. But there are other measures that can be taken to lower the cost of a breach. For example:</p>
<ul>
<li>Negotiating a pre-breach agreement with a data breach resolution provider to lock in a good rate ahead of time.</li>
<li>A chief information security officer (CISO) who is responsible for enterprise data protection can reduce the cost of a breach by as much as $80 per record, according to the Ponemon Institute.</li>
<li>Increased loyalty by treating potential victims fairly and providing them with credit and/or identity protection can prevent the loss of customers and potentially save millions.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/&via=Experian_DBR&text=U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F&amp;title=U.S.%20beats%20Germany%2C%20U.K.%20and%20France%20when%20it%20comes%20to%20data%20breach%20notification%20costs%2C%20but%20why%3F" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>World-class scammers vie for Olympic gold</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 17:49:26 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1532</guid>
		<description><![CDATA[Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,Identity+Theft,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png"><img class="aligncenter  wp-image-1539" title="scammers vie for Olympic gold" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png" alt="" width="480" height="233" /></a></p>
<p>Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities.</p>
<p>One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets that are never delivered is another way unwary buyers are tricked into giving up personal and/or credit card information.</p>
<p><strong>Beware the cyber threats</strong></p>
<p>Acknowledging the widespread use of smartphones, tablets and similar devices to retrieve Games-related content, the UK’s national fraud reporting center, Action Fraud, cautions fans to browse wisely, warning that worms, viruses and other malware can penetrate mobile devices just as easily as PCs.</p>
<p>Top malware delivery threats listed on Action Fraud’s blog site include:</p>
<ul>
<li><strong>Search Engine Poisoning</strong> – The most prevalent form of malware delivery (40% of all malware infections), in which attackers link what appear to be legitimate search result “bait” pages to malware infected sites.</li>
<li><strong>Drive-by-Downloads</strong> – Technique that automatically downloads malware when devices interact with an infected website, email, pop-up ad or other apparently authentic Olympic content.</li>
<li><strong>Information Phishing</strong> – Disguised links from Facebook and Twitter abound this year. When clicked, infected links, in the shortened bit.ly/ format, for example, <a title="Data protection strategies to catch a phish" href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">can instantly extract, disable or destroy a device’s content or operating system.</a></li>
</ul>
<p><strong>Staying off the scammers’ scorecards</strong></p>
<p>A fraudster’s goal is to rip you off in record time and disappear into the shadows with their<br />
ill-gotten gains.  To avoid being victimized during the Olympics (or anytime) follow these common-sense rules for browsing and buying:</p>
<ul>
<li>Never click a link from someone you don’t know.</li>
<li>Avoid giving personal or credit card information to anyone whose identity and organization you can’t positively confirm.</li>
<li>For Olympics news or memorabilia, frequent only sites known to be credible and trustworthy, such as London2012.com.</li>
</ul>
<p>Such simple precautions can make for a winning Olympics experience, and help send the fakes, frauds and phonies home empty handed.</p>
<p>Have you or a friend encountered scammers during the Olympics? Take a minute to briefly share your story.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/&via=Experian_DBR&text=World-class scammers vie for Olympic gold&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F&amp;title=World-class%20scammers%20vie%20for%20Olympic%20gold" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Webinar: Data breaches can happen anytime, anywhere</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/#comments</comments>
		<pubDate>Thu, 19 Jul 2012 16:15:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1460</guid>
		<description><![CDATA[Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Identity+Theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg"><img class="aligncenter  wp-image-1469" title="data-breach-hacker" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg" alt="" width="509" height="339" /></a></p>
<p>Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being prepared for the inevitable.</p>
<p>I would like to invite you to participate in an informative webinar on this important issue. I will be joined by Dr. Larry Ponemon, a data protection “think tank” pioneer and Chairman of the Ponemon Institute, and Karen Murray, Vice President, Chief Compliance Officer of Steward Health Care System in a discussion focusing on the latest data breach trends, how to prepare for a data breach and the best ways to respond to a breach.</p>
<p>The 90-minute webinar, delivered in conjunction with the Health Care Compliance Association (HCCA), will be held at noon CST on July 25, 2012 and participants may be eligible for CEUs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Webinar: Preparing for the First 24 Hours of a Data Breach" href="http://www.experian.com/innovation/business-resources/data-breach-compliance-and-response.jsp?WT.srch=ecd_dbres_blog_070912_article">Webinar Download: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond</a></div></div>
<p>In addition, the webinar will feature:</p>
<p>• The latest research about consumer notification from the Ponemon Institute<br />
• A look at healthcare data breach statistics<br />
• Best practices for data breach preparation from a compliance officer’s perspective.<br />
• Examples of what works &#8211; and doesn’t work &#8211; when responding to a data breach<br />
• How and why data breaches happen<br />
• How to budget the resources for a  potential breach<br />
• What do regulators expect from an organization that experienced a breach?<br />
• A question and answer period for participants</p>
<p>Come learn the best ways to try and prevent a data breach and the most effective methods to respond to one. Learn to minimize your costs and help protect your reputation.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/&via=Experian_DBR&text=Webinar: Data breaches can happen anytime, anywhere&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F&amp;title=Webinar%3A%20Data%20breaches%20can%20happen%20anytime%2C%20anywhere" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>