<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; ofonseca</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/ofonseca/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>When it comes to data breach, hackers are not the biggest threat</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/#comments</comments>
		<pubDate>Thu, 27 Dec 2012 17:54:38 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1911</guid>
		<description><![CDATA[Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches from January 2009 to May 2012 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F27%2Fwhen-it-comes-to-data-breach-hackers-are-not-the-biggest-threat%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Fraud,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/human-error-data-breach.jpg"><img class="aligncenter size-full wp-image-1914" title="human-error-data-breach" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/human-error-data-breach.jpg" alt="" width="460" height="276" /></a></p>
<p>Human errors are the most common threats to exposing a person’s personal information to <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/">data breaches</a> according to <a href="http://www.rapid7.com/docs/Data-Breach-Report.pdf" target="_blank" class="broken_link" rel="nofollow">an analysis</a> of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the <a href="http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/">data breach information</a> for the report based on the number of reported public information data breaches from January 2009 to May 2012 in the <a href="https://www.privacyrights.org/data-breach" target="_blank" class="broken_link" rel="nofollow">Chronology of Data Breaches</a> maintained by the Privacy Rights Clearinghouse, a nonprofit privacy advocacy group.</p>
<p>The <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach statistics</a> from the report totaled 268 incidents affecting 94 million people.  The biggest factor responsible for the largest number of <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">breaches of data</a> was unintended disclosure due to negligence and clerical errors. 78 incidents led to exposing almost 12 million records of private information.  The next highest number was 51 incidents due to the loss of a portable data storage device which resulted in breaching almost 82 million personal records.  Hacking was low on the list, adding up to 40 incidents exposing about 1 million records.   </p>
<p>What can be done about this alarming problem?</p>
<p>Security experts advise implementing nationally mandated <a href="http://www.experian.com/business-services/risk-management.html">data breach protection</a> protocols and developing effective breach response programs in conjunction with <a href="http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/">cyber security</a> training for employees who handle sensitive public data.  Employing technology such as encryption is another method to counter human error since it is inexpensive, simple to administer and highly effective in protecting data.  Using management software that can track and monitor which devices are being used, monitor downloaded data and has the ability to remotely wipe the memories of lost or stolen devices is another data protection tool.</p>
<p>Some experts even go so far as to suggest that all these initiatives need to be backed by a law that punishes workers who fail to follow these protocols with either firing them from their jobs or jail time, depending on the severity of the data breach.  The bottom line is that protecting the public’s most private information is serious business and those who are entrusted with such sensitive information need to recognize that they have a responsibility to protect the public’s privacy.  And in turn, it’s a responsibility that we, the people must ensure that they take seriously.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/&via=Experian_DBR&text=When it comes to data breach, hackers are not the biggest threat&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F27%2Fwhen-it-comes-to-data-breach-hackers-are-not-the-biggest-threat%2F&amp;title=When%20it%20comes%20to%20data%20breach%2C%20hackers%20are%20not%20the%20biggest%20threat" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>7 Things you should think about when you audit your response plan</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 17:30:03 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1874</guid>
		<description><![CDATA[Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Breach+Notification,data+breach+response,data+privacy,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg"><img class="aligncenter  wp-image-1875" title="response-plan-checklist" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg" alt="" width="509" height="339" /></a></p>
<p>Now that your <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach</a> response plan is in place and you’re confident that your company is safeguarded from malicious <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/"> data breach</a> attempts, what can possibly be still the biggest threat to your <a href="http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/">data breach protection</a> plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing so it’s necessary to ensure that your response plan stays current and functional.</p>
<p>That is why it’s imperative that you regularly audit, test and update your plan on preferably, a quarterly basis.</p>
<p>Here are 7 checklist items to keep in mind when auditing your response plan:</p>
<p>1) Update your data breach response team contact list &#8211; Employees come and go therefore it’s important that the contact information for the members of your internal and external breach response team is current.  Make sure department heads are noted and once updated, re-distribute the list to the appropriate people.</p>
<p>2) Verify that your data breach response plan is comprehensive &#8211; Revise the plan to include any major company changes, such as new departments or adjustments in data management policies.  Check in with each response team member to ensure their department understands its role and what they need to do during a data breach.  Set up a mock <strong>breach of data</strong> scenario so that your response team can practice trial runs. Practice a full scale rehearsal annually so the plan is fully vetted and any adjustments can be made before an event occurs.</p>
<p>3) Double check your vendor contracts – Check that your contracts with your forensics firm, data breach resolution provider and other vendors are current and easily accessible.  Review your vendors and contracts and make sure they both still match your data protection and security needs.</p>
<p>4) Review notification guidelines – Verify that the data breach notification section of your response plan reflects the latest state legislation and that your notification letter templates address any new laws.  Ensureyour contact list of attorneys, government agencies and media is updated so you can easily notify them after a breach.  For medical data breaches, healthcare providers need to verify that Department of Health &amp; Human Services contacts are updated and their response team understands data breach information reporting procedures.</p>
<p>5) Check up on third parties that have access to your data &#8211; Evaluate how third parties are managing your data and if they are following your data protection rules.  Educate them on any new legislation that may affect you during a data breach.  Stress to third parties the importance of reporting a data breach to you immediately and what is expected in the resolution process. Healthcare companies need to meet HIPAA requirements and should check that business associate agreements (BAAs) are established.</p>
<p>6) Evaluate IT Security &#8211; Ensure proper data access controls are in place. Check that automated software and operating system updates for the entire company are installed properly. Verify that any automated security monitoring and reporting system is up to date and working.  Store backup copies of data securely.</p>
<p>7) Review staff security awareness – Verify that your staff is up to date on company policy regarding data security procedures, including what digital and paper documents to keep and how to securely discard what is not needed.  Train staffto identify signs of cyber security threats in their daily work life and know the proper course of action in reporting a breach.  Check that employees are keeping their work related laptops, mobile and digital devices secure at all times and remind them to change passwords every three months.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/&via=Experian_DBR&text=7 Things you should think about when you audit your response plan&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F&amp;title=7%20Things%20you%20should%20think%20about%20when%20you%20audit%20your%20response%20plan" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber thieves target retailers during the shop ‘til you drop season</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/#comments</comments>
		<pubDate>Tue, 20 Nov 2012 18:58:17 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1813</guid>
		<description><![CDATA[As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest Verizon’s Data Breach Investigations Report (DBIR), an annual data breach information study conducted by the Verizon RISK Team (VERIS) with participation from the U.S. Secret Service and international national cyber security agencies in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F20%2Fcyber-thieves-target-retailers-during-the-shop-til-you-drop-season%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Security,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/cyber-thieves-target-retailers2.jpg"><img class="aligncenter size-full wp-image-1820" title="cyber-thieves-target-retailers" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/cyber-thieves-target-retailers2.jpg" alt="" width="380" height="250" /></a></p>
<p style="text-align: left;">As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf" class="broken_link" rel="nofollow">Verizon’s Data Breach Investigations Report</a> (DBIR), an annual <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breach information</a> study conducted by the Verizon RISK Team (VERIS) with participation from the U.S. Secret Service and international <a href="http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/">national cyber security</a> agencies in Australia, Holland, Ireland, and Britain. The study analyzed forensic evidence to examine how <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">data breaches</a> occurred in organizations, who caused the breaches, why they did it, how the victims responded, and how the breaches could have been prevented. </p>
<p> The 2012 DBIR focused on the retail industry which for the past two years has ranked only second behind hotel and food services as the business most plagued with data breaches.  The main reason for the high rankings of these two trades is that they use point of sale (POS) systems to conduct daily business activities, making them prime targets for criminals that exploit POS systems with weak security.  Point of sale generally refers to when money is transacted in exchange for goods or services. Retailers are especially easy targets for cyber criminals who can hijack credit card information from long distances and these kinds of attacks are low risk for the criminals who often disappear long before a data security breach is discovered.  In addition, fraudsters prefer to target small to medium businesses such as franchise owners that lack the resources and/or expertise to manage their own cyber security. </p>
<p> VERIS defines threat agents as the cause of data breach incidents and categorizes them as either external (originating outside the victim organization), internal (originating inside the victim organization) and partner (any third parties who share a business relationship with the victim.)  The report found that external threat agents were the most prolific with the majority of attacks originating fromEastern Europe, a hot bed of organized cyber crime.  Internal threats made up a smaller percentage of incidents and often involved criminals coercing retail staff to help them by either using a remote skimming device or swapping legitimate PIN entry devices and POS terminals with identical, counterfeit replacements that are rigged to capture payment card data. </p>
<p> Even though these cyber thieves can be insidious, especially during a busy holiday season, retailers can protect themselves by following a few simple data breach protection practices:</p>
<p>1)      Change passwords consistently on all POS systems since hackers constantly scan the web for passwords that are easy to guess.</p>
<p>2)      Implement a firewall on remote access/administration services.  </p>
<p>3)      Do not use POS systems to access the internet.</p>
<p>4)      Make sure your POS system is compliant with the Payment Card Industry Data Security Standard (PCI DSS) an information security standard for businesses that handles credit card information.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/&via=Experian_DBR&text=Cyber thieves target retailers during the shop ‘til you drop season&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F20%2Fcyber-thieves-target-retailers-during-the-shop-til-you-drop-season%2F&amp;title=Cyber%20thieves%20target%20retailers%20during%20the%20shop%20%E2%80%98til%20you%20drop%20season" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>BYOD leads to data breaches in the workplace</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/#comments</comments>
		<pubDate>Thu, 01 Nov 2012 16:38:59 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1738</guid>
		<description><![CDATA[  While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F01%2Fbyod-leads-to-data-breaches-in-the-workplace%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,data+breach+response,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/byod.jpg"><img class="aligncenter  wp-image-1741" title="byod" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/byod.jpg" alt="" width="512" height="329" /></a></p>
<p>While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for <a href="http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/">medical data breaches</a> especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the workplace, many healthcare companies are considering adopting a Bring Your Own Device (BYOD) policy.  However, many companies have failed to implement mobile <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data breach protection</a>, breaking the HIPAA Security Rule which requires healthcare companies to perform a risk analysis of the processes by which they protect the confidentiality of electronic patient health information maintained by their organization.  Companies are required to use the information gathered from the analysis to take measures to ensure the confidentiality of patient data and to reduce risks to a reasonable level.  If companies don’t comply and there is a <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">data security breach</a>, they can be heavily fined by the U.S. Department of Health &amp; Human Services.</p>
<p>Just recently, a teaching hospital and medical practice associated with a large university was fined $1.5 million in a <a href="http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/">data breach</a> of patient information when a laptop computer containing unencrypted data on 3,621 patients and research subjects was stolen.  Hospital and practice officials were found guilty of violating the HIPAA Security Rule by not implementing <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">data protection and security</a> on their mobile devices.  The loss of laptops, portable storage gadgets like thumb drives and cell phones have already cost insurance companies, drugstores, medical practices and even a government health and social services department, millions of dollars in fines.</p>
<p>Unfortunately, this troubling trend doesn’t just affect the medical industry.  In August 2012, Coalfire (a firm that provides IT audit and risk assessment) surveyed 400 individuals across North America covering a variety of industries about their company’s mobile device security practices. The data revealed that many organizations lack policies addressing mobile <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">cyber security threats</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_110112_article_cta ">Download Your Free Data Breach Response Plan</a></div></div>
<p><strong>Key statistics from the survey:</strong></p>
<ul>
<li>84 percent use the same smartphone for personal and work usage.</li>
<li>47 percent don’t have a password on their mobile phone.</li>
<li>51 percent said their companies cannot remotely wipe data from mobile devices if they are lost or stolen.</li>
<li>49 percent said their IT departments have not discussed mobile/cyber security with them.</li>
</ul>
<p>Clearly, companies are not doing enough to protect themselves and their employees from the expensive <a href="http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/">cost of a data breach</a>.  As mobile devices become popular and less expensive, workers will naturally want to use them for their jobs.  Therefore, it is prudent for companies to adopt <a href="http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/">business data breach</a> protection and security policies to protect not only their company data but also their pocketbook.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/&via=Experian_DBR&text=BYOD leads to data breaches in the workplace&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F01%2Fbyod-leads-to-data-breaches-in-the-workplace%2F&amp;title=BYOD%20leads%20to%20data%20breaches%20in%20the%20workplace" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Connecticut gets serious about breach reporting</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 15:03:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1650</guid>
		<description><![CDATA[Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,data+breach+response,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png"><img class="aligncenter  wp-image-1653" title="connecticut-gets-serious-about-breach-reporting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png" alt="" width="547" height="318" /></a></p>
<p>Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop.</p>
<p>The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney General George Jepsen and his office were tasked with enforcing state breach laws – hard to do when you don’t know about the incidents.</p>
<p>But that’s all changed. Assistant Attorney General Matthew Fitzsimmons and the office’s Privacy Task Force will monitor the incoming emails. The new reporting requirement and newish task force (it was created last year) give the OAG more oversight of breach activity that may be putting consumers at risk. With more oversight comes better enforcement – at least that’s certainly what the OAG hopes.</p>
<p>Connecticut requires consumer notification when a breach involves unencrypted, computerized personal data. The state’s definition of “personal data” includes someone’s first and last names in combination with at least one of three data types: a Social Security number; a driver’s license or state identification number; or a financial account number, such as a credit card number, along with the access code for the account.</p>
<p>Businesses that don’t comply with the new law may find themselves in violation of the state’s Fair Trade Practices Act. Remember that sooner is better than later when it comes to breach reporting. At least if you want to avoid fines and violations.</p>
<p>Here’s the new email address for reporting breaches in Connecticut: <a href="mailto:ag.breach@ct.gov">ag.breach@ct.gov</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_100212_article">Download the Ponemon Notification Study to find out what kind of notification letters your customers want &#8211; and why it&#8217;s important to deliver.</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/&via=Experian_DBR&text=Connecticut gets serious about breach reporting&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F&amp;title=Connecticut%20gets%20serious%20about%20breach%20reporting" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When are small businesses too small for data breach? Never</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/#comments</comments>
		<pubDate>Tue, 11 Sep 2012 18:48:20 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1591</guid>
		<description><![CDATA[Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data breaches analyzed last year involved businesses [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Fwhen-are-small-businesses-too-small-for-data-breach-never%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/data-breach-prevention1.jpg"><img class="aligncenter  wp-image-1599" title="data-breach-prevention" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/data-breach-prevention1.jpg" alt="" width="403" height="302" /></a></p>
<p>Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data breaches analyzed last year involved businesses with less than 100 employees.</p>
<p><strong>Disturbing Data Breach Trend</strong></p>
<p>And, these findings seem to represent a trend. Verizon, which conducts its data breach study annually, found that large-scale data breaches dropped dramatically in 2011, while small and medium company data breaches skyrocketed. Ditto for the year earlier, when Verizon found that 63 percent of the data breaches investigated were at small businesses.</p>
<p>So what’s up? Why are cyber criminals targeting small and medium businesses (SMBs) for data breach and identity theft?</p>
<p>The most likely reason is because it’s easier. SMBs, just like their larger counterparts, may digitally store information like credit card transactions and employee, patient or customer profiles. But unlike large companies, SMBs may not have the time, financial resources or technical expertise to protect their data. Or perhaps, they don’t realize that preventing a data breach may not be as difficult as it sounds.</p>
<p><strong>Data Breach Prevention Tips for SMBs</strong></p>
<p>The Hartford www.hartforddatabreach.com offers the following tips for SMBs to try and prevent a data breach:</p>
<ul>
<li>Lock and secure sensitive data</li>
<li>Restrict employee access to sensitive information</li>
<li>Shred or securely dispose of unnecessary documents</li>
<li>Use password protection and data encryption for sensitive files</li>
<li>Have a privacy policy</li>
<li>Update systems and software on a regular basis</li>
<li>Use firewalls</li>
<li>Ensure that remote access is secure</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/&via=Experian_DBR&text=When are small businesses too small for data breach? Never&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Fwhen-are-small-businesses-too-small-for-data-breach-never%2F&amp;title=When%20are%20small%20businesses%20too%20small%20for%20data%20breach%3F%20Never" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Report gives readers the latest inside(r) scoop</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/14/new-report-gives-readers-the-latest-insider-scoop/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/14/new-report-gives-readers-the-latest-insider-scoop/#comments</comments>
		<pubDate>Tue, 14 Aug 2012 17:43:59 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1542</guid>
		<description><![CDATA[Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out of 25) users were filched and openly [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F14%2Fnew-report-gives-readers-the-latest-insider-scoop%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,hackers&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/newspaper-headline.jpg"><img class="aligncenter size-full wp-image-1550" title="newspaper headline" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/newspaper-headline.jpg" alt="" width="525" height="302" /></a></p>
<p>Today, those who steal data from the <em>outside</em> also usually steal the headlines. Witness recent mega-hacks at some very well-known firms:</p>
<ul>
<li><strong>Electronics corporation</strong>: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers</li>
<li><strong>Social media site</strong>: encoded passwords for 6.5 million (one out of 25) users were filched and openly posted to a Russian hacker site</li>
<li><strong>Internet company</strong>: hackers broke in and publicly revealed more than 400,000 usernames and passwords</li>
</ul>
<p>But is there a bigger security story to be told, in which outsiders get no ink?</p>
<p>Trend Micro recently commissioned the Ponemon Institute to get the scoop on threats posed by company insiders.</p>
<p><strong>Human risk factors exposed</strong></p>
<p>In a revealing study entitled “<span style="text-decoration: underline;">The Human Factor in Data Protection</span>” researchers surveyed 709 IT and IT security practitioners (manager level and above), with some surprising—and not so surprising results.</p>
<p>Surprising because, despite all the headlines and years of dire admonitions from IT folk, many employees (consultants and others with privileged access) apparently don’t think about or know how to properly safeguard data.</p>
<p>Some of the diciest practices routinely being engaged in, according to the report, include:</p>
<ul>
<li>Regular sharing <a title="Passeword Management" href="http://www.experian.com/blogs/data-breach/2012/06/19/password-management/">passwords</a> with others</li>
<li>Not encrypting laptops, portable media or other mobile data-bearing devices</li>
<li>Connecting computers to the Internet through an insecure wireless network</li>
<li>Using personally owned <a title="A Mobile Test of Human Threats" href="http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/">mobile devices</a> that connect to their organization’s network</li>
<li>Reusing the same <a title="Three Data Protection Strategies to Catch a Phish" href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">username/password combo </a>for many different sites</li>
</ul>
</div>
<p><strong>Smaller business, bigger risks</strong></p>
<p>Perhaps not so surprisingly, researchers also uncovered a greater prevalence of human factor risks among small to medium sized businesses (SMBs), compared with enterprise-sized organizations. In every risk factor category polled, SMBs fared worse than their larger counterparts&#8211;as high as 19% worse, in such basic breach prevention measures as:</p>
<ul>
<li>Credential management (changing usernames/passwords frequently)</li>
<li>Deleting spammy or suspicious email attachments</li>
<li>Avoiding websites deemed by management as ‘off limits’</li>
<li>Secure, responsible use of social media</li>
<li>Masking computer screens in public venues</li>
<li>Deleting unused data files and performing regular backups</li>
</ul>
<p><strong>Staying off the evening news</strong></p>
<p>Headlines constantly remind us why businesses—large and small—need to be proactive and intentional about deterring outside threats. But, as the study shows, <em>internal</em> policies and practices may also need attention.</p>
<p>Ponemon experts suggest these measures to mitigate insider risk:</p>
<ul>
<li><strong>Increase security awareness</strong>. Spend more time educating employees (and anyone with insider access) about breach prevention and security best practices.</li>
<li><strong>Audit your policies</strong>. Regular reviews of data protection and governance policies can expose previously hidden gaps and vulnerabilities. Update policies to require immediate reporting of a lost or stolen laptop or mobile device.</li>
<li><strong>Neutralize the social media threat</strong>. Create or strengthen policies that explicitly govern the use of social media at work.</li>
<li><strong>Review credentials</strong>. Ensure that those who have privileged data access really need it, and regularly remind users of their personal charge to handle data responsibly.</li>
</ul>
<p>Poet Alexander Pope reminds us that to err is human. With greater security awareness and training, companies can reduce the risks that human errors cause. And that’s good news for everyone.</p>
<p><strong><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_081412_article ">Download your free Data Breach Response Guide! </a></div></div></strong></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/14/new-report-gives-readers-the-latest-insider-scoop/&via=Experian_DBR&text=Report gives readers the latest inside(r) scoop&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F14%2Fnew-report-gives-readers-the-latest-insider-scoop%2F&amp;title=Report%20gives%20readers%20the%20latest%20inside%28r%29%20scoop" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/14/new-report-gives-readers-the-latest-insider-scoop/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The top 5 cyber security threats to future of mobile banking</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/#comments</comments>
		<pubDate>Tue, 24 Jul 2012 17:46:34 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1487</guid>
		<description><![CDATA[As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful trade group conducted a comprehensive survey [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F24%2Ftop-5-cyber-security-threats-to-future-of-mobile-banking%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/nobile-banking.png"><img class="aligncenter size-full wp-image-1490" title="nobile-banking" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/nobile-banking.png" alt="" width="400" height="250" /></a></p>
<p>As mobile banking grows in popularity, so do the dangers of data breach and identity theft.</p>
<p>In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry.</p>
<p>To get a better understanding of the<a title="The Right Choice for your Cyber Insurance Panel" href="http://www.experian.com/data-breach/cyber-insurance.html"> industry’s cyber security woes</a>, a powerful trade group conducted a comprehensive survey of mobile experts from 50 financial institutions. BITS, the technology division of the Financial Services Roundtable, conducted the poll to find out the top <a title="A Mobile Test of Human Threats" href="http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/">mobile data protection threats </a>and the best way to combat them.</p>
<p>Here’s what they found:</p>
<p><strong>1) Mobile data protection must keep up </strong>with the lighting-speed pace of innovation.</p>
<p><strong>2) Consumers are scared to use mobile banking</strong>. Financial institutions must change public perception of data security measures, which means data protection measures must work.</p>
<p><strong>3) Cooperation on mobile data protection and data security is a must.</strong> Everyone involved, such as device manufacturers, network operators, financial institutions and app developers, must work together to develop effective mobile data protection solutions.</p>
<p><strong>4) Consumers must take greater responsibility for their own data security.</strong> Consumers need to be more careful about not losing their smart phones and protecting the data inside of them. They should guard their phones the same way that they guard their wallets.</p>
<p><strong>5) Balancing data security and data privacy.</strong> As consumers want more convenience, financial institutions need to find the right balance between allowing them to conduct more transactions, but still making sure their personal data is protected from data breach and identity theft. Financial institutions need to educate their customers on data protection methods, like having them lock their smart phone with a <a title="Password Management" href="http://www.experian.com/blogs/data-breach/2012/06/19/password-management/">password</a>.</p>
<p>Do you have similar concerns? What are your biggest worries regarding mobile banking and data security/<a title="The State of Identity Theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">identity theft</a> issues? Let us know. We’d like to hear them.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the Data Breach Response Guide by Experian" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_072412_article ">Download your free Data Breach Response Guide</a>!</div></div>
<div class="OUTBRAIN" data-src="DROP PERMALINK HERE" data-widget-id="AR_1" data-ob-template="experian" ></div>
<p> <script type="text/javascript" src="http://widgets.outbrain.com/outbrain.js"></script></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/&via=Experian_DBR&text=The top 5 cyber security threats to future of mobile banking&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F24%2Ftop-5-cyber-security-threats-to-future-of-mobile-banking%2F&amp;title=The%20top%205%20cyber%20security%20threats%20to%20future%20of%20mobile%20banking" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber insurance: the risk-reduction remedy some companies want and need</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/#comments</comments>
		<pubDate>Tue, 10 Jul 2012 17:54:02 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1422</guid>
		<description><![CDATA[  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg"><img class="aligncenter size-full wp-image-1436" title="Cyber-Liability-Insurance" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg" alt="" width="474" height="298" /></a></p>
<p>Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: <em>cyber insurance coverage</em>.</p>
<p>As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, where<a title="protecting-high-risk-information-in-ehrs" href="http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/"> protecting high-risk information in EHRs </a>(electronic health records) is among the top priorities. </p>
<p><strong>Why cyber insurance?<br />
</strong>For most, the goal of adding cyber insurance is to mitigate <a title="five-trends-on-security-threats" href="http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/">threats</a>, liabilities and costs sustained from (what else?) “cyber incidents” – a broad term covering an ever-growing range of mishaps and misuse, from hacked accounts and stolen credentials to pilfered laptops and wayward thumb drives.  </p>
<p>Given the frequency and severity of recent breaches, and the financial fallout that invariably results, who can blame companies for wanting an extra layer of protection?</p>
<p>Certainly not attorneys Theodore J. Kobus III and Kimberly M. Wong, data security experts and co-authors of a new paper entitled <a title="cyber-insurance-breach-response-plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-breach-response-plan.jsp"><span style="text-decoration: underline;">“Risk Management: Cyber Insurance &amp; Your Data Response Plan.”</span> </a>In fact, Kobus and Wong strongly suggest that, depending on budget, exposure profile and potential loss scenarios, cyber insurance may be a risk-reduction remedy that businesses sorely need.</p>
<p><strong>Surprisingly customizable coverage<br />
</strong>Companies seeking first-party cyber insurance coverage have a surprisingly diverse range of choices, say the authors, including protection against losses stemming from: data destruction and theft, extortion and hacking, and revenue lost from network intrusion or interruption.</p>
<p>Notification expenses, such as printing, mailing, credit monitoring and call center support may be included in a policy, along with third-party cyber liability coverage for vendors and partners.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_071012_article ">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<p><strong>Procuring the proper policy</strong><br />
The paper also includes suggestions for working with your broker, including:  </p>
<ol>
<li><strong>Determine</strong> what coverage you have under current general commercial liability or professional liability policies.  Identify potential gaps and opportunities to increase long-term protection.</li>
<li><strong>Assess</strong> your current level of exposure and types of cyber incidents that pose the biggest threats.</li>
<li><strong>Inventory</strong> the nature and location of all sensitive data. Is it stored in areas that are vulnerable to physical or digital theft? Knowing this will inform cyber coverage decisions.</li>
<li><strong>Step through</strong> potential employee/non-employee loss scenarios, such as: hacking, theft of data or computer equipment and unauthorized publication of information online.</li>
</ol>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/&via=Experian_DBR&text=Cyber insurance: the risk-reduction remedy some companies want and need&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F&amp;title=Cyber%20insurance%3A%20the%20risk-reduction%20remedy%20some%20companies%20want%20and%20need" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three reasons your breach notices are flawed</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/#comments</comments>
		<pubDate>Tue, 05 Jun 2012 17:14:18 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1286</guid>
		<description><![CDATA[Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting. In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on Data Breach Notification. Among all survey respondents, those [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg"><img class="aligncenter size-full wp-image-1292" title="stack-of-letters" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg" alt="" width="454" height="184" /></a></p>
<p>Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting.</p>
<p>In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on<a title="Ponemon Notification Study Download" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article"> Data Breach Notification</a>.</p>
<p>Among all survey respondents, those who do and do not recall receiving a notice, 85% verify that learning about the loss or theft of their data is pertinent to them. But only if there’s a certainty of risk, a belief shared by 57% of respondents. An even larger percentage (63%) feels entitled to compensation, such as credit monitoring or identity protection, if their data is lost.</p>
<p>Yet, despite having clear ideas on what they do or don’t want following the loss of their data, most consumers aren’t paying attention to<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/"> breach notices</a>, according to Ponemon. Only 25% of participants in the study could recall receiving one. Among that group, 35% recalled receiving at least three.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemone Consumer Study on Data Breach Notification" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_060512_article ">Download the 2012 Consumer Study on Data Breach Notification </a>to find out why consumers are critical of the notification letters they receive. </div></div>
<p>It’s this subset of the study that provides valuable insight into why today’s notifications aren’t working. Here are three flaws:</p>
<p>1. Too Few Details<br />
Sixty-seven percent of respondents who recall receiving a breach notice did not receive enough information about the incident. That includes 44% who did not know what type of data had been lost or stolen, leaving them unsure of what steps to take to protect themselves.</p>
<p>2. Difficult to Understand<br />
Sixty-one percent did not understand the notification, largely due to the length of the letter and complexity of the language. In addition, 37% had no idea what the incident was about even after reading the notice. This led 41% to assume their data had been stolen.</p>
<p>3. Not Believable<br />
Forty-five percent found the message in the letter unbelievable, and 44% of them believed the company was hiding key facts about the breach.</p>
<p>Consumers acted on their disappointment to varying degrees:<br />
• 15% planned to terminate their relationship with the breached company<br />
• 39% contemplated doing so<br />
• 35% would continue the relationship so long as the organization doesn’t experience another breach</p>
<p>The numbers reflect poorly on today’s notification efforts, confirming the need for change. Consumers want simple language and clear explanations of what happened and the risks they face, plus a protection product to compensate for the data exposure, according to the study.</p>
<p>So why not work with your legal counsel to deliver just that in a way that protects your company and satisfies your consumers? Otherwise, your breach notices will continue to alienate and confuse. As <a title="Ponemon Notification Study" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article">this study </a>shows, that only serves to erode customer loyalty and trust, making data loss even more costly in the long run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/&via=Experian_DBR&text=Three reasons your breach notices are flawed&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F&amp;title=Three%20reasons%20your%20breach%20notices%20are%20flawed" id="wpa2a_20"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>