Breach Notification

Data Breach News for the First Quarter of 2014

Posted on Apr 08 2014 by

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches had been reported, according to the […]

Share

Thinking Globally at IAPP March 5-7: The International Data Breach Response

Posted on Feb 25 2014 by

When a data breach occurs, will you turn to your carefully crafted data breach response plan … and find it lacking? If your business operates globally, but you were only thinking domestically when you created your response plan, you may find that plan is insufficient for your needs when a cross-border data breach occurs. When […]

Share

Not All Cyber Claims are Created Equal. Find Out Why at the NetDiligence Forum

Posted on Oct 02 2013 by

Cyber claims are as individual as the organizations that file them.  Join us at the 7th Annual NetDiligence® Cyber Risk & Privacy Forum, Oct. 10-11, 2013 in Los Angeles, to find out why each claim is different and what to expect after filing one. Ozzie Fonseca, Senior Director with Experian® Data Breach Resolution, will join […]

Share

Roadmap to Business Associate Agreements

Posted on Sep 20 2013 by

Under the new HIPAA Omnibus Rule, business associate agreements (BAA) are required more often. But do you know how often? This is crucial to know because the Omnibus Rule compliance deadline is Sept. 23, 2013. BAAs are still required between healthcare organizations and business associates, as they were in the past, but now, they are also required […]

Share

The Top Complications of Breach Response: Learn What Not to Overlook at IAPP

Posted on Sep 17 2013 by

The IAPP Privacy Academy, September 30-October 2, 2013 in Seattle, is the place to be to learn all about today’s privacy and data protection challenges, including the top complications of breach response. Alex Ricardo, Director of Breach Response Services for Beazley Group, and I will share our insider perspective on anticipating and managing common hurdles […]

Share

California Takes a Hard Look at Data Breaches

Posted on Jul 31 2013 by

Recently, California’s Attorney General Kamala Harris released a first-of-its-kind report, detailing the 2012 data breaches from her state. The report has generated strong conversation throughout the industry, as it rightly should, in the name of transparency. This move comes as she continues to push companies in her state to improve their security practices. What caught […]

Share

How Many Data Breach Resolution Providers Does it Take?

Posted on Jul 17 2013 by

In today’s data driven world, most security experts agree that when it comes to data breaches, most businesses need to recognize it’s not a matter of what to do “if “ they experience a breach but what to do WHEN they experience a breach. After an incident is first discovered, in addition to implementing a […]

Share

What’s In Your Data Breach Toolbox?

Posted on Apr 30 2013 by

Our latest Ponemon Institute study suggests many companies are not adequately prepared to mitigate damages associated with a data breach. If you find your organization represented in the summary-findings below, click the image to download the study.

Share

Tips to save your reputation following a big data breach

Posted on Apr 23 2013 by

The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value to customers, or patients and make […]

Share

Data breach numbers are up worldwide

Posted on Mar 26 2013 by

In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in business and IT practices, cyber security threats have become equally prevalent.  Safeguarding data has become a top priority and is now mandatory for organizations of all sizes from small businesses to […]

Share