Breach Prevention

Loading...
Survey- Worries over complacency and overconfidence ke...

Your company may have a response plan in place to handle cybersecurity breaches. You may have had professional help in putting your plan together and managing it. But cybersecurity experts still aren’t convinced your organization will be able to effectively implement the plan when an incident occurs. That was...

Read More Survey- Worries over complacency and overconfidence keep cybersecurity experts up at night
Prediction check-in: Is it over yet for passwords?...

World Password Day just passed, and we have to ask — are passwords passé yet? Earlier this year, in our fourth annual Data Breach Industry Forecast, we predicted aftershock breaches would hasten the demise of passwords and expedite the broader adoption of multi-factor authentication to verify users. In 2016,...

Read More Prediction check-in: Is it over yet for passwords?
Your Business May be Small but Your Cybersecurity Risk...

In my years working in the data breach resolution industry, I’ve heard my share of concerning misconceptions. One of the most cringe-worthy is the belief many small business owners have that because their business is small their risks of experiencing a cybersecurity breach are small as well. They think...

Read More Your Business May be Small but Your Cybersecurity Risks are Huge
A Look Ahead: POS Attacks and Skimming Continue to Thr...

While 2016 may have had fewer headline-grabbing retail breaches than we saw in 2015, the new year is shaping up to be one of particular risk for retailers. In our 2017 Data Breach Industry Forecast, Experian Data Breach Resolution predicts retailers will continue to come under point-of-sale attacks, despite...

Read More A Look Ahead: POS Attacks and Skimming Continue to Threaten Retailers in ‘17
Latest Developments in EMV Adoption and Anti-fraud Eff...

At a little more than a year old, the merchant EMV liability shift has had an impact, but probably not quite as much as many in the payments industry had hoped it would. Meanwhile, the process of migrating the nation’s payment systems to more secure EMV chip-and-PIN technology continues,...

Read More Latest Developments in EMV Adoption and Anti-fraud Efforts
Closing Loopholes: Promoting Cybersecurity Vigilance i...

Affecting much more than just diplomacy and the interactions of state leaders, presidential leadership decisions ripple across the real and digital...

Read More Closing Loopholes: Promoting Cybersecurity Vigilance in the Next Term
What Should Leadership and C-suite Executives Know?...

Our fourth annual study with the Ponemon Institute, “Is Your Company Ready for a Big Data Breach,” indicates C-suiters may not be lis...

Read More What Should Leadership and C-suite Executives Know?
5 Key Predictions for the Data Breach Industry...

Recent research from the Ponemon Institute indicates too many businesses aren’t taking the game seriously enough, or taking the steps necessary to play at their b...

Read More 5 Key Predictions for the Data Breach Industry
Fourth Annual Study on Data Breach Preparedness Releas...

The Ponemon Institute’s 4th annual data breach preparedness study reveals an interesting mix of news....

Read More Fourth Annual Study on Data Breach Preparedness Released
National Cyber Security Awareness Month Spotlights Sec...

National cyber security month is the perfect time to check in on your data breach prevention efforts – have they kept up with the t...

Read More National Cyber Security Awareness Month Spotlights Security of Our Digital World
Practicing What We Preach: Updated Data Breach Respons...

Updating your data breach response plan is an annual necessity. Learn key components to help you anticipate emerging threats....

Read More Practicing What We Preach: Updated Data Breach Response Guide Now Available
Practice Makes Perfect: Are You Perfecting Your Data B...

It’s no longer a question of if a company will experience a data breach. The best way to know how well your plan could work is to test it....

Read More Practice Makes Perfect: Are You Perfecting Your Data Breach Response?