Breach Prevention

Preparedness, planning, and strategies for execution

Data breaches make the hospitality industry less hospitable...

Breach Prevention

Nov 16 2011 by
The tourism industry may be bouncing back from the worst of the recession, but occupancy, unfortunately, isn’t the only thing on the rise.  So are data breaches. According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies. Why are hackers...

Read more ››

Honoring veterans by protecting their identities...

Breach Prevention

Nov 10 2011 by
It is a cruel irony that service members who defend our country by fighting abroad are often most at risk from the threat of identity theft at home.  Frequent deployments, relocation and the unique demands of military life create vulnerabilities for fraudsters to exploit, and military personnel can remain unaware that they have been targeted long after a crime has been perpetrated. Further adding to the difficulties...

Read more ››

Your biggest data breach risk may be on your payroll...

Breach Prevention

Oct 25 2011 by
Data breaches may conjure images of malicious hackers and global cyber gangs, but often the worst breaches come at the hands of a company's own employees.  Whether these workers are well-meaning but careless, or soon to be ex-employees en route to a competitor, a company's staff can pose a serious threat to its security. The headlines are rife with stories of companies that have been burned - intentionally or...

Read more ››

Stealing data through doppelganger domains...

Breach Prevention

Oct 18 2011 by
A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses. So-called typo-squatting - where criminals register for domains that are similar to those of legitimate businesses - has served as a fraudster tactic for years.  The newest twist on an old hack involves creating doppelganger domains by simply omitting the dot between...

Read more ››

Cyberdefense without coffee breaks...

Breach Prevention

Oct 11 2011 by
It’s easy for organizations to get discouraged by the proliferation of high-wire data breaches these days.  After all, if global companies can fall prey to damaging cyber attacks, what hope is there for businesses that aren’t brand name organizations? The sense of vulnerability against hackers isn’t without merit.  A recent Ponemon Institute study concluded that cyber attacks are as reliable as rain; 90 percent...

Read more ››

Cyber crime gets costlier...

Breach Prevention

Oct 04 2011 by
The Ponemon Institute's recently released "Second Annual Cost of Cyber Crime Study" confirms what many of us might suspect from the endlessly grim headlines these days; data breaches have become a more frequent and damaging hazard of business.  The study, sponsored by ArcSight, set out to quantify the financial toll from cyber attacks and assess the full impact of those costs over time, with the purpose of helping...

Read more ››

Ensuring the security of personal identifiable information...

Breach Prevention

Sep 27 2011 by
Everywhere you turn these days there’s word of a new data breach.  Your old college – archives hacked.  Your dentist’s office – files stolen.  The local retailer – credit cards skimmed.  Government offices – accidental posting of information online. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational...

Read more ››

Counter competitive intelligence: Combating hackers in 7 ste...

Breach Prevention

Sep 12 2011 by
Our guest blogger this week is Tom Bowers, Managing Director, Security Constructs LLC – a security architecture, data leakage prevention and global enterprise information consulting firm. In my last post, I discussed how hackers choose their targets and the steps that companies can take to reduce that risk.  I'd like to continue this thought stream by offering a slightly different view on how we as security and risk...

Read more ››

How hackers find their targets...

Breach Prevention

Sep 06 2011 by
Our guest blogger this week is Tom Bowers, Managing Director, Security Constructs LLC – a security architecture, data leakage prevention and global enterprise information consulting firm. The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims? The answer: research. Hackers do their homework; in fact, an actual hack typically...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets