Breach Prevention

Protecting your business from gift card fraud

Posted on Mar 22 2011 by

Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of consumer fraud and internal misconduct that are posed by credit cards. Developing robust safeguards , proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.

Share

Scam report: shipping pirates

Posted on Mar 15 2011 by

With some precautions, your business can safely navigate through hazardous shipping channels without fear of data piracy.

Share

Develop a data breach response plan now to be ready to efficiently address a breach as soon as it is reported

Posted on Feb 22 2011 by

The proliferation of state data breach notification laws, substantive state information security laws (such as the Massachusetts data security standards), and FTC and private lawsuits on information security matters has led to heightened attention to information security in both IT budgets and staffing and in terms of legal resources. With budget pressures all around (not to mention time pressures and the pressures of other duties that in-house counsel already has), the question becomes: How can my organization lower the time and dollar costs associated with information security when there is a breach?

Share

10 ways that breaches burn business

Posted on Feb 15 2011 by

Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.

Share

Understanding the risks of chip and PIN credit card verification

Posted on Feb 07 2011 by

The point of sale chip and PIN payment technology is believed to be a safer form of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. So why aren’t more businesses adopting this technology?

Share

Stopping healthcare fraud with tools used in other industries

Posted on Feb 01 2011 by

A few weeks ago I discussed a few preventative measures a healthcare business can implement to protect itself from the damages of medical fraud.  However, the fight against medical fraud requires support from many groups, including the U.S. Government.  Bringing new tools to the fight, the Obama Administration recently announced aggressive new measures it is […]

Share

Protecting your retail business from consumer fraud

Posted on Jan 25 2011 by

The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have […]

Share

What do you need to know about the FTC’s report on privacy

Posted on Jan 18 2011 by

Our guest blogger this week is Kristen Mathews of Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up this […]

Share

FTC report on consumer privacy

Posted on Jan 11 2011 by

Our guest blogger this week is the team at Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up on […]

Share

Mobile smishing attacks are on the rise

Posted on Dec 21 2010 by

Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from […]

Share