Breach Prevention

Preparedness, planning, and strategies for execution

Stealing data through doppelganger domains...

Breach Prevention

Oct 18 2011 by
A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses. So-called typo-squatting - where criminals register for domains that are similar to those of legitimate businesses - has served as a fraudster tactic for years.  The newest twist on an old hack involves creating doppelganger domains by simply omitting the dot between...

Read more ››

Cyberdefense without coffee breaks...

Breach Prevention

Oct 11 2011 by
It’s easy for organizations to get discouraged by the proliferation of high-wire data breaches these days.  After all, if global companies can fall prey to damaging cyber attacks, what hope is there for businesses that aren’t brand name organizations? The sense of vulnerability against hackers isn’t without merit.  A recent Ponemon Institute study concluded that cyber attacks are as reliable as rain; 90 percent...

Read more ››

Cyber crime gets costlier...

Breach Prevention

Oct 04 2011 by
The Ponemon Institute's recently released "Second Annual Cost of Cyber Crime Study" confirms what many of us might suspect from the endlessly grim headlines these days; data breaches have become a more frequent and damaging hazard of business.  The study, sponsored by ArcSight, set out to quantify the financial toll from cyber attacks and assess the full impact of those costs over time, with the purpose of helping...

Read more ››

Ensuring the security of personal identifiable information...

Breach Prevention

Sep 27 2011 by
Everywhere you turn these days there’s word of a new data breach.  Your old college – archives hacked.  Your dentist’s office – files stolen.  The local retailer – credit cards skimmed.  Government offices – accidental posting of information online. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational...

Read more ››

Counter competitive intelligence: Combating hackers in 7 ste...

Breach Prevention

Sep 12 2011 by
Our guest blogger this week is Tom Bowers, Managing Director, Security Constructs LLC – a security architecture, data leakage prevention and global enterprise information consulting firm. In my last post, I discussed how hackers choose their targets and the steps that companies can take to reduce that risk.  I'd like to continue this thought stream by offering a slightly different view on how we as security and risk...

Read more ››

How hackers find their targets...

Breach Prevention

Sep 06 2011 by
Our guest blogger this week is Tom Bowers, Managing Director, Security Constructs LLC – a security architecture, data leakage prevention and global enterprise information consulting firm. The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims? The answer: research. Hackers do their homework; in fact, an actual hack typically...

Read more ››

Lost memory: How memory sticks can lead to data breaches...

Breach Prevention

Aug 30 2011 by
Sometimes big problems come in small packages. Such can be the case with USB drives, those little memory sticks that hold vast amounts of data yet can be easily lost or stolen.  A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb drives: On average, the companies surveyed lost 12,000 customer, consumer, and employee records on missing...

Read more ››

Do your passwords pass the hack test?...

Breach Prevention

Aug 23 2011 by
The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations.  These incidents have spotlighted the need for improved breach prevention measures, from basic tools like encryption to loftier cyber goals such as identity ecosystems, which would utilize new technologies, policies and standards to help...

Read more ››

Child identity theft: A new frontier for fraudsters...

Breach Prevention

Aug 09 2011 by
You might think you’re pretty savvy when it comes to understanding identity theft.  But what about when identity theft threatens your children? A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.  Pop quiz: did you know…. Children are 51 times...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets