Breach Prevention

Preparedness, planning, and strategies for execution

Cyber Security Requires a Three-stage Approach to Data Breac...

Breach Prevention

Jun 25 2013 by
Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource Center (ITRC). Perpetrated against companies large and small, these breaches compromised more than 4.6 million records. Research by the Ponemon Institute indicates the number of data breaches continues to grow, yet businesses...

Read more ››

Reborn CISPA cyber security bill experiences déjà vu...

Breach Prevention

Jun 12 2013 by
Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection Act (CISPA) was reintroduced to the House by its authors Reps. Mike Rogers and Dutch Ruppersberger, heads of the House Intelligence Committee. CISPA focuses on improving real time information sharing between the federal...

Read more ››

Tips to save your reputation following a big data breach...

Breach Prevention

Apr 23 2013 by
The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value to customers, or patients and make better decisions. But along with the rewards, comes risk.  Big data can result...

Read more ››

Data breach numbers are up worldwide...

Breach Prevention

Mar 26 2013 by
In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in business and IT practices, cyber security threats have become equally prevalent.  Safeguarding data has become a top priority and is now mandatory for organizations of all sizes from small businesses to government agencies to international corporations.  In...

Read more ››

Final ruling for HIPAA/HITECH Act protects patients from dat...

Breach Prevention

Mar 12 2013 by
By now you are aware that the much anticipated final ruling from the Department of Health and Human Services (HHS) regarding regulations implementing the security, privacy, and data breach notification provisions of the HITECH Act were released on January 17, 2013.  The HHS’s hope in issuing this final rule is to strengthen the data and security protection for individuals’ health information. This ruling finalizes an...

Read more ››

Learn how to accelerate your response to a breach...

Breach Prevention

Mar 05 2013 by
Responding to a data breach quickly and accurately is the key to minimizing damage and steering clear of litigation and hefty fines. In our third “Answer Men” podcast, a global privacy attorney offers tips on how to accelerate your response to a data breach. Ozzie Fonseca, Experian’s Senior Director of Data Breach Resolution, interviews Miriam Wugmeister, who chairs the global privacy and data security group at the...

Read more ››

Don’t Be a Stranger at IAPP. Stop by the Experian Booth....

Breach Prevention

Mar 04 2013 by
Is the IAPP Global Privacy Summit in your future? Well, it’s in ours. Join the Experian Data Breach team on March 6-8, 2013 at booth #18/19 to gain valuable insight on how to accelerate your response to a data breach. In addition, we’ll be participating in two sessions – one on surviving a data breach in the digital age and the other will be a mock debate on Bring Your Own Device programs. We’re looking forward to...

Read more ››

Five Tips to Combat a Denial of Service Cyber Attack...

Breach Prevention

Feb 26 2013 by
Who’s next? That’s a question probably lingering on the minds of many American banking executives these days. After all, eight U.S. banks were hammered by distributed denial of service (DDoS) cyber attacks in recent weeks and more could be in the works. A DDoS attack typically floods a website or network with so much traffic that it shuts down. The attack can last anywhere from hours to days, depending on how long it...

Read more ››

Dramatic changes on horizon for healthcare breach notificati...

Breach Prevention

Feb 26 2013 by
Healthcare data breaches will be treated much differently under the new HIPAA Omnibus rule. But do you know how? Find out in the latest installment of our “Answer Men” podcast series. Answer man Bob Krenek, also known as Experian’s Senior Director of Data Breach Resolution, interviews healthcare attorney Paula Stannard about changes coming down the pike. Stannard, an attorney with Alston & Bird, explains why...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets