Breach Prevention

Preparedness, planning, and strategies for execution

10,000 identity fraud rings discovered in the Southeastern U...

Breach Prevention

Jan 22 2013 by
When people hear “identity fraud,” they usually conjure up images of a lone hacker furtively typing on a laptop.  However the reality is identity theft is largely committed by identity fraud rings composed of two or more criminals actively working together.  Currently in the U.S., there are more than 10,000 identity fraud rings and unlike other types of organized crime and cyber security threats, most identity fraud...

Read more ››

Chubb Survey discovers U.S. public companies’ number one f...

Breach Prevention

Jan 15 2013 by
In 2012, FBI Director Robert Mueller stated, “There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again.”  Given this warning, companies who are serious about protecting themselves from cyber thieves need to have a comprehensive protection plan, one that includes cyber liability insurance, in order to...

Read more ››

Cyber Security Act of 2012 dies as an executive order is bor...

Breach Prevention

Jan 08 2013 by
The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department and other key federal agencies consider this cyber legislation critical to national security and DOD officials expressed...

Read more ››

When it comes to data breach, hackers are not the biggest th...

Breach Prevention

Dec 27 2012 by
Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches from January 2009 to May 2012 in the Chronology of Data Breaches maintained by the Privacy Rights...

Read more ››

Online holiday shopping is also big business for fraudsters...

Breach Prevention

Dec 18 2012 by
According to EMC's November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security measures in order to avoid illegal online activity.  Of the 1.4 billion dollars...

Read more ››

7 Things you should think about when you audit your response...

Breach Prevention

Dec 13 2012 by
Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing...

Read more ››

‘Tis the season for National Identity Theft Prevention and...

Breach Prevention

Dec 04 2012 by
December is not only the shop ‘til you drop season, it’s also National Identity Theft Prevention and Awareness month, reminding retailers and businesses that they need to not only protect themselves from a data breach but also make their employees aware of identity fraud scammers who target seasonal help.  According to the Federal Trade Commission, identity theft is the number one type of consumer fraud in the U.S.,...

Read more ››

The next big cyber security threat: Your fingers...

Breach Prevention

Nov 27 2012 by
We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo can lead to typo-squatting also known as URL hijacking. Typo-squatters count on...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets