Breach Prevention

Loading...
Three tips for choosing a cloud provider...

To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is....

Read More Three tips for choosing a cloud provider
Companies Beware: Cyber security escalates in importan...

How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more...

Read More Companies Beware: Cyber security escalates in importance
IAPP Privacy Academy: Will you be there?...

Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an...

Read More IAPP Privacy Academy: Will you be there?
What does increased enforcement mean to you?...

Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid...

Read More What does increased enforcement mean to you?
When are small businesses too small for data breach? N...

Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data...

Read More When are small businesses too small for data breach? Never
Congress fails to reach agreement on cybersecurity leg...

  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning...

Read More Congress fails to reach agreement on cybersecurity legislation
Report gives readers the latest inside(r) scoop...

Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out...

Read More Report gives readers the latest inside(r) scoop
World-class scammers vie for Olympic gold...

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more...

Read More World-class scammers vie for Olympic gold
Three data protection strategies to catch a “phish”...

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from...

Read More Three data protection strategies to catch a “phish”
The top 5 cyber security threats to future of mobile b...

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful...

Read More The top 5 cyber security threats to future of mobile banking
Webinar: Data breaches can happen anytime, anywhere...

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you?...

Read More Webinar: Data breaches can happen anytime, anywhere
A mobile test of human threats...

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally...

Read More A mobile test of human threats