Breach Prevention

Preparedness, planning, and strategies for execution

Superstorm Sandy’s wake-up call: Is your data protected fr...

Breach Prevention

Nov 07 2012 by
As Superstorm Sandy demonstrated to the East Coast during the last week of National Cyber Security Awareness Month; life happens so do you know where your data is? Data breach protection is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national cyber security protection at an event in Washington.  During her speech, Napolitano...

Read more ››

BYOD leads to data breaches in the workplace...

Breach Prevention

Nov 01 2012 by
  While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the workplace, many healthcare companies are considering adopting a Bring...

Read more ››

Three tips for choosing a cloud provider...

Breach Prevention

Oct 23 2012 by
To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when...

Read more ››

Companies Beware: Cyber security escalates in importance...

Breach Prevention

Oct 09 2012 by
How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important. So important that a top U.S. cyber warrior is recommending that his cyber command division be elevated into a top-level military unit under the Department of Defense. The Cyber Command, created two years ago, is currently under the U.S....

Read more ››

IAPP Privacy Academy: Will you be there?...

Breach Prevention

Sep 25 2012 by
  You see stories about data breaches all the time. Earlier this month, in fact, a small medical facility was fined $1.5 million following a data breach that resulted from a stolen, unencrypted laptop. News like that makes security, legal and compliance professionals shudder. But could the medical facility have avoided that fine? Absolutely. What about after a data breach? What happens during the recovery and remediation...

Read more ››

What does increased enforcement mean to you?...

Breach Prevention

Sep 18 2012 by
  Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance plans. These tools include technology that’s being used to spot fraud and suspicious activity...

Read more ››

When are small businesses too small for data breach? Never...

Breach Prevention

Sep 11 2012 by
Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data breaches analyzed last year involved businesses with less than 100 employees. Disturbing Data Breach Trend And, these...

Read more ››

Congress fails to reach agreement on cybersecurity legislati...

Breach Prevention

Sep 05 2012 by
  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess. After several revisions, the Senate began debate on the Cybersecurity Act of 2012...

Read more ››

Report gives readers the latest inside(r) scoop...

Breach Prevention

Aug 14 2012 by
Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out of 25) users were filched and openly posted to a Russian hacker...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets