<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Fraud Resolution</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/category/fraud-resolution/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Password management</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/#comments</comments>
		<pubDate>Tue, 19 Jun 2012 17:21:47 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[password security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1354</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,password+security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg"><img class="aligncenter size-full wp-image-1357" title="Password Management" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg" alt="" width="461" height="461" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p><em>The</em> rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect those accounts.  I personally have accounts (and passwords) for sites I no longer even remember.  And while I have more accounts than most due to my profession, my hunch is that many people deal with the issue of password overload.  Password overload is when you attempt to use your Pinterest, Twitter, work email and university login passwords (one after another) to get into your Money Market Account only to be locked out.  Now you have to go into the branch with photo ID, or endure the dreaded “customer service hotline” (not-line) to prove that “you are you.”  I expect that you have experienced such “password overload” inconveniences, or you almost certainly know someone who has.</p>
<p>The problem seems like it could be easily solved by using the same password for everything.  One password to remember, and no more jumbling through your notebook trying to find what password you used for your newest account creation or Facebook app.  The problem with this approach is that if you are using the same <a title="passwords-that-wont-crack" href="http://blog.protectmyid.com/2012/05/30/passwords-that-wont-crack-under-pressure/" class="broken_link" rel="nofollow">passwords</a> for all (or even several) of your accounts, then if someone manages to get the password for say, your Instagram account, they would probably be able to then drain your savings account, phish your family for personal information (such as your Social Security Number), or rack up a warrant in your name for writing bad checks….  This could all happen because you logged into Facebook at an unsecured Wi-fi location, where your password for that one <a title="state-of-identity-theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">account is compromised</a>, and it happens to be the same password you use for multiple accounts.</p>
<p>So, what do you do if you don’t want to tattoo 25 passwords on your arm and you don’t want to end up cuffed for felony check fraud? The answer is a password manager.  This new service was created so that users can remember just one password, yet have access to all other passwords. The best part is that you can have access to these passwords from anywhere as most of the new password managers are internet based. As the need for password management increases, the options consumers have grown leaving even the strictest cybersecurity aficionado pleased with the service. </p>
<p>A few things you should look for when finding a password manager are:</p>
<ol>
<li>Is it cross platform? Will it work on your iPhone and your PC?</li>
<li>How is the information (your passwords) encrypted?</li>
<li>Does the service sync automatically, or will the user need to update the password storage database every time they sign up for a new account?</li>
<li>What is the initial authentication process and how strong is it?</li>
<li>How reputable is the company who created the product and what is reported about the product itself?</li>
</ol>
<p>By asking yourself these questions you should be on your way to making sure that your passwords are protected and you won’t lose your mind trying to keep track of them all. Just make sure you protect your login credentials for your password manager…. like <strong>really, really well</strong>&#8230;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/19/password-management/&via=Experian_DBR&text=Password management&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F&amp;title=Password%20management" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are you in hiding after a data breach? Watch our new video.</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/947/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/947/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:21:14 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=947</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=KTHWhscxGeU Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.youtube.com/watch?v=KTHWhscxGeU">http://www.youtube.com/watch?v=KTHWhscxGeU</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/947/&via=Experian_DBR&text=Are you in hiding after a data breach? Watch our new video.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F&amp;title=Are%20you%20in%20hiding%20after%20a%20data%20breach%3F%20Watch%20our%20new%20video." id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/947/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Consequences following a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 16:58:48 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=923</guid>
		<description><![CDATA[Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F25%2Fconsequences-following-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,Data+Breach+Notification,data+breach+response,healthcare+data+breach,Ponemon+Institute,privacy+legislation,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg"><img class="aligncenter size-full wp-image-938" title="security-1024x722" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg" alt="" width="553" height="390" /></a></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the <a title="Ponemon Institute Website" href="http://www.ponemon.org/index.php" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>.</em></p>
<p>Our latest study, <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">Aftermath of a Data Breach Study</a>, was conducted to better understand how a data breach affects organizations over the long term. In this study, IT professionals weigh in on how their organizations dealt with a data breach that had both serious financial and reputational consequences. While we asked respondents to focus on just one breach, 85 percent say that their organizations had more than one breach involving customer/consumer data in the past 24 months. It is interesting to note that in many cases it took a serious data breach to make privacy and data protection a greater priority and allocate additional resources to the IT security function.</p>
<p>While many respondents were unable to determine the root cause of the data breach, there is a consensus among respondents that insider negligence is making their organizations vulnerable to a data breach. As a result, organizations are investing in training and awareness and technologies that minimize the human factor risk.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a title="Ponemone Reputation of Data Breach Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_012512_article ">Download the Ponemon Reputation Impact Study</a> to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<p>The findings also show the concern organizations have about <a title="How data breaches harm reputations" href="http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/" target="_blank">losing the loyalty</a> of their customers. Of the IT practitioners surveyed, few felt that prompt notification to victims was enough to reduce the negative consequences of the data breach. This suggests that compliance with data breach notifications laws in and of itself is not sufficient if an organization is concerned about customer loyalty and reputation. Other lessons learned from the data breach are to limit the amount of personal data collected, limit sharing with third parties and limit the amount of personal data stored. We invite you to read the <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">full report here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/&via=Experian_DBR&text=Consequences following a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How data breaches harm reputations</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/#comments</comments>
		<pubDate>Tue, 17 Jan 2012 17:17:28 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=919</guid>
		<description><![CDATA[The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F17%2Fhow-data-breaches-harm-reputations%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+response,data+privacy,Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Within the world of cyber security, a great deal of attention has been focused lately on the escalating hazards and frequency of data breaches, with considerable discussion on the <a title="Cyber crime gets costlier" href="http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/" target="_blank">high cost</a> of such breaches.  But as the industry has assessed the financial toll of breaches, it has never taken into account the impact breaches have on a company’s brand image and, consequently, its bottom line.</p>
<p>Until now.</p>
<p>A recently released <a title="Ponemon Institute Study " href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute study</a>, sponsored by <a title="Experian Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Experian’s Data Breach Resolution</a> and believed to be the first of its kind, explores the “Reputation Impact of a Data Breach” to provide more context for the full scope of data breaches.  The findings draw enlightening conclusions around the financial toll that data breaches wreak upon harmed corporate reputations, including these key takeaways:</p>
<p>Reputation is one of an organization’s most important and valuable assets.<br />
Reputation and brand image are perceived as very valuable…and highly vulnerable to negative events, including a data breach.</p>
<p>Calculating the value of reputation and brand reveals how valuable these assets are to an organization. The average value of brand and reputation for the study’s participating organizations was determined to be approximately $1.5 billion.  Depending upon the type of information lost as a result of the breach, the average loss in the value of the brand ranged from $184 million to more than $330 million. Depending upon the type of breach, the value of brand and reputation could decline as much as 17 percent to 31 percent.</p>
<p>Not all data breaches are equal. Some breaches are more devastating than others to an<br />
organization’s reputation and brand image, with the<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/" target="_blank"> loss or theft of customer information</a> ranked as the most devastating (followed by confidential financial business information and confidential non-financial business information).</p>
<p>Data breaches occur in most organizations represented in this study and have at least a moderate or a significant impact on reputation and brand image. According to 82 percent of respondents, their organizations had a data breach involving sensitive or confidential information.  Fifty-three percent say the data breaches had a moderate impact on reputation and brand image and 23 percent say it was significant.</p>
<p>Most organizations in the study have had a data breach involving the theft of sensitive or confidential business information. On average these types of breaches have occurred 2.9 times in surveyed organizations, with the theft or loss of confidential financial information having the most significant impact on reputation and brand.</p>
<p>Respondents strongly believe in understanding the root cause of the breach and<br />
protecting victims from identity theft. When asked what their organizations did following a<br />
breach to preserve or restore brand and reputation, the top three steps are: conduct investigations and forensics, work closely with law enforcement and protect those affected from potential harms such as identity theft.</p>
<p>The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Reputation Impact Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_011712_article ">Download the Ponemon Reputation Impact Study </a>to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/&via=Experian_DBR&text=How data breaches harm reputations&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The dollars of a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/#comments</comments>
		<pubDate>Tue, 16 Aug 2011 15:42:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach costs]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=728</guid>
		<description><![CDATA[It’s no surprise that data breaches are expensive.  The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F16%2Fthe-dollars-of-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+costs,HITECH+Act,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/DataLossPreventionBusinessAdvisoryBanner.jpg"><img class="aligncenter size-full wp-image-729" title="DataLossPreventionBusinessAdvisoryBanner" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/DataLossPreventionBusinessAdvisoryBanner.jpg" alt="" width="448" height="196" /></a></p>
<p>It’s no surprise that data breaches are expensive.  The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.  Their most recent analysis, the <a rel="”nofollow” nofollow" href="http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon" target="_blank" class="broken_link">2010 U.S. Cost of a Data Breach</a>, includes a look at 51 U.S. companies from 15 different industry sectors, all of which experienced data breaches.</p>
<p>The findings dispel any notion that data breaches are becoming less costly as data breach notification sets in amongst consumers and they presumably care less about breach incidents.  In fact, consumers are still highly concerned about data breaches, and the costs of breaches are climbing.</p>
<p>A few <a rel="”nofollow” nofollow" href="http://www.ponemon.org/blog/post/cost-of-a-data-breach-climbs-higher" target="_blank" class="broken_link">key takeaways</a> from the Ponemon study:</p>
<ul>
<li>The average cost of a data breach increased by seven percent to $7.2 million in 2010, with the cost of each compromised record now averaging $214, up from $209 in 2009.</li>
<li>Costs of a data breach include notification and legal defense costs, penalties from regulations such as the <a href="http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/" target="_blank">HITECH Act</a>, and lost customer business.</li>
<li>For the first time, malicious or criminal attacks are the most expensive cause of data breaches and not the least common one; up from 12% in 2008, to 24% in 2009, to 31% in 2010.</li>
<li>Quick responses to data breaches are more costly than slower responses – 54% more, to be precise.  With the haste to comply with state and federal regulations, some companies rush to get the notification process over with, and in the process over-notify more than needed.</li>
<li>Companies are more proactively protecting themselves from data breach threats.  For example, breaches due to systems failures, lost devices and third-party mistakes are lower than before.  And while some companies may be responding to breaches too hastily (and inefficiently), the good news is that more companies are responding to breaches within 30 days of an incident.</li>
</ul>
<p>One of the more surprising findings is that negligence is still the leading cause of data breaches, at 41%, further underscoring the need for companies to strengthen their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">security practices</a>.  On the bright side, the average breach detection and escalation costs went up by 72%, so it appears that companies are beginning to get the message that the threat of data breaches requires <a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">aggressive precautions</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/&via=Experian_DBR&text=The dollars of a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>As organized crime goes virtual, the law cyber-saddles up</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/#comments</comments>
		<pubDate>Tue, 26 Jul 2011 15:52:11 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data breach prevention]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[organized crime]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=688</guid>
		<description><![CDATA[Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F26%2Fas-organized-crime-goes-virtual-the-law-cyber-saddles-up%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,data+breach+prevention,FBI,NATO,organized+crime&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg"><img class="aligncenter size-full wp-image-691" title="cyber criminal" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg" alt="" width="448" height="282" /></a></em></p>
<p><em>Our guest blogger this week is</em><em> Tom Bowers, Managing Director, <a rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a> –</em> <em>a security architecture, data leakage prevention and global enterprise information consulting firm.</em></p>
<p>Back in the days of Prohibition, organized crime burst into the national consciousness with the “ka-pow” of a Tommy gun, capturing a sometimes romantic fascination that continues to this day.  The public face of organized crime may have morphed somewhat over the years, from Al Capone and Bugsy Siegal to Vito Corleone and Tony Soprano, but the mugshots have been generally similar and the contours of “the life” familiar.</p>
<p>With the advent of technology, however, organized crime has flocked to new outlaw opportunities that depart wildly from the old stomping grounds.  Today, cyber crime is the hot modern racket, with <a rel="”nofollow” nofollow" href="http://scamfraudalert.wordpress.com/2011/02/27/fbi-2010-cybercrime-statistics/" target="_blank" class="broken_link">offenses</a> ranging from the seemingly mundane (non-delivery of payment or merchandise top the list at 14.4% of all online crime), to the daring (scams impersonating the FBI, which come in second place at 13.2%), to the now well-known standbys (identity theft, rounding out third place at 9.8%).  At the center of the cyber crime explosion is organized crime, often formed into <a rel="”nofollow” nofollow" href="http://www.washingtonpost.com/wp-dyn/content/article/2009/04/15/AR2009041501196.html" target="_blank" class="broken_link">global gangs</a> (frequently based in Eastern Europe), ever more sophisticated, and comprising a new kind of operation that doesn’t look anything like the movies.</p>
<p>Indeed, cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.  The FBI gained headway &#8211; and large-scale arrests in the U.S. &#8211; with the hiring of more agents with computer science, business and operational analysis backgrounds, but cyber criminals responded by <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2010/03/24/us-technology-scareware-idUSTRE62N29T20100324" target="_blank" class="broken_link">outsourcing</a> their operations to countries with weak computer crime laws and law enforcement capabilities.  Investigations across borders were bogged down by legal proceedings, arrests and convictions were slow to materialize, and negative public outcry placed pressure on governments around the world.</p>
<p>But now the tide has changed.  The three-year-old <a rel="”nofollow” nofollow" href="http://www.impact-alliance.org/home/index.html" target="_blank" class="broken_link">International Multilateral Partnership Against Cyber Threats (IMPACT)</a> is the world’s first not-for-profit comprehensive global public-private partnership against cyber threats, bringing together academia, industry experts and governments from more than 120 partner countries.  The <a rel="”nofollow” nofollow" href="http://www.theregister.co.uk/2011/05/25/uk_ratifies_cybercrime_convention/" target="_blank" class="broken_link">Budapest Convention on Cybercrime</a>, an effort to synchronize national cyber security laws, has been joined by more than 30 different countries.  The European Union, U.S and NATO are working together to tackle cyber crime and have announced the formation of a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/211297/eu_us_and_nato_to_work_together_on_cyber_defense.html" target="_blank" class="broken_link">new cybercrime center</a>, to be operational by 2013.</p>
<p>As international agreements begin to take shape, global law enforcement benefits from common frameworks for cooperation.  Accordingly, countries are beginning to share enforcement officers, time and talent…and <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/235390/uk_claims_cybercrime_victory_after_phishing_gang_sentencing.html" target="_blank" class="broken_link">cyber crime arrests</a> are on the rise.  Clearly, a mobilized, globalized and flexible law enforcement response to cyber criminal activity – combined with <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">best practices</a> for data breach prevention – are the best ways to keep today’s mob offline and on the run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/&via=Experian_DBR&text=As organized crime goes virtual, the law cyber-saddles up&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Trouble in the clouds: Data breaches threaten cloud computing</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/#comments</comments>
		<pubDate>Tue, 19 Jul 2011 15:09:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Cloud computing]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IDC]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=680</guid>
		<description><![CDATA[Cloud services that handle enormous amount of data amongst consumers and corporate clients are a big target of fraudsters.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F19%2Ftrouble-in-the-clouds-data-breaches-threaten-cloud-computing%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cloud+computing,Data+Breach,Data+Security,IDC&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cloud-computing-e1267202304537.jpg"><img class="aligncenter size-full wp-image-682" title="cloud-computing-e1267202304537" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cloud-computing-e1267202304537.jpg" alt="" width="405" height="297" /></a></p>
<p>Cloud computing.  It’s a buzzword that’s lately been bandied about in the context of recent data breaches, casting a shadow on a technology trend that has formerly been considered a bright light in data storage.  Do businesses that have come to rely on cloud computing need to worry that they’re at increased risk of data breaches?</p>
<p>First, let’s be clear about what <a rel="”nofollow” nofollow" href="http://searchcloudcomputing.techtarget.com/definition/cloud-computing" target="_blank" class="broken_link">cloud computing</a> entails.  While the name sounds confusing, we’re all operating in the clouds these days, as cloud computing implies anything delivering hosted services over the Internet.  Because data is stored on remote servers and accessed online, consumers can have every piece of data that they need readily available wherever they are, on whichever device they need.  Cloud services have been a boon to businesses because they enable outsourcing of the cost and hassle of hosting and updating software on their own servers.</p>
<p>But hacking attacks against companies have <a rel="”nofollow” nofollow" href="http://www.theglobeandmail.com/news/technology/tech-news/data-breaches-threaten-to-dampen-cloud-computings-prospects/article2045853/" target="_blank" class="broken_link">drawn concerns</a> about the level of data security within cloud computing.  Cloud services that handle enormous amount of data amongst consumers and corporate clients are a big target of fraudsters, and the recent wave of high-profile attacks may cause enough second-guessing to slow the growth of the exploding cloud computing market (expected to reach $55 billion by 2014, according to technology research form IDC).  When a cloud service that handles numerous corporate clients is breached, clients whose customer information was compromised must issue alerts and apologies to their own customers.  The end consumer may have never heard of the subcontractor, so the corporate client is the one that may suffer the blame – and lost business.</p>
<p>While the <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">damage</a> to companies when their marketing and email providers are hacked can be huge, many industry experts believe that cloud applications are still <a rel="”nofollow” nofollow" href="http://businessfinancemag.com/article/debunking-5-myths-cloud-computing-0622" target="_blank" class="broken_link">safer than in-house applications</a>.  Companies who make their business in cloud computing invest vast resources in data security – far more than most individual organizations could ever handle alone, and while their systems are constantly under attack, they have highly specialized experts whose mission is to stay on top of the latest hacking loopholes.  Indeed, many believe that cloud computing can yield a net gain in data security for businesses, so long as these organizations exercise <a rel="”nofollow” nofollow" href="http://www.smallbusinesscomputing.com/biztools/article.php/3927376/10-Cloud-Computing-Security-Tips-for-Small-Businesses.htm" target="_blank" class="broken_link">due diligence and planning</a> before engaging a cloud service.</p>
<p>The clouds are here to stay, and businesses can come out ahead from the benefits these services offer.  Just remember that smart <a rel="”nofollow” nofollow" href="http://www.ibj.com/hacking-attacks-reminder-for-data-safekeeping-in-cloud-computing/PARAMS/article/27577" target="_blank" class="broken_link">data security policies</a> are as important with cloud computing as any other aspect of a company’s technology systems.  When it comes to security in the clouds or on the ground, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">preparedness</a> is always key.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/&via=Experian_DBR&text=Trouble in the clouds: Data breaches threaten cloud computing&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>8 insights into the underground fraud economy</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/#comments</comments>
		<pubDate>Tue, 24 May 2011 15:42:55 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[credit card theft]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Secret Service]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=575</guid>
		<description><![CDATA[These days, the fraud economy has matured to a point where it is run like a global marketplace, with specialists for every aspect of fraud – from identity thieves to the consumers of stolen identities.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F24%2F8-insights-into-the-underground-fraud-economy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=credit+card+theft,Fraud,Identity+Theft,Secret+Service&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/fraud.bmp"><img class="aligncenter size-full wp-image-577" title="fraud" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/fraud.bmp" alt="" /></a></p>
<p>Quick – conjure the image that comes to mind when you hear the term cybercriminal.</p>
<p>Perhaps an unkempt, lone operator working out of a boiler room late at night?</p>
<p>How about – more commonly these days – a sophisticated fraud businessman running a high-stakes organization with international teams of experts, raking in millions through his illegal tactics.</p>
<p>When <a rel="”nofollow” nofollow" href="http://www.scmagazineuk.com/tj-maxx-hacker-albert-gonzalez-sentenced-to-20-years-for-his-part-in-the-compromise-of-almost-100-million-credit-and-debit-cards/article/166615/" target="_blank" class="broken_link">Albert Gonzalez</a> was arrested for hacking into the networks of <a rel="”nofollow” nofollow" href="http://www.informationweek.com/news/security/showArticle.jhtml?articleID=198701100" target="_blank" class="broken_link">TJ Maxx</a>, Barnes and Nobles, and OfficeMax, amongst others, and stealing 45 million credit and debit card numbers, he had $1.65 million in cash, a crew of international <a rel="”nofollow” nofollow" href="http://www.afterdawn.com/news/article.cfm/2010/04/02/albert_gonzalez_accomplice_gets_seven_year_sentence" target="_blank" class="broken_link">co-conspirators</a>, and secret bank accounts across the world stuffed with millions more.  Gonzalez, who <a rel="”nofollow” nofollow" href="http://www.cnbc.com/id/40535839/" target="_blank" class="broken_link">formerly worked for the Secret Service</a> busting other cyber criminals, was later indicted for an even bigger, separate attack that compromised 140 stolen credit card numbers.</p>
<p>These days, the fraud economy has matured to a point where it is run like a global marketplace, with specialists for every aspect of fraud – from <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity thieves</a> to the <em>consumers</em> of stolen identities.  <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">Data theft</a> is only one part of what fuels this economy – the second and equally important aspect is the conversion of these thefts into cash, which is where the fraud economy connects illegal data traffickers with underground data buyers.</p>
<p><a rel="”nofollow” nofollow" href="http://www.firstdata.com/downloads/thought-leadership/fraudtrends2010_wp.pdf" target="_blank" class="broken_link">First Data’s report</a> on this topic offers a cheat sheet of the cheating way of life:</p>
<p>1.       According to a <a rel="”nofollow” nofollow" href="http://www.symantec.com/en/aa/business/resources/articles/article.jsp?aid=20090127_symc_provides_info_on_boming_underground_economy" target="_blank" class="broken_link">study from Symantec Corp</a>. which followed a year in the life of the underground economy, the value of the advertised goods on underground economy Web servers in a given year was more than $276 million</p>
<p>2.       The Symantec study found that the most popular item for sale, as well as the most requested for purchase, is credit card data, which are inexpensive to buy and have the potential for high profit</p>
<p>3.       The price for stolen credit card data ranges from 10 cents to $25 per card, with discounts offered for bulk purchases</p>
<p>4.       The average stolen credit card has a credit limit of $4,000</p>
<p>5.       The potential worth of all credit cards observed for sale during Symantec’s yearlong reporting period was estimated to be $5.3 billion</p>
<p>6.       Stolen financial account information is the second most popular item for sale in the underground economy, selling for $10 to $1,000 per account (with an average account balance of nearly $40,000)</p>
<p>7.       The potential value of all bank accounts advertised on underground economy servers during the reporting period was $1.7 billion</p>
<p>8.       <a rel="”nofollow” nofollow" href="https://www.infosecisland.com/blogview/3520-Meikle-FaaS-Fraud-as-a-Service.html" target="_blank" class="broken_link">Fraud as a Service (FaaS)</a> has evolved as an infrastructure that helps fraudsters operate efficiently, just as software as a service (SaaS) has evolved to help the online needs of businesses.  FaaS includes online Fraud Forums, which serve as web-based marketplaces for illegal goods and services</p>
<p>As ever-developing fraud techniques challenge the wits of security experts, it’s important to <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">understand as much as possible</a> about the underground fraud economy that orchestrates advanced methods to rob businesses and consumers as well as how to address these concerns.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/&via=Experian_DBR&text=8 insights into the underground fraud economy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches – to prepare or not to prepare? The answer is simple.</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/#comments</comments>
		<pubDate>Tue, 17 May 2011 16:00:22 +0000</pubDate>
		<dc:creator>pluehr</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=566</guid>
		<description><![CDATA[All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F17%2Fdata-breaches-%25e2%2580%2593-to-prepare-or-not-to-prepare-the-answer-is-simple%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,healthcare+data+breach,HITECH+Act,PHI,PII,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em>Our guest blogger this week is</em><em> Paul Luehr, Managing Director, General Counsel, <a href="http://www.strozfriedberg.com/professionals/xprProfessionalDetails1.aspx?xpST=ProfessionalDetail&amp;professional=11" rel="”nofollow” nofollow" target="_blank" class="broken_link">Stroz Friedberg, LLC</a> -</em> <em>a global digital risk management and investigations firm</em><em>.</em><em></em></p>
<p>All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. Healthcare institutions especially should heed the call for an incident response plan because it provides the best preventive medicine to minimize financial and reputational risks.  So <strong>PLAN</strong>, keeping in mind:  <strong><span style="text-decoration: underline;">P</span></strong>eople, the <strong><span style="text-decoration: underline;">L</span></strong>aw, and <strong><span style="text-decoration: underline;">A</span></strong>ction, with <strong><span style="text-decoration: underline;">N</span></strong>o time to waste.</p>
<p><strong><span style="text-decoration: underline;">P</span></strong>eople – Define the responsibilities of a coordinated incident response team. Don’t act alone. A good response team should include key internal players (In-house Counsel, IT, Compliance/Security, HR and Public Relations), as well as outside experts who confront data breaches on a regular basis (trusted Attorneys, Forensic Analysts and Fraud Monitors). These external experts can help restore key business functions, preserve crucial forensic evidence, strengthen data security, address victims’ needs, and communicate effectively with regulators and the public.</p>
<p><strong><span style="text-decoration: underline;">L</span></strong>aw – Track fast-changing data breach laws, privacy regulations, and notification mandates <em>before</em> a breach should occur.  This can help your organization identify protected health or personally identifiable information (PHI/PII which may trigger liability), navigate the HITECH Act and state law, understand reporting timelines, and effectively reach select constituents (i.e. Health and Human Services, victims, law enforcement and/or the media).</p>
<p><strong><span style="text-decoration: underline;">A</span></strong>ction – Outline clear action items to accomplish within the first seventy-two hours. One early misstep can destroy crucial evidence, delay an effective response, and trigger government penalties or class-action lawsuits.</p>
<p><strong><span style="text-decoration: underline;">N</span></strong>o time to waste – Remember that time is of the essence. <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Once a breach is identified</a>, the clock starts ticking and may require immediate notice to regulators and/or notification to individual victims within 60 days.  </p>
<p>A comprehensive preparedness plan can promote extraordinary efficiencies when a breach threatens a healthcare entity. So, <strong>create your PLAN now.</strong></p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the free Data Breach Response Guide by Experian!" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_051711_article ">Download your free Data Breach Response Guide!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/&via=Experian_DBR&text=Data breaches – to prepare or not to prepare? The answer is simple.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>