Identity Theft

Data Breach in the News: Winter 2015

Posted on Feb 17 2015 by

You learn a lot about emerging and evolving risks when you help more than 3,000 organizations manage breaches of all kinds, as the Experian Data Breach Resolution team did in 2014. We shared many of our insights in our Second Annual Data Breach Industry Forecast, and recent headlines support many of the predictions we’ve made. […]

Share

ProtectMyID® Gets Even Better with Payment Fraud Protection through BillGuard

Posted on Jan 26 2015 by

Payment card fraud is on the rise; the costs of debit and credit card fraud have increased $3 billion since 2012, hitting a staggering $11 billion last year according to Javelin Strategy & Research. Chances are high that a number of your customers have either been affected by fraud or identity theft, or know someone […]

Share

New Collaboration Enhances Our Identity Protection Suite

Posted on Nov 11 2014 by

Each data breach brings new learnings. Often we gain more insight in where the vulnerabilities lie within businesses and sometimes we gain a better understanding of how consumers can better protect themselves. These discoveries help us in our goal to better secure the business environment from all angles. That’s why we’re proud to announce a […]

Share

Data breach in the news: Fall 2014

Posted on Oct 28 2014 by

While in the midst of Cybersecurity Awareness Month, recent headlines have been dominated by news of businesses experiencing a data breach. Companies nationwide have been on alert in light of breached business and information groups that have delivered significant consumer impact. As former White House Chief Information Officer Theresa Payton said in a recent interview […]

Share

Spreading the word: What can you do to support Cybersecurity Awareness Month?

Posted on Oct 14 2014 by

Cybersecurity risks and protection methods have changed greatly, for both businesses and individuals, since the Department of Homeland Security initiated the first Cybersecurity Awareness Month 11 years ago. New cyber threats emerge constantly, and it’s never been more vital for businesses and their employees to be on guard against cyber intruders. Hopefully, your organization already […]

Share

The role of the right partners in data breach recovery: the IAPP talk you won’t want to miss

Posted on Sep 16 2014 by

While many American companies have done a noteworthy job of improving their data breach preparedness in the past few years, it seems new breaches occur every month to remind us there’s still plenty of room for improvement. And many state governments are responding by upgrading their post-breach recovery requirements to mandate faster notification timing, and […]

Share

Make Sure You Are Really Protected After a Data Breach

Posted on Sep 09 2014 by

I can’t remember more high profile breaches occurring in such close succession, as has been the case over the last year.  These “mega” breaches have spurred an enormous amount of attention on the topic and, while more education and dialogue around breaches and identity theft is beneficial, it also produces a proliferation of misinformation. For […]

Share

Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters

Posted on Jun 26 2014 by

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants […]

Share

Views on Consumer Reactions

to Data Breaches

Posted on Jun 09 2014 by

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon […]

Share

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts

Posted on May 28 2014 by

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time […]

Share