<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Identity Theft</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/category/identitytheft/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Three things you should never do to identity theft victims</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 18:16:31 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1555</guid>
		<description><![CDATA[Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg"><img class="aligncenter size-full wp-image-1558" title="Identity_Theft_Victim" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg" alt="" width="371" height="282" /></a></p>
<p>Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft.</p>
<p>In fact, 90% of the respondents in a <a title="Ponemon Institute: Third Annual Study on Medical Identity Theft " href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">recent study </a>knew the definition of medical identity theft this year, compared with 77% last year, according to the Ponemon Institute.</p>
<p>Awareness of the crime, along with its number of victims, is obviously rising. But interestingly, a majority of victims are either not sure what to do or don’t do anything about having their medical identities stolen. What about your organization? Does it know what to do?</p>
<p>Here are three things you should never do if your organization experiences a data breach that puts patients or consumers at risk of identity theft:</p>
<ul>
<li>Ignore the incident thinking no one will find out</li>
<li>Take one year or longer to notify potential victims. Or even worse, don’t notify them at all if you’re not required to do so by law.</li>
<li>Don’t offer any compensation or services to help potential victims</li>
</ul>
<p>So what should you do? Here’s what people expect when their medical records are lost or stolen.</p>
<p>1)      Reimbursement for the cost of finding another provider. If you’re a doctor, this may seem worse than it actually is, as most victims take no action. But if they do leave, reimbursing them is an act of goodwill that can only benefit your organization in the long run.</p>
<p>2)      <a title="Ponemon Institute: 2012 Consumer Study on Data Breach Notification " href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">To be notified of the loss </a>or theft within 30 days. It may behoove you to be honest and forthright. Some organizations maintained the loyalty of their patients by issuing a press release and developing a website dedicated to the breach.</p>
<p>3)      To be provided with free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity protection </a>for one year.</p>
<p>The best remedy for identity theft is to avoid it altogether by taking precautions to protect data and train your staff on security measures. But if you do experience a breach that leads to identity theft, the best thing you can do is help your victims. It’s not only the right thing to do, it’s also the best way to protect your brand and reputation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_082112_article">Download your free Data Breach Response Guide! </a></div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/&via=Experian_DBR&text=Three things you should never do to identity theft victims&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F&amp;title=Three%20things%20you%20should%20never%20do%20to%20identity%20theft%20victims" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: The state of identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/#comments</comments>
		<pubDate>Mon, 11 Jun 2012 20:26:51 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Identity Theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1329</guid>
		<description><![CDATA[A nationwide look at consumers&#8217; identity theft complaints based on FTC reports. Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F11%2Finfographic-the-state-of-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=%23databreach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>A nationwide look at consumers&#8217; identity theft complaints based on FTC reports.</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/The-State-of-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-1330" title="The State of Identity Theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/The-State-of-Identity-Theft.jpg" alt="" width="540" height="1904" /></a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/&via=Experian_DBR&text=Infographic: The state of identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F11%2Finfographic-the-state-of-identity-theft%2F&amp;title=Infographic%3A%20The%20state%20of%20identity%20theft" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ITRC report identifies top three data breach triggers</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/#comments</comments>
		<pubDate>Mon, 07 May 2012 23:20:31 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1201</guid>
		<description><![CDATA[For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F07%2Fitrc-report-identifies-top-three-data-breach-triggers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Fraud,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/Data-Breach31.jpg"><img class="aligncenter size-full wp-image-1210" title="Data-Breach Lock" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/Data-Breach31.jpg" alt="" width="428" height="265" /></a></p>
<p style="text-align: left;">For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft</a> <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Resource Center </a>(ITRC), the three primary causes of data breaches have remained the same since 2009:</p>
<ul>
<li>Hacking</li>
<li>Data on the move</li>
<li>Insider theft</li>
</ul>
<p>ITRC has been releasing an annual Breach Report since 2007. For the first time, hacking outpaced all other triggers to account for just more than a quarter of the 419 breaches in 2011. Incidents of hacking rose from 17.1% in 2010 and, the previous high, 19.5% in 2009 to 25.8% in 2011.</p>
<p>Data on the move* was the second highest trigger, accounting for 18.1% of the breaches in 2011. Insider theft, falling slightly from 2010, caused 13.4% of the breaches as the third trigger. ITRC further counts hacking and insider theft together as a malicious attack, adding up to nearly 40% of breaches in 2011.</p>
<p>The numbers make it clear that companies can’t rely on one form of data breach prevention alone. The 2011 Breach Report further illustrates that no company is immune. Of the entities reporting data breaches, 47% fell into the business category. Both business and educational entities experienced an upswing in data loss incidents in 2011.</p>
<p>The report also considers government/military, financial/credit and health/medical entities, the third of which accounted for 20.5% of the breaches in 2011.</p>
<p>Among the more alarming findings is that 61.6% of the reported breaches in 2011 exposed Social Security numbers (SSN), one of the most valuable pieces of personal data an individual has. Such exposure can leave a consumer vulnerable to identity theft indefinitely. Individuals can’t easily exchange their SSN for a new number like they can with credit or debit cards. (Loss of credit and debit card data was a factor in 26.5% of incidents in 2011.)</p>
<p>Drawing on what’s known about how breaches occur, companies can plan ahead to prevent and respond to incidents in order to protect themselves and the consumer data they use and collect. A comprehensive prevention and response plan should account for all of the various ways, including accidental exposure and subcontractor loss, that breaches occur.</p>
<p>Staying aware of vulnerabilities can only help companies strengthen their defense. Data breaches are here to stay, so there’s no time like the present to take prevention and preparation seriously.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Resolution Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_050712_article ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div>
<p>*“Data on the move” refers to data that has left its usual place of rest, i.e. its proper storage place. This includes data in transport to a new storage location as well as data that has left an office on an electronic drive, a mobile device or paper.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/&via=Experian_DBR&text=ITRC report identifies top three data breach triggers&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F07%2Fitrc-report-identifies-top-three-data-breach-triggers%2F&amp;title=ITRC%20report%20identifies%20top%20three%20data%20breach%20triggers" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Students and cyber defense</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/#comments</comments>
		<pubDate>Tue, 07 Feb 2012 21:41:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Student Identity Theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=957</guid>
		<description><![CDATA[This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F07%2Fstudents-and-cyber-defense%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Identity+Theft,Identity+Theft+Prevention,Student+Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg"><img class="aligncenter size-full wp-image-961" title="college-students-easy-target-for-identity-thieves-10092901" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg" alt="Identity thief reaching for student ID" width="425" height="282" /></a></p>
<p>&nbsp;</p>
<p>A great deal of data is collected on students of all ages.  Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive data such as social security numbers.  Unfortunately, school administrators don’t always protect this information as well as they should and education institutions are just as susceptible to data breaches as any other organization.</p>
<p>This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are <a title="Child Identity Theft Blog Article" href="http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/" target="_blank">51 times more likely</a> to suffer from identity theft than adults.</p>
<p>The Federal Trade Commission recently issued a <a title="FTC Website" rel="nofollow" href="http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt056.shtm" target="_blank" class="broken_link">release</a> alerting parents about how to protect students from fraudulent activity.  Of particular note is information about the federal <a title="Education Website" rel="nofollow" href="http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank" class="broken_link">Family Educational Rights Privacy Act </a>(FERPA), enforced by the U.S. Department of Education, which protects the privacy of student records and gives parents of school-age kids the right to opt out of sharing contact information with third parties, including other families.</p>
<p>The FTC’s safety tips for parents include:<br />
•	Read the notice schools must distribute that explains the rights of students and parents under FERPA.  This legislation protects the privacy of student education records and gives parents the right to inspect and review your child&#8217;s education records, consent to the disclosure of information in the records and correct errors in the records.<br />
•	Ask your child&#8217;s school about its directory information policy. Student directory information can include a child&#8217;s name, address, date of birth, telephone number, email address, and photo. FERPA requires schools to notify parents and guardians about their school directory policy and give them the right to opt out of the release of directory information to third parties. Absent opting out, directory information may be available not only to the people in a child&#8217;s class and school, but also to the general public.<br />
•	Take action if your child&#8217;s school experiences a data breach. If you believe there&#8217;s been a data breach and your child&#8217;s information has been compromised, contact the school to learn more. Talk with teachers, staff, or administrators about the incident and their practices. Keep a written record of your conversations. Write a letter to the appropriate administrator, and to the school board, if necessary. The U.S. Department of Education takes complaints about these incidents. Contact the Family Policy Compliance Office, U.S. Department of Education, 400 Maryland Ave., SW, Washington, DC 20202-5920, and keep a copy for your records.</p>
<p>Perhaps it’s no coincidence that as more attention is directed to the risks of identity theft amongst children, cyber defense is becoming a hot new field of study for students.  National cyber defense competitions have emerged as spirited forums for budding technical talent, including the <a title="National Security Agency" rel="nofollow" href="http://www.nsa.gov/public_info/press_room/2010/cyber_defense.shtml" target="_blank" class="broken_link">National Security Agency’s Cyber Defense Exercise</a> – a competition that pits students from a series of military academies against each other – and against the competition’s leaders at NSA; the Air Force Association’s National High School Cyber Defense Competition, <a title="CyberPatriot" rel="nofollow" href="http://www.uscyberpatriot.org/Pages/default.aspx" target="_blank" class="broken_link">CyberPatriot</a>, created to inspire high school students towards careers in cyber security and associated fields; and the <a rel="nofollow" href="http://www.nationalccdc.org/" target="_blank" class="broken_link">National Collegiate Cyber Defense Competition</a>, designed to provide practical experience for students in a fast-changing field that needs ever more talented workers.<br />
We can only hope that this new generation of cyber experts – borne from a time when new risks have posed threats to their own personal safety – can meet the growing challenges of cyber defense.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/&via=Experian_DBR&text=Students and cyber defense&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are you in hiding after a data breach? Watch our new video.</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/947/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/947/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:21:14 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=947</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=KTHWhscxGeU Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.youtube.com/watch?v=KTHWhscxGeU">http://www.youtube.com/watch?v=KTHWhscxGeU</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/947/&via=Experian_DBR&text=Are you in hiding after a data breach? Watch our new video.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F&amp;title=Are%20you%20in%20hiding%20after%20a%20data%20breach%3F%20Watch%20our%20new%20video." id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/947/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How data breaches harm reputations</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/#comments</comments>
		<pubDate>Tue, 17 Jan 2012 17:17:28 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=919</guid>
		<description><![CDATA[The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F17%2Fhow-data-breaches-harm-reputations%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+response,data+privacy,Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Within the world of cyber security, a great deal of attention has been focused lately on the escalating hazards and frequency of data breaches, with considerable discussion on the <a title="Cyber crime gets costlier" href="http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/" target="_blank">high cost</a> of such breaches.  But as the industry has assessed the financial toll of breaches, it has never taken into account the impact breaches have on a company’s brand image and, consequently, its bottom line.</p>
<p>Until now.</p>
<p>A recently released <a title="Ponemon Institute Study " href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute study</a>, sponsored by <a title="Experian Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Experian’s Data Breach Resolution</a> and believed to be the first of its kind, explores the “Reputation Impact of a Data Breach” to provide more context for the full scope of data breaches.  The findings draw enlightening conclusions around the financial toll that data breaches wreak upon harmed corporate reputations, including these key takeaways:</p>
<p>Reputation is one of an organization’s most important and valuable assets.<br />
Reputation and brand image are perceived as very valuable…and highly vulnerable to negative events, including a data breach.</p>
<p>Calculating the value of reputation and brand reveals how valuable these assets are to an organization. The average value of brand and reputation for the study’s participating organizations was determined to be approximately $1.5 billion.  Depending upon the type of information lost as a result of the breach, the average loss in the value of the brand ranged from $184 million to more than $330 million. Depending upon the type of breach, the value of brand and reputation could decline as much as 17 percent to 31 percent.</p>
<p>Not all data breaches are equal. Some breaches are more devastating than others to an<br />
organization’s reputation and brand image, with the<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/" target="_blank"> loss or theft of customer information</a> ranked as the most devastating (followed by confidential financial business information and confidential non-financial business information).</p>
<p>Data breaches occur in most organizations represented in this study and have at least a moderate or a significant impact on reputation and brand image. According to 82 percent of respondents, their organizations had a data breach involving sensitive or confidential information.  Fifty-three percent say the data breaches had a moderate impact on reputation and brand image and 23 percent say it was significant.</p>
<p>Most organizations in the study have had a data breach involving the theft of sensitive or confidential business information. On average these types of breaches have occurred 2.9 times in surveyed organizations, with the theft or loss of confidential financial information having the most significant impact on reputation and brand.</p>
<p>Respondents strongly believe in understanding the root cause of the breach and<br />
protecting victims from identity theft. When asked what their organizations did following a<br />
breach to preserve or restore brand and reputation, the top three steps are: conduct investigations and forensics, work closely with law enforcement and protect those affected from potential harms such as identity theft.</p>
<p>The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Reputation Impact Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_011712_article ">Download the Ponemon Reputation Impact Study </a>to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/&via=Experian_DBR&text=How data breaches harm reputations&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches don’t take a holiday at the arcade</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 08:00:45 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[credit card fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=894</guid>
		<description><![CDATA[A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F27%2Fdata-breaches-don%25e2%2580%2599t-take-a-holiday-at-the-arcade%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,credit+card+fraud,cyber+crime,data+privacy,Identity+Theft,Identity+Theft+Prevention&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg"><img class="aligncenter size-full wp-image-897" title="credit card changing hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg" alt="" width="539" height="362" /></a></p>
<p>A recent data breach <a rel="”nofollow” nofollow" href="http://www.computerworld.com/s/article/9219945/Vending_machine_company_announces_major_data_breach?taxonomyId=82" class="broken_link">discovery</a> serves as a reminder that even when you’re on vacation, cyber criminals never sleep.</p>
<p>Vacationland Vendors, a company that supplies vending machines and video games to entertainment venues, recently reported that an unknown intruder penetrated its point of sale systems, resulting in a data breach affecting approximately 40,000 customers at waterland resorts in Tennessee and Wisconsin.  Although credit card and debit information was apparently stolen between December 2008 and May 2011, Vacationland Vendors did not state how the breach was discovered or whether affected customers have been notified.  The company did issue a general recommendation to anyone who visited the affected resorts within the targeted time frame to remain vigilant for fraud activity on their bank and credit card statements and to consider adding a <a href="../../../data-breach/data-compromise.html" class="broken_link" rel="nofollow">fraud alert</a> with the major credit bureaus.</p>
<p>The Vacationland Vendors data breach highlights the continued vulnerabilities of point of sale technology to crafty cyber criminals.  <a href="../../../data-breach/wp-security-as-business-risk.html" class="broken_link" rel="nofollow">Heartland Payment Systems</a>, a leading payment processing company, discovered this several years ago when it was hit by a historically large breach that exposed the accounts of as many as 100 million cardholders.  The same kind of breach affected CardSystems Solutions when a breach exposed the accounts of 40 million debit and credit card holders, leading to the sale and ultimate closure of the company.  Indeed, the theft of credit card data is one of the most common forms of fraud and the very reason that the Payment Card Industry Data Security Standard strengthened its requirements of payment card device vendors last year.</p>
<p>The <a href="../2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/">debate</a> about how to best secure credit card transactions has continued this year with the burgeoning introduction of end to end encryption technologies that can better protect cardholder data throughout the entire transaction process.  An example of improved safety mechanisms in the POS process is newer chip and PIN technology, as evidenced by Visa’s recent <a rel="”nofollow” nofollow" href="http://usa.visa.com/download/merchants/bulletin-us-adopt-dynamic-authentication-080911.pdf" class="broken_link">announcement</a> that it is accelerating chip migration and adoption of mobile payments.</p>
<p>Until the technology around POS systems is more bulletproof, it’s especially important for companies to implement added <a href="../../../data-breach/data-breach-resources.html">safety measures</a> around its current credit card payment processes.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/&via=Experian_DBR&text=Data breaches don’t take a holiday at the arcade&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>