Extended fraud resolution is the new standard

Posted on Mar 05 2012 by

Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to […]


The data breach reporting landscape – part 1

Posted on Feb 28 2012 by

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address […]


When data recovery becomes a data disaster

Posted on Feb 21 2012 by

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach scams. According to a recent report […]


Expanding the scope of security testing

Posted on Feb 15 2012 by

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.


Students and cyber defense

Posted on Feb 07 2012 by

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.


Are you in hiding after a data breach? Watch our new video.

Posted on Jan 31 2012 by

httpv://youtu.be/KTHWhscxGeU


Five top trends in security threats

Posted on Jan 31 2012 by

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.


Consequences following a data breach

Posted on Jan 25 2012 by

Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.


‘Tis the season for data privacy

Posted on Jan 24 2012 by

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks.


How data breaches harm reputations

Posted on Jan 17 2012 by

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.