The compliance risks of social media

Posted on May 29 2012 by

Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory […]


Case closed: 8 Things you didn’t know about data breach litigation

Posted on May 22 2012 by

As data breaches have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished.  Do these lawsuits have a common pattern?  A recent draft research paper, Empirical Analysis of Data Breach Litigation, takes a look at federal data breach lawsuits to assess the common characteristics. The findings were illuminating: The odds […]


Healthcare breaches & fraud are here to stay

Posted on May 15 2012 by

Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than […]


ITRC report identifies top three data breach triggers

Posted on May 07 2012 by

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. […]


Medical and mobile: Convenience trumps security

Posted on May 02 2012 by

Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too. A recent study suggests that adopting new […]


Where will you be on April 29, 2012?

Posted on Apr 27 2012 by

 Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare […]


Responding resourcefully to medical data breaches

Posted on Apr 26 2012 by

  It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in […]


5 Differentiating factors of a healthcare breach

Posted on Apr 10 2012 by

Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting. With breaches of medical records increasing 97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors […]


The RX for medical breaches

Posted on Apr 03 2012 by

It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.) The threat is real, so how do […]


Big data can mean big breaches

Posted on Mar 27 2012 by

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data […]