Breach notification in three easy steps

Posted on May 10 2011 by

In a recent report, Ernst and Young noted that stronger breach notification requirements are among the top privacy trends for 2011. Governments around the world are enacting or tightening regulations around breach notification, and within the U.S., individual state laws around data breach notification have had a tremendous impact on data security.


Are we suffering from breach notification fatigue?

Posted on May 03 2011 by

With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them.


4 breach trends to beware of

Posted on Apr 26 2011 by

According to the Identity Theft Resource Center, there were 54 banking-related data breaches in 2010, down from the 62 breaches reported in 2009 but nevertheless accounting for 4,853,708 exposed records. Most breaches were related to insider theft, cyberattacks, and card skimming stacks; other top breaches related to missing paper documents, stolen or missing hardware and accidental breaches.


A billion dollar crime that needs an urgent response

Posted on Apr 19 2011 by

According to Ponemon Institute’s Second Annual Survey on Medical Identity Theft, we estimate that more than 1.49 million Americans have been targeted by this crime. With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes is more than $30 billion.


Tax time scams: adding to the joy

Posted on Apr 05 2011 by

More than 1500 tax scams reportedly target consumers and businesses through hundreds of thousands of scam emails; many use phishing to fool anxious taxpayers into visiting a scam website or providing personal and financial data in order to comply with tax filings. Protecting yourself starts by getting smart about common scams.


Consumers yawn at healthcare fraud

Posted on Mar 29 2011 by

Today's headlines trumpet yet another high-profile medical data breach, this time through Health Net. This corporate catastrophe reminds us of the increasing hazard of medical fraud, which is the most expensive and time consuming to resolve of all types of identity theft . The second annual National Study on Medical Identity Theft, fielded by the Ponemon Institute provides further insight into this pervasive problem and how it affects consumers.


Protecting your business from gift card fraud

Posted on Mar 22 2011 by

Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of consumer fraud and internal misconduct that are posed by credit cards. Developing robust safeguards , proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.


Scam report: shipping pirates

Posted on Mar 15 2011 by

With some precautions, your business can safely navigate through hazardous shipping channels without fear of data piracy.


Get ready for a new wave of breach notification laws

Posted on Mar 01 2011 by

For businesses that don’t comply with these new regulations, stiff penalties will be added to the burdensome costs of breaches (and how can you even tabulate costs like the loss of public trust?) The new regulations headed our way in 2011 provide one more reason for businesses to protect themselves from breaches, swiftly take action when a breach has been detected, and stay informed about the legal currents that are taking shape.


Develop a data breach response plan now to be ready to efficiently address a breach as soon as it is reported

Posted on Feb 22 2011 by

The proliferation of state data breach notification laws, substantive state information security laws (such as the Massachusetts data security standards), and FTC and private lawsuits on information security matters has led to heightened attention to information security in both IT budgets and staffing and in terms of legal resources. With budget pressures all around (not to mention time pressures and the pressures of other duties that in-house counsel already has), the question becomes: How can my organization lower the time and dollar costs associated with information security when there is a breach?