Latest Post

Loading...
Infographic: Unlock data breach facts...

...

Read More Infographic: Unlock data breach facts
Extended fraud resolution is the new standard...

Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their...

Read More Extended fraud resolution is the new standard
The data breach reporting landscape – part 1...

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like...

Read More The data breach reporting landscape – part 1
When data recovery becomes a data disaster...

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach...

Read More When data recovery becomes a data disaster
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
Students and cyber defense...

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than...

Read More Students and cyber defense
Are you in hiding after a data breach? Watch our new v...

...

Read More Are you in hiding after a data breach? Watch our new video.
Five top trends in security threats...

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie....

Read More Five top trends in security threats
Consequences following a data breach...

Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long...

Read More Consequences following a data breach
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
How data breaches harm reputations...

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss....

Read More How data breaches harm reputations
Quick glance: data breach litigation & legislatio...

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud...

Read More Quick glance: data breach litigation & legislation in 2012