The RX for medical breaches

Posted on Apr 03 2012 by

It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.) The threat is real, so how do […]

Big data can mean big breaches

Posted on Mar 27 2012 by

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data […]

Trends in healthcare data breaches

Posted on Mar 20 2012 by

As far as data security goes, 2011 was a dismal year.  Relentless, high-profile breaches punctured any sense that hack attacks are a remote threat, and by year’s end it was clear (if it wasn’t before) that protection against security disaster can only come from the most rigorous breach defense. Unfortunately, disaster is exactly what has […]

Infographic: Unlock data breach facts

Posted on Mar 12 2012 by

Extended fraud resolution is the new standard

Posted on Mar 05 2012 by

Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to […]

The data breach reporting landscape – part 1

Posted on Feb 28 2012 by

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address […]

When data recovery becomes a data disaster

Posted on Feb 21 2012 by

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach scams. According to a recent report […]

Expanding the scope of security testing

Posted on Feb 15 2012 by

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.

Students and cyber defense

Posted on Feb 07 2012 by

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.

Are you in hiding after a data breach? Watch our new video.

Posted on Jan 31 2012 by