10 ways that breaches burn business

Posted on Feb 15 2011 by

Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.


Understanding the risks of chip and PIN credit card verification

Posted on Feb 07 2011 by

The point of sale chip and PIN payment technology is believed to be a safer form of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. So why aren’t more businesses adopting this technology?


Stopping healthcare fraud with tools used in other industries

Posted on Feb 01 2011 by

A few weeks ago I discussed a few preventative measures a healthcare business can implement to protect itself from the damages of medical fraud.  However, the fight against medical fraud requires support from many groups, including the U.S. Government.  Bringing new tools to the fight, the Obama Administration recently announced aggressive new measures it is […]


Protecting your retail business from consumer fraud

Posted on Jan 25 2011 by

The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have […]


What do you need to know about the FTC’s report on privacy

Posted on Jan 18 2011 by

Our guest blogger this week is Kristen Mathews of Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up this […]


FTC report on consumer privacy

Posted on Jan 11 2011 by

Our guest blogger this week is the team at Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up on […]


Identity theft protection insights

Posted on Jan 04 2011 by

Consumers who are part of a data breach may be more likely to experience identity theft. Learn about sources and consequences of identity theft and the benefits of ProtectMyID.


Helpful tips on data breach notification

Posted on Jan 04 2011 by

When a data breach occurs it is important to understand the breach notification laws in your State and what you have to do to abide by them. After contacting your legal counsel, the next stop you can make is the National Conference of State Legislatures which maintains a list of enacted and proposed security breach […]


Mobile smishing attacks are on the rise

Posted on Dec 21 2010 by

Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from […]


What a healthcare business can do to prevent medical fraud

Posted on Dec 15 2010 by

Medical fraud is occurring at an alarming rate and is expected to cost the US healthcare system $100 billion a year.  Medical fraudsters vary in their sophistication and range from organized crime organizations to individuals preying on senior citizens.  For example, one crime syndicate stole the identities of doctors and thousands of patients to make […]