Three reasons your breach notices are flawed

Three reasons your breach notices are flawed

Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting.

In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponem…

Read more
Recent Posts

Trends in healthcare data breaches

Healthcare Breach

Mar 20 2012 by
As far as data security goes, 2011 was a dismal year.  Relentless, high-profile breaches punctured any sense that hack attacks are a remote threat, and by year’s end it was clear (if it wasn’t before) that protection against security disaster can only come from the...

Read more ››

Infographic: Unlock data breach facts

Breach Notification

Mar 12 2012 by
Download the Ponemon Aftermath Study to learn what companies experience following a data...
...

Read more ››

Extended fraud resolution is the new standard

Fraud Resolution

Mar 05 2012 by
Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become...

Read more ››

The data breach reporting landscape – part 1

Breach Notification

Feb 28 2012 by
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised...

Read more ››

When data recovery becomes a data disaster

Breach Prevention

Feb 21 2012 by
Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery...

Read more ››

Expanding the scope of security testing

Breach Prevention

Feb 15 2012 by
Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of Security Constructs LLC, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.     Continual testing is one of the main tenants of...

Read more ››

Students and cyber defense

Breach Prevention

Feb 07 2012 by
  A great deal of data is collected on students of all ages. Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive...

Read more ››

Five top trends in security threats

Breach Prevention

Jan 31 2012 by
Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets