Child ID theft has serious business implications

Posted on Sep 16 2010 by

Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children. Experts point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.


Do your business associates know how they will be affected by HITECH?

Posted on Sep 07 2010 by

Just as the healthcare industry came up to speed on the regulations defined in The Health Information Technology for Economic and Clinical Health ("HITECH") Act, additional modifications are being proposed. These proposed rules focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs). So why is this significant?


Warning: Medical data breaches are on the rise

Posted on Sep 07 2010 by

According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries. The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers. In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.What is the cause of this large discrepancy between industries?


Do you know the real threat to your customer data?

Posted on Sep 07 2010 by

A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee. However, the 2010 Verizon Data Breach Investigations report points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.


Does your company have a wireless device data policy in place?

Posted on Sep 07 2010 by

As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure.