What the EMV Liability Shift Means for Your Business

Posted on Mar 08 2016 by

As of last October, the EMV liability shift is a point of reality for consumers and businesses alike. Now, if your business is not yet chip-ready and card fraud occurs in a point-of-sale transaction in which a consumer uses a chip-enabled card, you — not the card-holder or issuer — could be liable for costs […]


Infographic: Timeline of a Data Breach Response

Posted on Feb 23 2016 by

      Preparing a breach response plan is sometimes a painful topic, planning the response that should happen after your business becomes the unfortunate victim of a cyber attack. How exactly should things work? Explore the timing of the planning and execution of a response – before and after the breach – as a […]


Involving Head Honchos in Data Breach Response

Posted on Feb 09 2016 by

Shouldn’t it be easy to convince your senior executives of the importance of cyber security? High-profile data breaches make the news, and your top decision-makers surely read the same headlines you do. Those reports — and numerous studies — make it clear that cyber security incidents continue to grow in volume, frequency and impact. Yet […]


Video: 2016 Predictions – Katherine Keefe

Posted on Jan 27 2016 by

        There have been no shortage of changes in the medical world in the last few years, many triggered by the arrival of the Affordable Care Act. As providers look to unify to provide services, what effects might their consolidation efforts have on information security? Katherine Keefe of Beazley Breach Response joins […]


Updated Data Breach Response Guide Can Help Your Breach Survival

Posted on Jan 13 2016 by

More companies than ever are taking a proactive approach to data breaches; our second annual data breach preparedness study, conducted by Ponemon, found that 72 percent of polled companies had a data breach response plan in place, a 5 percent increase from the year before. Experian Data Breach Resolution believes that figure needs to reach […]


Your Employees Can Be Breach Victims, Too

Posted on Jan 12 2016 by

Employees: A Data Breach’s Hidden Victims Headline-grabbing data breaches have raised awareness of the devastating impact data loss can have on the affected consumers and the breached company. Hopefully, stories like the SONY and Anthem breaches have inspired your company to step up its data breach preparedness and prevention efforts. But are you overlooking the […]


Industry Experts Share Top Data Breach Threats in 2016

Posted on Dec 31 2015 by

      There’s no shortage of frontiers in the world of data breaches, with new avenues expanding each year. Watch our short video to hear what top threats industry experts foresee for 2016, ranging from political campaigns to healthcare and more. To hear full predictions, stay tuned for more dialogue between Michael Bruemmer with […]


5 Must-do Steps for Practicing Your Data Breach Response Plan

Posted on Nov 30 2015 by

Remember how you felt as a kid when the fire alarm rang in school? Your heart raced, adrenaline surged through your body … and you left your seat, got in line and filed out of the building calmly and efficiently because you’d practiced, practiced, practiced what to do in such an emergency. Even as an […]


Hacktivism and More: Predictions for the Data Breach Landscape in 2016

Posted on Nov 30 2015 by

The EMV liability shift went into effect, 62% of companies reported experiencing payments fraud and nearly 120 million records were exposed in healthcare related data breaches. The year is drawing to a close and many of the predictions Experian Data Breach Resolution made for 2015 came to fruition. As the data breach landscape continues to […]


Facing Unique Breach Circumstances? Learn What to Do at Experian’s IAPP Seminar

Posted on Sep 29 2015 by

You need only watch the headlines about data breaches to realize how different each one can be. Some trace their source to a careless or disgruntled insider, some compromise thousands of records of especially vulnerable consumer groups, and others go on for months before they’re detected and stopped. Every breach stems from a unique set […]