Latest Post

Loading...
5 Must-do Steps for Practicing Your Data Breach Respon...

Remember how you felt as a kid when the fire alarm rang in school? Your heart raced, adrenaline surged through your body … and you left your seat, got in line and filed out of the building calmly and efficiently because you’d practiced, practiced, practiced what to do in...

Read More 5 Must-do Steps for Practicing Your Data Breach Response Plan
Hacktivism and More: Predictions for the Data Breach L...

The EMV liability shift went into effect, 62% of companies reported experiencing payments fraud and nearly 120 million records were exposed in healthcare related data breaches. The year is drawing to a close and many of the predictions Experian Data Breach Resolution made for 2015 came to fruition. As...

Read More Hacktivism and More: Predictions for the Data Breach Landscape in 2016
Facing Unique Breach Circumstances? Learn What to Do a...

You need only watch the headlines about data breaches to realize how different each one can be. Some trace their source to a careless or disgruntled insider, some compromise thousands of records of especially vulnerable consumer groups, and others go on for months before they’re detected and stopped. Every...

Read More Facing Unique Breach Circumstances? Learn What to Do at Experian’s IAPP Seminar
Experian Named a Leader in Recent Analyst Report...

An effective data breach response plan isn’t just about protecting your business from lawsuits or regulatory penalties; it also impacts customer experience, and customer experience is directly tied to revenue. That’s one of the key premises underlying the newly released Forrester Wave report on Customer Data Breach Notification and...

Read More Experian Named a Leader in Recent Analyst Report
Following Personal Identifying Information (PII) Down ...

As a business manager savvy to security risks, you may be well aware of the costs consumers and businesses incur when personal identifying information (PII) is stolen in a data breach. But once the information is taken from your system, do you know what happens next? Do you understand...

Read More Following Personal Identifying Information (PII) Down the Black Net Road
After a Data Breach: Keeping Customers Informed...

A data breach can increase a consumer’s risk of falling victim to identity theft. In order to mitigate this risk, federal and state governments have instituted regulations regarding the notification of affected consumers. But many consumers – inundated by news of mega breaches – may experience data breach fatigue,...

Read More After a Data Breach: Keeping Customers Informed
Are Your Employees Data Breach Risks?...

Your employees are your greatest asset, but they may also pose the greatest data breach risk to your organization. Unfortunately, multiple studies and research point to employees as the leading cause of data breaches. Employees may put your data at risk in a number of ways; from failing to practice...

Read More Are Your Employees Data Breach Risks?
Cyber Criminals, Spies and Activists – Know the ...

Who are behind cybercrimes? When it comes to these thieves behind computers, not all perpetrators are the same, and how they ply their attacks can vary greatly, too. To effectively protect your organization from cybercrime, it’s vital to understand the many ways in which it occurs, and the many...

Read More Cyber Criminals, Spies and Activists – Know the Enemy
Data breach legislation continues to be on policymaker...

While there is momentum for data breach legislation, there continues to be hurdles to seeing any laws come to fruition. But there is certainly optimism. The most pressing issue today is whether a national data breach law will be passed. Most support this concept, however there is a lack...

Read More Data breach legislation continues to be on policymakers’ radar
Recognize Internet Safety Month As a Reminder To Keep ...

Airtight firewalls and current-to-the-minute defensive software aren’t enough to keep your organization safe from cyber attacks. Your IT team could be doing everything right, and your company may still be at risk from internal threats – because just one employee thinks that cybersecurity isn’t his or her job. Our...

Read More Recognize Internet Safety Month As a Reminder To Keep Data Secure
Could Wireless-enabled Devices Pose a Data Breach Risk...

Do your cyber security measures address the possibility of a data breach occurring through the wireless-enabled refrigerator in the break room of your corporate headquarters? Have you made provisions if a hacker accesses sensitive data through wearable technology? Will your data breach response plan provide adequate guidance if a...

Read More Could Wireless-enabled Devices Pose a Data Breach Risk?
Cybercriminals Cashing in as Companies Struggle to Sec...

Experian Data Breach Resolution and Ponemon Institute release the first industry study that closely examines payment technologies and how companies are managing the growing threat of data breaches. The study, Data Security in the Evolving Payments Ecosystem, asked professionals to weigh in on several topics including who should be...

Read More Cybercriminals Cashing in as Companies Struggle to Secure Payment Systems