Get up to speed on cyber insurance and breach response at the NetDiligence Forum in Philly

Posted on May 30 2013 by

How does cyber insurance factor into data breach response? Get the answer – and many more insights – at the NetDiligence® 2013 Cyber Risk & Privacy Liability Forum on June 6-7 in Philadelphia. We’ll see you there! During the forum, be sure to visit Experian® to see everything we can do for you during a […]


IAPP Panel Discusses BYOD and the “Technology Divorce”

Posted on May 15 2013 by

As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices? This was the subject of mock […]


Controversial Cyber Security Bill Passes The House

Posted on May 07 2013 by

Despite President Obama’s January signing of an Executive Order (EO) which outlines national cyber security policies in protecting U.S. companies and government agencies against cyber threats, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) was passed in a 288-127 House vote sending it now to the Senate.¹ CISPA supporters say the act will help […]


Medical Data Breaches: A Source of Chronic Pain

Posted on May 01 2013 by

With over 870,000 medical records exposed in data breaches in just the first quarter of 2013, medical data breaches have become a source of chronic pain for healthcare organizations   Adding to this complexity is the HIPAA Omnibus Final Rule.  For additional resources to help you accelerate your healthcare data breach resolution, click the image below.


What’s In Your Data Breach Toolbox?

Posted on Apr 30 2013 by

Our latest Ponemon Institute study suggests many companies are not adequately prepared to mitigate damages associated with a data breach. If you find your organization represented in the summary-findings below, click the image to download the study.


Cyber security: a key topic at 2013 HCCA Conference

Posted on Apr 26 2013 by

The 17th annual Health Care Compliance Association (HCCA) Compliance Institute Conference took place in National Harbor, MD and was attended by healthcare personnel and data protection and security professionals.  Key topics covered in various panels related to cyber security issues including medical identity theft, data breaches and patient health information (PHI) protection as dictated in […]


Tips to save your reputation following a big data breach

Posted on Apr 23 2013 by

The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value to customers, or patients and make […]


Secure your outsourcing practices to prevent data breaches

Posted on Apr 15 2013 by

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once.  Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also found that the most common cause […]


Data breach numbers are up worldwide

Posted on Mar 26 2013 by

In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in business and IT practices, cyber security threats have become equally prevalent.  Safeguarding data has become a top priority and is now mandatory for organizations of all sizes from small businesses to […]


Cybercriminals Aim For A New Target

Posted on Mar 19 2013 by

Bank employees have recently usurped their customers as the preferred target of cybercriminals in the financial industry according to the FBI and other finance member organizations who last month issued fraud alert warnings to banking institutions.  The latest data breach trend by cyberthieves is to use hacking methods such as spam, phishing, keyloggers and remote-access […]