Data breach numbers are up worldwide

Posted on Mar 26 2013 by

In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in business and IT practices, cyber security threats have become equally prevalent.  Safeguarding data has become a top priority and is now mandatory for organizations of all sizes from small businesses to […]

Cybercriminals Aim For A New Target

Posted on Mar 19 2013 by

Bank employees have recently usurped their customers as the preferred target of cybercriminals in the financial industry according to the FBI and other finance member organizations who last month issued fraud alert warnings to banking institutions.  The latest data breach trend by cyberthieves is to use hacking methods such as spam, phishing, keyloggers and remote-access […]

Final ruling for HIPAA/HITECH Act protects patients from data breaches

Posted on Mar 12 2013 by

By now you are aware that the much anticipated final ruling from the Department of Health and Human Services (HHS) regarding regulations implementing the security, privacy, and data breach notification provisions of the HITECH Act were released on January 17, 2013.  The HHS’s hope in issuing this final rule is to strengthen the data and […]

Learn how to accelerate your response to a breach

Posted on Mar 05 2013 by

Responding to a data breach quickly and accurately is the key to minimizing damage and steering clear of litigation and hefty fines. In our third “Answer Men” podcast, a global privacy attorney offers tips on how to accelerate your response to a data breach. Ozzie Fonseca, Experian’s Senior Director of Data Breach Resolution, interviews Miriam […]

Don’t Be a Stranger at IAPP. Stop by the Experian Booth.

Posted on Mar 04 2013 by

Is the IAPP Global Privacy Summit in your future? Well, it’s in ours. Join the Experian Data Breach team on March 6-8, 2013 at booth #18/19 to gain valuable insight on how to accelerate your response to a data breach. In addition, we’ll be participating in two sessions – one on surviving a data breach […]

Five Tips to Combat a Denial of Service Cyber Attack

Posted on Feb 26 2013 by

Who’s next? That’s a question probably lingering on the minds of many American banking executives these days. After all, eight U.S. banks were hammered by distributed denial of service (DDoS) cyber attacks in recent weeks and more could be in the works. A DDoS attack typically floods a website or network with so much traffic […]

Dramatic changes on horizon for healthcare breach notifications

Posted on Feb 26 2013 by

Healthcare data breaches will be treated much differently under the new HIPAA Omnibus rule. But do you know how? Find out in the latest installment of our “Answer Men” podcast series. Answer man Bob Krenek, also known as Experian’s Senior Director of Data Breach Resolution, interviews healthcare attorney Paula Stannard about changes coming down the […]

Want to learn how you can save millions? Tune into our “Answer Men” podcast

Posted on Feb 22 2013 by

Do you want to save millions – or in some cases – tens of millions of dollars? In the first of our new podcast series, Dr. Larry Ponemon, chairman of The Ponemon Institute, explains how.  Experian Data Breach Vice President Michael Bruemmer, one of our “Answer Men,” interviews Dr. Ponemon on the cost effectiveness of […]

Small to medium-sized businesses face a long recovery road after a data breach

Posted on Feb 21 2013 by

Understanding why data breach preparedness is a priority is key. According to the latest Ponemon Institute Study, State of SMB Cyber Security Readiness: US Study, the road to recovery is long and hard for small to medium-sized businesses (SMBs) after a data breach.  Not only did the SMBs lose customers, costs to acquire new customers […]

Information Superiority can boost cybersecurity and prevent data breaches

Posted on Feb 14 2013 by

In today’s data driven world, information is king so if you are not armed with the same information as your competitor or worse, experience a data breach, an information imbalance can occur that puts you at a disadvantage. In the public sector, an information imbalance is also known as an “asymmetric threat” and can dramatically […]