Infographic: Our clients speak out

Posted on Sep 11 2012 by

Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our services.


When are small businesses too small for data breach? Never

Posted on Sep 11 2012 by

Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data breaches analyzed last year involved businesses […]


Congress fails to reach agreement on cybersecurity legislation

Posted on Sep 05 2012 by

  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess. After several revisions, […]


U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?

Posted on Aug 28 2012 by

The U.S. tops Germany, the U.K. and France when it comes to data breach notification costs. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen. The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. […]


Three things you should never do to identity theft victims

Posted on Aug 21 2012 by

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, […]


Report gives readers the latest inside(r) scoop

Posted on Aug 14 2012 by

Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out of 25) users were filched and openly […]


World-class scammers vie for Olympic gold

Posted on Aug 07 2012 by

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets […]


Three data protection strategies to catch a “phish”

Posted on Jul 31 2012 by

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s […]


The top 5 cyber security threats to future of mobile banking

Posted on Jul 24 2012 by

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful trade group conducted a comprehensive survey […]


Webinar: Data breaches can happen anytime, anywhere

Posted on Jul 19 2012 by

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being […]