<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Business fraud</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/business-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Congress fails to reach agreement on cybersecurity legislation</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/#comments</comments>
		<pubDate>Wed, 05 Sep 2012 19:23:58 +0000</pubDate>
		<dc:creator>zsmith</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity legislation]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1579</guid>
		<description><![CDATA[  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess. After several revisions, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F05%2Fcongress-fails-to-reach-agreement-on-cybersecurity-legislation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+fraud,Cyber+Security,cybersecurity+legislation,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/cybersecurity-legislation.jpg"><img class="aligncenter size-full wp-image-1582" title="cybersecurity-legislation" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/cybersecurity-legislation.jpg" alt="" width="440" height="317" /></a></em></p>
<p><em></em> </p>
<p><em>Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. </em></p>
<p>Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess.</p>
<p>After several revisions, the Senate began debate on the Cybersecurity Act of 2012 during the last week of July.  The bill would have created a National Cybersecurity Council to develop best practices for industries designated as “critical infrastructure.”  These industries might include utilities, pipelines and financial service companies.  In addition, the legislation would have encouraged the establishment of voluntary data exchanges to allow government agencies and private companies to share cyber threat information.</p>
<p>Disagreements arose between over the level of authority that the proposal would provide the Federal government to establish new cybersecurity standards for certain entities that it deemed to be “critical infrastructure.”  A majority of Senate Republicans voiced support for alternative legislation that would make the participation by private entities completely voluntary.</p>
<p>There were also attempts to establish a new law for a national data breach notification standard.  However, the Senate could not reach agreement on specific provisions of a preemptive program. </p>
<p>There is a possibility that the Senate could revisit cybersecurity legislation when it returns for a brief work period in September or during the lame duck session after the election.  However, unless there are significant changes made to the bill so that it is palatable to a significant majority in the Senate, it is highly unlikely that legislation will be passed and signed into law this year.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/&via=Experian_DBR&text=Congress fails to reach agreement on cybersecurity legislation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F05%2Fcongress-fails-to-reach-agreement-on-cybersecurity-legislation%2F&amp;title=Congress%20fails%20to%20reach%20agreement%20on%20cybersecurity%20legislation" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your business from gift card fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/#comments</comments>
		<pubDate>Tue, 22 Mar 2011 15:24:59 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[employee fraud]]></category>
		<category><![CDATA[Gift card fraud]]></category>
		<category><![CDATA[gift card scams]]></category>
		<category><![CDATA[National Retail Federation]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=363</guid>
		<description><![CDATA[Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of consumer fraud  and internal misconduct that are posed by credit cards.  Developing robust safeguards , proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F22%2Fprotecting-your-business-from-gift-card-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Consumer+fraud,employee+fraud,Gift+card+fraud,gift+card+scams,National+Retail+Federation&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card1.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card2.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2.bmp"></a></p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2-v21.bmp"><img class="size-full wp-image-387 aligncenter" title="Gift card 2 v2" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2-v21.bmp" alt="" width="427" height="336" /></a></p>
<p>The holidays may be over, but scams targeting holiday gift cards purchased by consumers are an unwanted gift that keeps on giving.  The National Retail Federation estimates that gift cards are a $50 billion annual market, so it’s little surprise that fraudsters search for creative ways to grab a piece of the action throughout the year.  These thefts leave retailers in the difficult position of either reinstating gift card balances to victimized customers – and consequently cutting into their revenue and profitability – or sacrificing consumer confidence in the integrity of an important sales vehicle.</p>
<p>Addressing this violation starts with understanding the ways in which gift cards are scammed.  One of the most popular hustles involves covertly copying identification numbers from gift card displays, then stealing funds from these cards after they’ve been purchased by customers.  Scammers typically call to inquire about the balance on “their” card to determine whether cards have been activated; once this is confirmed, the thieves then purchase goods online before rightful customers have the chance to do so.  The hoax is even easier to pull off if employees are the ones cribbing card numbers and can personally monitor when the cards are activated.  Alarmingly, this is just one of numerous known scams, which run the gamut from <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.nwcn.com/news/oregon/New-scam-Cloned-gift-cards-spyware-that-tracks-reloading-103500349.html" target="_blank" class="broken_link">gift card cloning</a></span> to <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.fraudguides.com/consumer-gift-card.asp" target="_blank" class="broken_link">selling stolen gift cards on auction websites</a>.</span></p>
<p>Implementing strong security around gift card programs is key to ensuring its protection for both customers and businesses.  <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.ehow.com/how_4487163_protect-retail-customers-from-gift.html" target="_blank" class="broken_link">Simple steps</a></span>, such as altering gift card displays so that actual cards aren’t accessible to the public, as well as building in privacy features like pin codes, can go a long way towards deterring criminal activity.  Internally, companies must also take measures to ward off <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.lpinnovations.com/page/86-gift_card_fraud/" target="_blank" class="broken_link">employee fraud</a></span>; for example, discarding used cards and monitoring blanks to prevent employees from switching customers’ cards with old or inactive zero balance cards.</p>
<p>Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of <span style="text-decoration: underline;"><a href="http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/" target="_blank">consumer fraud</a></span> and internal misconduct that are posed by credit cards.  <span style="text-decoration: underline;"><a href="http://www.experian.com/business-services/data-breach-protection.html" target="_blank">Developing robust safeguards</a></span>, proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/&via=Experian_DBR&text=Protecting your business from gift card fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Understanding the risks of chip and PIN credit card verification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/#comments</comments>
		<pubDate>Mon, 07 Feb 2011 23:54:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Chip and PIN]]></category>
		<category><![CDATA[Credit card verification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Payment system fraud]]></category>
		<category><![CDATA[POS fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=293</guid>
		<description><![CDATA[The point of sale chip and PIN payment technology is believed to be a safer form of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. So why aren’t more businesses adopting this technology?  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F02%2F07%2Funderstanding-the-risks-of-chip-and-pin-credit-card-verification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Business+identity+theft,Chip+and+PIN,Credit+card+verification,Data+Breach,Data+Security,Payment+system+fraud,POS+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>I mentioned in a previous blog that the  use of stolen credit cards to purchase merchandise is one of the most <a rel="nofollow" href="http://business.itbusinessnet.com/articles/viewarticle.jsp?id=1292311" target="_blank" class="broken_link"> common forms</a> of fraud.  The negative affects are not only realized by the business, but also impact the consumer whose card was stolen.  The national debate about how best to fight credit card fraud is expected to heat up in 2011 with the introduction of point of sale chip and PIN technology.</p>
<p>The point of sale chip and PIN payment technology is believed to be <a rel="nofollow" href="http://www.bankrate.com/finance/credit-cards/are-chip-and-pin-credit-cards-coming-1.aspx" target="_blank" class="broken_link">a safer form</a> of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. Conversely, magnetic stripe credit cards require little verification beyond a signature, which opens the door to fraud.</p>
<p>Many major retailers, like Wal-Mart, are eager to implement this technology as a measure to help prevent point of sale credit card fraud.  According to a representative, Wal-Mart experienced a <a rel="nofollow" href="http://www.americanbanker.com/bulletins/-1019771-1.html" target="_blank" class="broken_link">significant drop</a> in fraud rates once the card reader system was adopted.</p>
<p>So why aren’t more businesses adopting this technology?  There are <a rel="nofollow" href="http://www.geekwithlaptop.com/chip-and-pin-technology-not-safe-says-security-experts" target="_blank" class="broken_link">concerns</a> that consumer credit card data can be breached at each transaction.  A technology researcher was able to make purchases with these POS systems in place without knowing the card’s PIN verification code using simple hardware purchased at an electronics retailer. Simply put, a clever thief can access a customer’s credit card number and easily authorize other transactions leaving very little trace.</p>
<p>How is your company addressing credit card fraud? Put <a rel="nofollow" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">processes in place</a> <span style="text-decoration: underline;">before</span> your business becomes a victim.</p>
<p>﻿</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/&via=Experian_DBR&text=Understanding the risks of chip and PIN credit card verification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your retail business from consumer fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/#comments</comments>
		<pubDate>Tue, 25 Jan 2011 19:37:22 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=277</guid>
		<description><![CDATA[The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F25%2Fprotecting-your-retail-business-from-consumer-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Business+identity+theft,Consumer+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have policies or controls in place.  Unfortunately many businesses don’t realize that they are victims until after the most wonderful time of year.</p>
<p>According to a <a rel="”nofollow” nofollow" href="http://business.itbusinessnet.com/articles/viewarticle.jsp?id=1292311" target="_blank" class="broken_link">recent article</a>, use of a stolen credit card to purchase merchandise is one of the most common forms of fraud.  However, fraudsters are becoming more sophisticated and have learned to steal credit card information by intercepting transmissions from retail credit machines.   Scary isn’t it?</p>
<p>What can a business do to protect itself from damages now and in the New Year?  There are<a rel="”nofollow” nofollow" href="http://www.businesspundit.com/protect-your-business-from-credit-card-fraud-this-season/" target="_blank" class="broken_link"> three things</a> your business can implement immediately.  For example, require employees who process credit cards to ask customers to sign the credit receipt and check signatures on the back of the credit card.  Secondly, focus on delivering excellent customer service.  A happy customer is less likely to retaliate by making charge backs.  Lastly, define and implement a <a rel="”nofollow” nofollow" href="http://www.lpsconsulting.org/index.html?entry=controlling-return-fraud-during-the" target="_blank" class="broken_link">return policy</a> to address the very real threat of merchandise return fraud.</p>
<p>Take the time to discuss threat of consumer fraud with your employees and implement policies to <a href="http://sbcr.experian.com/" target="_blank" class="broken_link" rel="nofollow">reduce fraud</a>.  Doing so will enable your business to benefit from the seasonal increase in sales.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/&via=Experian_DBR&text=Protecting your retail business from consumer fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F25%2Fprotecting-your-retail-business-from-consumer-fraud%2F&amp;title=Protecting%20your%20retail%20business%20from%20consumer%20fraud" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your business from identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2010/12/07/protecting-your-business-from-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/12/07/protecting-your-business-from-identity-theft/#comments</comments>
		<pubDate>Tue, 07 Dec 2010 23:39:13 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=226</guid>
		<description><![CDATA[A majority of the media attention has focused on the sharp increase of personal identity theft or on the loss of customer data by businesses.  Very little focus has been given to the damage done by fraudsters who craftily steal the identity of a business.  The difference between personal and business identity theft is quite [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F07%2Fprotecting-your-business-from-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Business+identity+theft,Data+Breach,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>A majority of the media attention has focused on the sharp increase of personal identity theft or on the loss of customer data by businesses.  Very little focus has been given to the damage done by fraudsters who craftily steal the identity of a business.  The difference between personal and business identity theft is quite simple.  The victim of the fraudulent act is a company instead of an individual. However, the damage to a business can be just as, if not more, devastating.</p>
<p>Unfortunately, the consequences of a stolen business identity can affect not only the proprietor, but also suppliers, clients and even employees.  The consequences may include fraudulent high dollar value purchases, illegitimate business agreements, fraudulent loans and damage to business credit ratings.  As one <span style="text-decoration: underline;"><a href="http://www.inc.com/guides/protect-against-fraud.html" target="_blank" class="broken_link" rel="nofollow">2009 study found</a></span>, 88 percent of US companies that experienced fraud reported a decline in financial performance.</p>
<p>Recovering from these fraudulent acts can be quite difficult and expensive. However, the best defense against the damages of business identity theft is to prevent it from happening. There are many <span style="text-decoration: underline;"><a href="http://trendmicro.mediaroom.com/index.php?s=23" target="_blank" class="broken_link" rel="nofollow">basic things</a></span> a company can do to reduce the risk of becoming a victim. For example, shred all business documents and purchase computer security software to protect electronic information.  Additionally,<a href="http://" target="_blank"> <span style="text-decoration: underline;">establish processes</span></a> to detect and deter fraud from happening.  Develop written procedures to define how certain accounting procedures are handled.  Or establish an anonymous way for employees to report suspected fraud.</p>
<p>Please <span style="text-decoration: underline;"><a href="http://sbcr.experian.com/" target="_blank" class="broken_link" rel="nofollow">evaluate what your business is doing</a></span> to prevent fraud. Even the simplest changes can prevent your business from becoming a victim.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/12/07/protecting-your-business-from-identity-theft/&via=Experian_DBR&text=Protecting your business from identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F07%2Fprotecting-your-business-from-identity-theft%2F&amp;title=Protecting%20your%20business%20from%20identity%20theft" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/12/07/protecting-your-business-from-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>