Stress, Apathy and Winning by Default: How Consumers Respond...

Business identity theft

Jun 26 2014 by
Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants its notification letter to do, however, is make the recipients any more upset than they...

Read more ››

Views on Consumer Reactions

to Data Breaches...

Business identity theft

Jun 09 2014 by
Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon report to Michael...

Read more ››

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts...

Business identity theft

May 28 2014 by
No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time to review your cyber security measures. Of course, larger companies entrust their IT teams to take care of hardware and software, firewalls and...

Read more ››

The Worst Things You can Say or Do in a Breach Notification ...

Business identity theft

May 06 2014 by
When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in a courteous, straightforward manner. Because of this, notification letters are an integral piece of a firm’s...

Read more ››

Data Breach News for the First Quarter of 2014...

Business identity theft

Apr 08 2014 by
With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches had been reported, according to the Identity Theft Resource Center, which tracks such statistics. Those breaches exposed more than 4.2 million records, the...

Read more ››

Medical Data Breaches: Game-changing for Health Information ...

Business identity theft

Mar 26 2014 by
While cyber crime continues to grow across industries, medical identity theft and medical data breaches are rising at a disproportionate rate. And though all identity theft can result in catastrophic damage to consumers’ financial wellbeing, medical identity theft may affect their physical health as well. Consumers are aware of the risks, too. In a recent Ponemon Institute study sponsored by Experian® Data Breach...

Read more ››

Is Your Data Secure for Small Business Saturday?...

Business identity theft

Nov 26 2013 by
Small Business Saturday – the Saturday immediately following Black Friday – is meant to encourage consumers to patronize small businesses across the country during a season that is make or break for many of them. Like many small businesses, you probably hope the day will be an opportunity to connect with new customers, reaffirm the loyalty of current ones, build your business and boost revenues. But customers won’t...

Read more ››

Advances in Cyber Insurance Risk Management Services Help Pr...

Business identity theft

Jun 18 2013 by
Written by: Rick Betterley, President, Betterley Risk Consultants Insurance against data loss has developed rapidly to protect organizations from the economic consequences of a data breach. Insurance companies have broadened their coverage to include not only the cost of notifying and monitoring affected persons, but also costs such as crisis response, legal guidance, and forensics. But insurance isn't enough - Cyber...

Read more ››

IAPP Panel Discusses BYOD and the “Technology Divorce”...

Business identity theft

May 15 2013 by
As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices? This was the subject of mock debate held recently at the IAPP Global Privacy Summit. The debate,...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets