<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Consumer fraud</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/consumer-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Online holiday shopping is also big business for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 18:47:08 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[online shopping]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1901</guid>
		<description><![CDATA[According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Cyber+Security,Data+Breach,Data+Security,Federal+Trade+Commission,hackers,Identity+Theft,online+shopping&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg"><img class="aligncenter  wp-image-1905" title="online-shopping" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg" alt="" width="476" height="316" /></a></p>
<p>According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> measures in order to avoid illegal online activity.  Of the 1.4 billion dollars spent in online sales during 2011’s holiday shopping season (November 1 to December 31), $82 million of those dollars were identified as fraudulent, resulting in a 219% increase from 2010.  Cyber Monday alone accounted for $2.5 million of online fraud.</p>
<p>Most web-based fraud activity is due to stolen credit cards and since <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is at an all time high, online merchants of all sizes need to implement fraud protection procedures and be proactive in watching for signs of unscrupulous activity.  Early detection is the key to stopping con artists who like to prey on new, inexperienced online businesses.  However, if they discover a merchant has implemented active data security procedures, fraudsters generally won’t waste their time and will most likely move on to their next victim.  The best way for businesses to protect themselves from fraud is to be diligent in watching out for signs of suspicious activity.  These include bulk orders for items that are not usually bought in bulk, orders for multiple high end items, international orders and several orders placed by the same person within a short time.  Con artists try to make as many purchases as possible before a fraud alert is sent to the real owner so they tend to order as much merchandise as they can.</p>
<p>Although it’s impossible to erase online credit card fraud, here are several strategies to reduce it:</p>
<ol start="1">
<li>Use an Address Verification Service (AVS) to make sure the billing address entered online matches the cardholder’s billing information. Institute a policy that merchandise will not ship unless the addresses match.</li>
<li>Always ask for the Card Verification Number (CVN) on all credit card orders. The number must be read from the actual card so more than likely the person has the card in his possession. Although it’s not a guarantee that he is its rightful owner, this step provides a small measure of protection.</li>
<li>Send a confirmation email or letter to customers when you send an item telling them their order has shipped and when they can expect it to appear on their bill. This can help flag any illegal activity and enable the customer to report credit fraud to the proper authorities before the perpetrator has a chance to do any further credit damage. It will also help businesses to reduce complaints and chargebacks from people who sometimes simply forget they placed an order.</li>
</ol>
<p>Retailers should keep in mind that once an order has been sent, it is very difficult to regain any loss so prevention is the number one way to combat online fraud.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/&via=Experian_DBR&text=Online holiday shopping is also big business for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F&amp;title=Online%20holiday%20shopping%20is%20also%20big%20business%20for%20fraudsters" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches don’t take a holiday at the arcade</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 08:00:45 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[credit card fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=894</guid>
		<description><![CDATA[A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F27%2Fdata-breaches-don%25e2%2580%2599t-take-a-holiday-at-the-arcade%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,credit+card+fraud,cyber+crime,data+privacy,Identity+Theft,Identity+Theft+Prevention&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg"><img class="aligncenter size-full wp-image-897" title="credit card changing hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg" alt="" width="539" height="362" /></a></p>
<p>A recent data breach <a rel="”nofollow” nofollow" href="http://www.computerworld.com/s/article/9219945/Vending_machine_company_announces_major_data_breach?taxonomyId=82" class="broken_link">discovery</a> serves as a reminder that even when you’re on vacation, cyber criminals never sleep.</p>
<p>Vacationland Vendors, a company that supplies vending machines and video games to entertainment venues, recently reported that an unknown intruder penetrated its point of sale systems, resulting in a data breach affecting approximately 40,000 customers at waterland resorts in Tennessee and Wisconsin.  Although credit card and debit information was apparently stolen between December 2008 and May 2011, Vacationland Vendors did not state how the breach was discovered or whether affected customers have been notified.  The company did issue a general recommendation to anyone who visited the affected resorts within the targeted time frame to remain vigilant for fraud activity on their bank and credit card statements and to consider adding a <a href="../../../data-breach/data-compromise.html" class="broken_link" rel="nofollow">fraud alert</a> with the major credit bureaus.</p>
<p>The Vacationland Vendors data breach highlights the continued vulnerabilities of point of sale technology to crafty cyber criminals.  <a href="../../../data-breach/wp-security-as-business-risk.html" class="broken_link" rel="nofollow">Heartland Payment Systems</a>, a leading payment processing company, discovered this several years ago when it was hit by a historically large breach that exposed the accounts of as many as 100 million cardholders.  The same kind of breach affected CardSystems Solutions when a breach exposed the accounts of 40 million debit and credit card holders, leading to the sale and ultimate closure of the company.  Indeed, the theft of credit card data is one of the most common forms of fraud and the very reason that the Payment Card Industry Data Security Standard strengthened its requirements of payment card device vendors last year.</p>
<p>The <a href="../2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/">debate</a> about how to best secure credit card transactions has continued this year with the burgeoning introduction of end to end encryption technologies that can better protect cardholder data throughout the entire transaction process.  An example of improved safety mechanisms in the POS process is newer chip and PIN technology, as evidenced by Visa’s recent <a rel="”nofollow” nofollow" href="http://usa.visa.com/download/merchants/bulletin-us-adopt-dynamic-authentication-080911.pdf" class="broken_link">announcement</a> that it is accelerating chip migration and adoption of mobile payments.</p>
<p>Until the technology around POS systems is more bulletproof, it’s especially important for companies to implement added <a href="../../../data-breach/data-breach-resources.html">safety measures</a> around its current credit card payment processes.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/&via=Experian_DBR&text=Data breaches don’t take a holiday at the arcade&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches make the hospitality industry less hospitable</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/#comments</comments>
		<pubDate>Wed, 16 Nov 2011 18:00:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=867</guid>
		<description><![CDATA[According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies.
Why are hackers increasingly making themselves at home in the hospitality sector?  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F16%2Fdata-breaches-make-the-hospitality-industry-less-hospitable%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Data+Breach,data+breach+response,Data+Policy,Data+Security,Identity+Theft+Prevention,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg"><img class="aligncenter size-full wp-image-868" title="Travel destination" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg" alt="Palm trees over a clear blue ocean and white sand" width="557" height="417" /></a></p>
<p>The tourism industry may be bouncing back from the worst of the recession, but occupancy, unfortunately, isn’t the only thing on the rise.  So are <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank">data breaches</a>.</p>
<p>According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks &#8211; 38% &#8211; targeting hotels, reports and tour companies.</p>
<p>Why are <a href="http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/" target="_blank">hackers</a> increasingly making themselves at home in the hospitality sector?</p>
<p>According to <a title="Hotel News Now" rel="nofollow" href="http://www.hotelnewsnow.com/Articles.aspx/3329/Hotel-data-breaches-the-result-of-basic-failures-within-industry" target="_blank" class="broken_link">hospitality experts</a>, the reasons are multi-fold:</p>
<p>1.    Labor cutbacks.  Given the recessionary climate, hotels have reduced staff and are trying to do more with less.  While the lean and mean approach may help hospitality businesses bolster bottom lines, it hurts the industry’s front line defenses against hackers.</p>
<p>2.    Software and equipment reductions.  While hotels ride out the recession, security maintenance, implementation and upgrades fall lower in the priority checklist, creating an easy welcome mat for fraudsters.</p>
<p>3.    Multiple entry points.  Customers book hotels through hotel websites, online travel reservation portals, phone calls, email, postal mail, and in-person with concierges.  Each channel offers its own risks for <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> and must be individually addressed.</p>
<p>4.    Large access to <a href="http://www.experian.com/data-breach/data-breach-security.html" target="_blank">personal data</a>.  The hospitality industry keeps massive amounts of personal data on file for years and can sometimes lose track of what they have stored and where – all within databases that may be far less than bullet-proof.</p>
<p>5.    Guest room computers with flimsy protection.  Those networked desktops that hotels sometimes provide for guests can be so helpful…and harmful.  Often these computers are riddled with viruses or hiding bits and bytes of old customer data.</p>
<p>6.    Insecure cultures.  Even in the best of times, much of the hospitality industry simply doesn’t prioritize security as it should.  By creating business cultures that don’t sufficiently respect privacy, hotels are jeopardizing the trust of their customers.</p>
<p>Given that hackers have identified the hospitality sector as a soft target, what can hotels do to keep these unwanted guests out?  Here are some tips from industry watchdogs:</p>
<ol>
<li>Minimize data collection.  If you don’t need it, don’t collect it.</li>
<li>Understand and comply with PCI-DSS.  Make sure your business is completely aware of its “cardholder data environment” and is providing appropriate protections.</li>
<li>Find and digitally shred unneeded information.  Old, forgotten data is dangerous. Don’t be “data blind” – eliminate what you no longer need.</li>
<li>Simplify your reports.  For example, don’t offer up social security numbers if not needed.</li>
<li>Limit access.  Employees should be on a “need to know” basis with PCI and HR data.</li>
<li>Split up your network.  Create electronic firewalls that limit the spread of viruses and attacks.</li>
<li>Encrypt. Proper encryption renders hacked data unusable.</li>
<li>Understand your network.  Review network logs for unauthorized activity, and make sure your security professionals do, too.</li>
<li>Don’t put security in the ghetto.  Security isn’t just for IT professionals; make sure your entire organization creates and respects a culture of privacy that prioritizes security as the basis for all of its operations</li>
</ol>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/&via=Experian_DBR&text=Data breaches make the hospitality industry less hospitable&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What consumers should know about data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 16:36:27 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=854</guid>
		<description><![CDATA[It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F02%2Fwhat-consumers-should-know-about-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+fraud,Data+Breach,Data+Breach+Notification,data+breach+response,Fraud,Identity+Theft,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg"><img class="aligncenter size-full wp-image-856" title="lettermailbox" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg" alt="Notification Letter Mailbox" width="448" height="336" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.</p>
<p>Often times, there is a lot of speculation surrounding the company’s timing of the <a href="../2011/09/20/over-reporting-vs-under-reporting-data-breaches/">breach notification</a>.  The timing of notification may depend upon a variety of state laws, some of which may delay notification if law enforcement is doing an investigation of the incident and has requested a delay to make the investigation easier.  In most breach cases, the company will want to investigate internally prior to making public notice.  It is important to the consumer and the company that they provide a notice which is accurate.  No one is happy when a notice is made public, and then has to be changed as further information comes to light.  Everyone is better served when the company gets the information right the first time.</p>
<p>It is also important to understand the complexities which may surround various types of data breaches. Not all breaches are equal in the amount of risk posed to the consumer.  For instance, some pieces of information about you are generally available and public, and pose little risk to you taken alone, such as your email address, or first and last name.  Credit card numbers that are exposed are a risk, but not a long term problem, as the issuer will provide a new card with a different account number very quickly.</p>
<p>Additionally, malicious attacks on a company’s server, insider (employee) theft, or the theft of mobile devices (i.e. storage devices, laptops) may be more likely to lead to identity theft than accidental posting on a long-ago cached website or papers left behind in an old abandoned building.  Knowing whether or not the breach incident was malicious or accidental in nature may help you to put the level of risk into a better perspective.</p>
<p>Just remember, unless you know otherwise, the fact that your data was compromised does NOT mean you are an <a href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft</a> victim.  In fact, there have been millions of people notified that their information may have been breached who have not become identity theft victims. Your <a href="../../../data-breach/data-breach-resources.html">response</a> to the breach will depend on the type of information that was compromised.  Here are some steps you can take at this time:</p>
<p><strong>Financial Account Numbers: </strong></p>
<p>This includes checking accounts, credit cards, money market funds, stocks, and bank accounts:</p>
<ul>
<li>Close      ONLY the affected accounts and have account numbers changed.</li>
<li><a href="../2011/08/23/do-your-passwords-pass-the-hack-test/">Password</a>-protect      <strong>all </strong>your accounts, the new ones      as well as the closed.  This restricts      thieves from re-opening closed accounts.</li>
<li>Monitor      your account and billing statements closely</li>
<li>Report      any fraudulent activity immediately to the bank and law enforcement.</li>
</ul>
<p><strong>Social Security Numbers:<br />
</strong>Call the credit reporting agencies.  These are automated and secure systems.   Place a fraud alert with each agency and request a free copy of each of your credit reports.  It is free because your information was breached and you are a potential victim of identity theft.  Do this for any person whose Social Security Number (SSN) was compromised. If the SSN belongs to a child, you should find that there is <strong>no credit report </strong>available for that <a href="http://www.familysecure.com/default.aspx?sc=668285" class="broken_link" rel="nofollow">child</a>.  If there is a credit report for a child, it indicates that the child’s information may have been used. In that case, you need to get a copy of the credit report in order to repair the incorrect items.</p>
<p>It is also recommended that you call all three credit reporting agencies and not just one.  Check your report carefully for any irregularities.  Sometimes people see errors on the report that were on the report before the data breach occurred.</p>
<p>You can use, without charge, the annual credit reports system <a href="http://www.annualcreditreport.com/" class="broken_link" rel="nofollow">www.annualcreditreport.com</a> to monitor your credit report over the next year. Stagger them throughout the year by ordering one every four months.</p>
<p>Or, if you want real-time updates on your credit report, you may want to consider a paid service which monitors your credit report and alerts you immediately upon any change.</p>
<p><strong> </strong></p>
<p><strong>Other:</strong></p>
<ul>
<li>If your auto or medical insurance policy information is      involved, ask the company about their policy to protect compromised      policies.</li>
<li>If it is HR data that was compromised, change account numbers      for your 401-K, life insurance, and accounts holding your stock options.  Password-protect these accounts.</li>
<li>Driver’s License’s &#8211; contact your state Department/Bureau of      Motor Vehicles and notify them of the theft.  They most likely will not change your      number.</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/&via=Experian_DBR&text=What consumers should know about data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your business from gift card fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/#comments</comments>
		<pubDate>Tue, 22 Mar 2011 15:24:59 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[employee fraud]]></category>
		<category><![CDATA[Gift card fraud]]></category>
		<category><![CDATA[gift card scams]]></category>
		<category><![CDATA[National Retail Federation]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=363</guid>
		<description><![CDATA[Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of consumer fraud  and internal misconduct that are posed by credit cards.  Developing robust safeguards , proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F22%2Fprotecting-your-business-from-gift-card-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Consumer+fraud,employee+fraud,Gift+card+fraud,gift+card+scams,National+Retail+Federation&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card1.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/gift-card2.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2.bmp"></a></p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2-v21.bmp"><img class="size-full wp-image-387 aligncenter" title="Gift card 2 v2" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Gift-card-2-v21.bmp" alt="" width="427" height="336" /></a></p>
<p>The holidays may be over, but scams targeting holiday gift cards purchased by consumers are an unwanted gift that keeps on giving.  The National Retail Federation estimates that gift cards are a $50 billion annual market, so it’s little surprise that fraudsters search for creative ways to grab a piece of the action throughout the year.  These thefts leave retailers in the difficult position of either reinstating gift card balances to victimized customers – and consequently cutting into their revenue and profitability – or sacrificing consumer confidence in the integrity of an important sales vehicle.</p>
<p>Addressing this violation starts with understanding the ways in which gift cards are scammed.  One of the most popular hustles involves covertly copying identification numbers from gift card displays, then stealing funds from these cards after they’ve been purchased by customers.  Scammers typically call to inquire about the balance on “their” card to determine whether cards have been activated; once this is confirmed, the thieves then purchase goods online before rightful customers have the chance to do so.  The hoax is even easier to pull off if employees are the ones cribbing card numbers and can personally monitor when the cards are activated.  Alarmingly, this is just one of numerous known scams, which run the gamut from <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.nwcn.com/news/oregon/New-scam-Cloned-gift-cards-spyware-that-tracks-reloading-103500349.html" target="_blank" class="broken_link">gift card cloning</a></span> to <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.fraudguides.com/consumer-gift-card.asp" target="_blank" class="broken_link">selling stolen gift cards on auction websites</a>.</span></p>
<p>Implementing strong security around gift card programs is key to ensuring its protection for both customers and businesses.  <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.ehow.com/how_4487163_protect-retail-customers-from-gift.html" target="_blank" class="broken_link">Simple steps</a></span>, such as altering gift card displays so that actual cards aren’t accessible to the public, as well as building in privacy features like pin codes, can go a long way towards deterring criminal activity.  Internally, companies must also take measures to ward off <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.lpinnovations.com/page/86-gift_card_fraud/" target="_blank" class="broken_link">employee fraud</a></span>; for example, discarding used cards and monitoring blanks to prevent employees from switching customers’ cards with old or inactive zero balance cards.</p>
<p>Gift cards are a growing market for businesses and should be treated as valuable sales currency, with the same risks of <span style="text-decoration: underline;"><a href="http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/" target="_blank">consumer fraud</a></span> and internal misconduct that are posed by credit cards.  <span style="text-decoration: underline;"><a href="http://www.experian.com/business-services/data-breach-protection.html" target="_blank">Developing robust safeguards</a></span>, proper auditing and early detection and reporting of abuse are critical to protecting a program that is popular with customers and profitable to retailers.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/&via=Experian_DBR&text=Protecting your business from gift card fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your retail business from consumer fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/#comments</comments>
		<pubDate>Tue, 25 Jan 2011 19:37:22 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=277</guid>
		<description><![CDATA[The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F25%2Fprotecting-your-retail-business-from-consumer-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+fraud,Business+identity+theft,Consumer+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have policies or controls in place.  Unfortunately many businesses don’t realize that they are victims until after the most wonderful time of year.</p>
<p>According to a <a rel="”nofollow” nofollow" href="http://business.itbusinessnet.com/articles/viewarticle.jsp?id=1292311" target="_blank" class="broken_link">recent article</a>, use of a stolen credit card to purchase merchandise is one of the most common forms of fraud.  However, fraudsters are becoming more sophisticated and have learned to steal credit card information by intercepting transmissions from retail credit machines.   Scary isn’t it?</p>
<p>What can a business do to protect itself from damages now and in the New Year?  There are<a rel="”nofollow” nofollow" href="http://www.businesspundit.com/protect-your-business-from-credit-card-fraud-this-season/" target="_blank" class="broken_link"> three things</a> your business can implement immediately.  For example, require employees who process credit cards to ask customers to sign the credit receipt and check signatures on the back of the credit card.  Secondly, focus on delivering excellent customer service.  A happy customer is less likely to retaliate by making charge backs.  Lastly, define and implement a <a rel="”nofollow” nofollow" href="http://www.lpsconsulting.org/index.html?entry=controlling-return-fraud-during-the" target="_blank" class="broken_link">return policy</a> to address the very real threat of merchandise return fraud.</p>
<p>Take the time to discuss threat of consumer fraud with your employees and implement policies to <a href="http://sbcr.experian.com/" target="_blank" class="broken_link" rel="nofollow">reduce fraud</a>.  Doing so will enable your business to benefit from the seasonal increase in sales.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/&via=Experian_DBR&text=Protecting your retail business from consumer fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F25%2Fprotecting-your-retail-business-from-consumer-fraud%2F&amp;title=Protecting%20your%20retail%20business%20from%20consumer%20fraud" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/01/25/protecting-your-retail-business-from-consumer-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>