Views on Consumer Reactions

to Data Breaches...

cyber crime

Jun 09 2014 by
Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon report to Michael...

Read more ››

The Worst Things You can Say or Do in a Breach Notification ...

cyber crime

May 06 2014 by
When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in a courteous, straightforward manner. Because of this, notification letters are an integral piece of a firm’s...

Read more ››

Is Your Data Secure for Small Business Saturday?...

cyber crime

Nov 26 2013 by
Small Business Saturday – the Saturday immediately following Black Friday – is meant to encourage consumers to patronize small businesses across the country during a season that is make or break for many of them. Like many small businesses, you probably hope the day will be an opportunity to connect with new customers, reaffirm the loyalty of current ones, build your business and boost revenues. But customers won’t...

Read more ››

10,000 identity fraud rings discovered in the Southeastern U...

cyber crime

Jan 22 2013 by
When people hear “identity fraud,” they usually conjure up images of a lone hacker furtively typing on a laptop.  However the reality is identity theft is largely committed by identity fraud rings composed of two or more criminals actively working together.  Currently in the U.S., there are more than 10,000 identity fraud rings and unlike other types of organized crime and cyber security threats, most identity fraud...

Read more ››

Cyber Security Act of 2012 dies as an executive order is bor...

cyber crime

Jan 08 2013 by
The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department and other key federal agencies consider this cyber legislation critical to national security and DOD officials expressed...

Read more ››

Cyber insurance: the risk-reduction remedy some companies wa...

cyber crime

Jul 10 2012 by
  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, where protecting high-risk information in EHRs...

Read more ››

Password management...

cyber crime

Jun 19 2012 by
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect those accounts.  I personally have accounts (and passwords) for...

Read more ››

The compliance risks of social media...

cyber crime

May 29 2012 by
Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory obligations using social media...

Read more ››

Students and cyber defense...

cyber crime

Feb 07 2012 by
  A great deal of data is collected on students of all ages. Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive data such as social security numbers. Unfortunately, school administrators don’t always protect this information as well as they should...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets