<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; cyber crime</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/cyber-crime/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Cyber insurance: the risk-reduction remedy some companies want and need</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/#comments</comments>
		<pubDate>Tue, 10 Jul 2012 17:54:02 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1422</guid>
		<description><![CDATA[  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg"><img class="aligncenter size-full wp-image-1436" title="Cyber-Liability-Insurance" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg" alt="" width="474" height="298" /></a></p>
<p>Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: <em>cyber insurance coverage</em>.</p>
<p>As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, where<a title="protecting-high-risk-information-in-ehrs" href="http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/"> protecting high-risk information in EHRs </a>(electronic health records) is among the top priorities. </p>
<p><strong>Why cyber insurance?<br />
</strong>For most, the goal of adding cyber insurance is to mitigate <a title="five-trends-on-security-threats" href="http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/">threats</a>, liabilities and costs sustained from (what else?) “cyber incidents” – a broad term covering an ever-growing range of mishaps and misuse, from hacked accounts and stolen credentials to pilfered laptops and wayward thumb drives.  </p>
<p>Given the frequency and severity of recent breaches, and the financial fallout that invariably results, who can blame companies for wanting an extra layer of protection?</p>
<p>Certainly not attorneys Theodore J. Kobus III and Kimberly M. Wong, data security experts and co-authors of a new paper entitled <a title="cyber-insurance-breach-response-plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-breach-response-plan.jsp"><span style="text-decoration: underline;">“Risk Management: Cyber Insurance &amp; Your Data Response Plan.”</span> </a>In fact, Kobus and Wong strongly suggest that, depending on budget, exposure profile and potential loss scenarios, cyber insurance may be a risk-reduction remedy that businesses sorely need.</p>
<p><strong>Surprisingly customizable coverage<br />
</strong>Companies seeking first-party cyber insurance coverage have a surprisingly diverse range of choices, say the authors, including protection against losses stemming from: data destruction and theft, extortion and hacking, and revenue lost from network intrusion or interruption.</p>
<p>Notification expenses, such as printing, mailing, credit monitoring and call center support may be included in a policy, along with third-party cyber liability coverage for vendors and partners.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_071012_article ">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<p><strong>Procuring the proper policy</strong><br />
The paper also includes suggestions for working with your broker, including:  </p>
<ol>
<li><strong>Determine</strong> what coverage you have under current general commercial liability or professional liability policies.  Identify potential gaps and opportunities to increase long-term protection.</li>
<li><strong>Assess</strong> your current level of exposure and types of cyber incidents that pose the biggest threats.</li>
<li><strong>Inventory</strong> the nature and location of all sensitive data. Is it stored in areas that are vulnerable to physical or digital theft? Knowing this will inform cyber coverage decisions.</li>
<li><strong>Step through</strong> potential employee/non-employee loss scenarios, such as: hacking, theft of data or computer equipment and unauthorized publication of information online.</li>
</ol>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/&via=Experian_DBR&text=Cyber insurance: the risk-reduction remedy some companies want and need&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F&amp;title=Cyber%20insurance%3A%20the%20risk-reduction%20remedy%20some%20companies%20want%20and%20need" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Password management</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/#comments</comments>
		<pubDate>Tue, 19 Jun 2012 17:21:47 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[password security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1354</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,password+security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg"><img class="aligncenter size-full wp-image-1357" title="Password Management" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg" alt="" width="461" height="461" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p><em>The</em> rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect those accounts.  I personally have accounts (and passwords) for sites I no longer even remember.  And while I have more accounts than most due to my profession, my hunch is that many people deal with the issue of password overload.  Password overload is when you attempt to use your Pinterest, Twitter, work email and university login passwords (one after another) to get into your Money Market Account only to be locked out.  Now you have to go into the branch with photo ID, or endure the dreaded “customer service hotline” (not-line) to prove that “you are you.”  I expect that you have experienced such “password overload” inconveniences, or you almost certainly know someone who has.</p>
<p>The problem seems like it could be easily solved by using the same password for everything.  One password to remember, and no more jumbling through your notebook trying to find what password you used for your newest account creation or Facebook app.  The problem with this approach is that if you are using the same <a title="passwords-that-wont-crack" href="http://blog.protectmyid.com/2012/05/30/passwords-that-wont-crack-under-pressure/" class="broken_link" rel="nofollow">passwords</a> for all (or even several) of your accounts, then if someone manages to get the password for say, your Instagram account, they would probably be able to then drain your savings account, phish your family for personal information (such as your Social Security Number), or rack up a warrant in your name for writing bad checks….  This could all happen because you logged into Facebook at an unsecured Wi-fi location, where your password for that one <a title="state-of-identity-theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">account is compromised</a>, and it happens to be the same password you use for multiple accounts.</p>
<p>So, what do you do if you don’t want to tattoo 25 passwords on your arm and you don’t want to end up cuffed for felony check fraud? The answer is a password manager.  This new service was created so that users can remember just one password, yet have access to all other passwords. The best part is that you can have access to these passwords from anywhere as most of the new password managers are internet based. As the need for password management increases, the options consumers have grown leaving even the strictest cybersecurity aficionado pleased with the service. </p>
<p>A few things you should look for when finding a password manager are:</p>
<ol>
<li>Is it cross platform? Will it work on your iPhone and your PC?</li>
<li>How is the information (your passwords) encrypted?</li>
<li>Does the service sync automatically, or will the user need to update the password storage database every time they sign up for a new account?</li>
<li>What is the initial authentication process and how strong is it?</li>
<li>How reputable is the company who created the product and what is reported about the product itself?</li>
</ol>
<p>By asking yourself these questions you should be on your way to making sure that your passwords are protected and you won’t lose your mind trying to keep track of them all. Just make sure you protect your login credentials for your password manager…. like <strong>really, really well</strong>&#8230;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/19/password-management/&via=Experian_DBR&text=Password management&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F&amp;title=Password%20management" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The compliance risks of social media</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/#comments</comments>
		<pubDate>Tue, 29 May 2012 15:49:04 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1274</guid>
		<description><![CDATA[Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg"><img class="aligncenter size-full wp-image-1277" title="social_media" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg" alt="" width="381" height="315" /></a></p>
<p>Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory obligations using social media platforms. </p>
<p>According to the report, critical reliance on third parties for information collection and capture, rapidly rising social media content volume and fast-changing applications, and the difficulty of ensuring authentication all make it difficult for security professionals to keep up with the<a title="Create a social media policy to protect you and your employees" href="http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/"> legal and regulatory compliance </a>associated with social media.</p>
<p>The report suggested that security pros should look to financial services for guidance on social media risks, keeping in mind that retention obligations clearly apply to social media, retention obligations also apply to both corporate- and employee-owned mobile devices, and firms should monitor and provide ongoing training to employees.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_052912_article ">Download this free checklist</a> to learn what steps to take when it&#8217;s go-time for data breach response. </div></div>
<p>Above all, critical steps that security professionals must take in order to respond to the risks that social media poses include the following:</p>
<p>1.  Build effective policies governing social media usage in your enterprise.<br />
Your <a title="Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/">social media policy </a>should cover what your organization will and will not do online, what your employees can and cannot do, and what members of the public can and cannot do on your social media sites.</p>
<p>2.  Determine how tools that control social media fit into broader information governance.<br />
Look before you leap when it comes to adopting tools that help enforce social media controls and make sure they’ll integrate with your company’s existing systems.</p>
<p>3.  Incorporate flexibility and continuous monitoring in social media.<br />
Social media is constantly innovating end evolving &#8211; your organization will need to do so as well.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/&via=Experian_DBR&text=The compliance risks of social media&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F&amp;title=The%20compliance%20risks%20of%20social%20media" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Students and cyber defense</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/#comments</comments>
		<pubDate>Tue, 07 Feb 2012 21:41:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Student Identity Theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=957</guid>
		<description><![CDATA[This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F07%2Fstudents-and-cyber-defense%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Identity+Theft,Identity+Theft+Prevention,Student+Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg"><img class="aligncenter size-full wp-image-961" title="college-students-easy-target-for-identity-thieves-10092901" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg" alt="Identity thief reaching for student ID" width="425" height="282" /></a></p>
<p>&nbsp;</p>
<p>A great deal of data is collected on students of all ages.  Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive data such as social security numbers.  Unfortunately, school administrators don’t always protect this information as well as they should and education institutions are just as susceptible to data breaches as any other organization.</p>
<p>This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are <a title="Child Identity Theft Blog Article" href="http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/" target="_blank">51 times more likely</a> to suffer from identity theft than adults.</p>
<p>The Federal Trade Commission recently issued a <a title="FTC Website" rel="nofollow" href="http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt056.shtm" target="_blank" class="broken_link">release</a> alerting parents about how to protect students from fraudulent activity.  Of particular note is information about the federal <a title="Education Website" rel="nofollow" href="http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank" class="broken_link">Family Educational Rights Privacy Act </a>(FERPA), enforced by the U.S. Department of Education, which protects the privacy of student records and gives parents of school-age kids the right to opt out of sharing contact information with third parties, including other families.</p>
<p>The FTC’s safety tips for parents include:<br />
•	Read the notice schools must distribute that explains the rights of students and parents under FERPA.  This legislation protects the privacy of student education records and gives parents the right to inspect and review your child&#8217;s education records, consent to the disclosure of information in the records and correct errors in the records.<br />
•	Ask your child&#8217;s school about its directory information policy. Student directory information can include a child&#8217;s name, address, date of birth, telephone number, email address, and photo. FERPA requires schools to notify parents and guardians about their school directory policy and give them the right to opt out of the release of directory information to third parties. Absent opting out, directory information may be available not only to the people in a child&#8217;s class and school, but also to the general public.<br />
•	Take action if your child&#8217;s school experiences a data breach. If you believe there&#8217;s been a data breach and your child&#8217;s information has been compromised, contact the school to learn more. Talk with teachers, staff, or administrators about the incident and their practices. Keep a written record of your conversations. Write a letter to the appropriate administrator, and to the school board, if necessary. The U.S. Department of Education takes complaints about these incidents. Contact the Family Policy Compliance Office, U.S. Department of Education, 400 Maryland Ave., SW, Washington, DC 20202-5920, and keep a copy for your records.</p>
<p>Perhaps it’s no coincidence that as more attention is directed to the risks of identity theft amongst children, cyber defense is becoming a hot new field of study for students.  National cyber defense competitions have emerged as spirited forums for budding technical talent, including the <a title="National Security Agency" rel="nofollow" href="http://www.nsa.gov/public_info/press_room/2010/cyber_defense.shtml" target="_blank" class="broken_link">National Security Agency’s Cyber Defense Exercise</a> – a competition that pits students from a series of military academies against each other – and against the competition’s leaders at NSA; the Air Force Association’s National High School Cyber Defense Competition, <a title="CyberPatriot" rel="nofollow" href="http://www.uscyberpatriot.org/Pages/default.aspx" target="_blank" class="broken_link">CyberPatriot</a>, created to inspire high school students towards careers in cyber security and associated fields; and the <a rel="nofollow" href="http://www.nationalccdc.org/" target="_blank" class="broken_link">National Collegiate Cyber Defense Competition</a>, designed to provide practical experience for students in a fast-changing field that needs ever more talented workers.<br />
We can only hope that this new generation of cyber experts – borne from a time when new risks have posed threats to their own personal safety – can meet the growing challenges of cyber defense.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/&via=Experian_DBR&text=Students and cyber defense&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches don’t take a holiday at the arcade</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 08:00:45 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[credit card fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=894</guid>
		<description><![CDATA[A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F27%2Fdata-breaches-don%25e2%2580%2599t-take-a-holiday-at-the-arcade%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,credit+card+fraud,cyber+crime,data+privacy,Identity+Theft,Identity+Theft+Prevention&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg"><img class="aligncenter size-full wp-image-897" title="credit card changing hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg" alt="" width="539" height="362" /></a></p>
<p>A recent data breach <a rel="”nofollow” nofollow" href="http://www.computerworld.com/s/article/9219945/Vending_machine_company_announces_major_data_breach?taxonomyId=82" class="broken_link">discovery</a> serves as a reminder that even when you’re on vacation, cyber criminals never sleep.</p>
<p>Vacationland Vendors, a company that supplies vending machines and video games to entertainment venues, recently reported that an unknown intruder penetrated its point of sale systems, resulting in a data breach affecting approximately 40,000 customers at waterland resorts in Tennessee and Wisconsin.  Although credit card and debit information was apparently stolen between December 2008 and May 2011, Vacationland Vendors did not state how the breach was discovered or whether affected customers have been notified.  The company did issue a general recommendation to anyone who visited the affected resorts within the targeted time frame to remain vigilant for fraud activity on their bank and credit card statements and to consider adding a <a href="../../../data-breach/data-compromise.html" class="broken_link" rel="nofollow">fraud alert</a> with the major credit bureaus.</p>
<p>The Vacationland Vendors data breach highlights the continued vulnerabilities of point of sale technology to crafty cyber criminals.  <a href="../../../data-breach/wp-security-as-business-risk.html" class="broken_link" rel="nofollow">Heartland Payment Systems</a>, a leading payment processing company, discovered this several years ago when it was hit by a historically large breach that exposed the accounts of as many as 100 million cardholders.  The same kind of breach affected CardSystems Solutions when a breach exposed the accounts of 40 million debit and credit card holders, leading to the sale and ultimate closure of the company.  Indeed, the theft of credit card data is one of the most common forms of fraud and the very reason that the Payment Card Industry Data Security Standard strengthened its requirements of payment card device vendors last year.</p>
<p>The <a href="../2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/">debate</a> about how to best secure credit card transactions has continued this year with the burgeoning introduction of end to end encryption technologies that can better protect cardholder data throughout the entire transaction process.  An example of improved safety mechanisms in the POS process is newer chip and PIN technology, as evidenced by Visa’s recent <a rel="”nofollow” nofollow" href="http://usa.visa.com/download/merchants/bulletin-us-adopt-dynamic-authentication-080911.pdf" class="broken_link">announcement</a> that it is accelerating chip migration and adoption of mobile payments.</p>
<p>Until the technology around POS systems is more bulletproof, it’s especially important for companies to implement added <a href="../../../data-breach/data-breach-resources.html">safety measures</a> around its current credit card payment processes.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/&via=Experian_DBR&text=Data breaches don’t take a holiday at the arcade&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding holiday scams</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/#comments</comments>
		<pubDate>Tue, 06 Dec 2011 17:24:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=872</guid>
		<description><![CDATA[With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F06%2Favoiding-holiday-scams%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,hackers,Identity+Theft+Prevention,PII,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg"><img class="size-full wp-image-873 aligncenter" title="holiday 1210_intro_390x220" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg" alt="" width="390" height="220" /></a></p>
<p>With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.</p>
<p>Here, according to <a rel="nofollow" href="http://blogs.mcafee.com/consumer/consumer-threat-alerts/holidays-are-high-time-for-cybercrime" target="_blank" class="broken_link">McAfee</a>, are 12 common holiday scams to beware of:</p>
<p><strong>1. </strong><strong>iPad scams</strong>.  Watch out for bogus offers for free iPads on social media sites and via spam.</p>
<p><strong> </strong></p>
<p><strong>2. </strong><strong>“Help! I’ve been robbed” scam. </strong>Fraudsters send emails appearing to come from the account of friends which state that they’ve been robbed while traveling abroad and need money to be wired in order to get home.</p>
<p><strong> </strong></p>
<p><strong>3. </strong><strong>Fake gift cards. </strong>With these scams, cybercriminals promise fake <a href="http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/" target="_blank">gift cards</a> in exchange for personal information that can be used for <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity theft</a>.</p>
<p><strong> </strong></p>
<p><strong>4. </strong><strong>Holiday</strong><strong> job offers. </strong>Fake, high-paying, work at home jobs are offered in exchange for <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a>.</p>
<p><strong> </strong></p>
<p><strong>5. </strong><strong>“Smishing.” </strong>Scammers “phish” via text message, or <a href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">smish</a>, often posing as a bank or online retailer requesting personal information to address a problem with a target’s account.</p>
<p><strong> </strong></p>
<p><strong>6. </strong><strong>Holiday</strong><strong> rental scams.</strong> Fake, attractive rental properties at low prices are advertised on phony websites in order to lure deposits via wire transfer.</p>
<p><strong> </strong></p>
<p><strong>7. </strong><strong>Recession scams</strong>.  Financial “help” is offered to targets in the form of pay-in-advance credit schemes and pre-qualified low-interest loans, all in exchange for an upfront processing free.</p>
<p><strong> </strong></p>
<p><strong>8. </strong><strong>Grinch-like Greetings. </strong>Fake e-cards are loaded with links to computer viruses and other malware.</p>
<p><strong> </strong></p>
<p><strong>9. </strong><strong>Low price traps. </strong>Auction sites and phony websites are used to offer too-good-to-be-true prices on holiday gifts; the scammers walk away with information and/or money.</p>
<p><strong> </strong></p>
<p>10.  <strong>Charity scams. </strong>Solicitations for phony charities play on the spirit of holiday giving and philanthropic generosity.</p>
<p><strong> </strong></p>
<p><strong>11. </strong><strong>Dodgy holiday downloads.</strong> Watch out for holiday-themed jingles, screensavers and animations distributed via downloads, spam or dubious websites – they could contain malware.</p>
<p><strong> </strong></p>
<p><strong>12. </strong><strong>Hotel and airport Wi-Fi. </strong>During this season of high travel, Wi-Fi hotspots are criminal hangouts, with scammers eager to hack into unprotected networks.</p>
<p><strong> </strong></p>
<p>This holiday season, make sure that you, your employees and your customers are on high alert for the seasonal scams that turn up with the regularity of fruitcake…and are just as unwanted.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/&via=Experian_DBR&text=Avoiding holiday scams&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber crime gets costlier</title>
		<link>http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/#comments</comments>
		<pubDate>Tue, 04 Oct 2011 15:41:04 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=804</guid>
		<description><![CDATA[The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard of business.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F10%2F04%2Fcyber-crime-gets-costlier%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+attacks,cyber+crime,Data+Breach,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<h1><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/CyberCrime3.jpg"><img class="aligncenter size-full wp-image-805" title="CyberCrime3" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/CyberCrime3.jpg" alt="" width="448" height="336" /></a></h1>
<p>The <a href="http://www.ponemon.org/blog/post/second-cost-of-cyber-crime-study-is-released-today" rel="”nofollow” nofollow" target="_blank" class="broken_link">Ponemon Institute&#8217;s</a> recently released &#8220;Second Annual Cost of Cyber Crime Study&#8221; confirms what many of us might suspect from the endlessly grim headlines these days; data breaches have become a more frequent and damaging hazard of business.  The study, sponsored by <a href="http://www.arcsight.com/press/release/hp-research-ponemon/" rel="”nofollow” nofollow" target="_blank" class="broken_link">ArcSight</a>, set out to quantify the financial toll from cyber attacks and assess the full impact of those costs over time, with the purpose of helping businesses better understand the level of resources needed to prevent or mitigate future attacks.</p>
<p>The cyber crime study arrived at several key <a href="http://www.itbusinessedge.com/slideshows/show.aspx?c=91868&amp;slide=2" rel="”nofollow” nofollow" target="_blank" class="broken_link">conclusions</a>:</p>
<ul>
<li><strong>Cyber crimes can decimate bottom lines.</strong><strong> </strong>The study showed that cyber crime costs organizations an average of $5.9 million per year, with a range of $1.5 million to $36.5 million each year per company. This represents a 56% increase in average cost from the first cyber crime study published last year.</li>
<li><strong>Cyber attacks have become common.</strong> The companies in the study experienced 72 successful attacks per week and more than one successful attack per company per week. This represents an increase of 44% from last year’s successful attack experience.</li>
<li><strong>The most costly cyber crimes are those caused by malicious code, denial of service, stolen devices and Web-based attacks.</strong> These account for more than 90% of all cyber crime costs per organization each year.</li>
<li><strong>Cyber crime cost varies by organizational size</strong>.  Smaller-sized organizations incur a significantly higher per capita cost than larger-sized organizations ($1,088 versus $284).</li>
<li><strong>Cyber attacks cost more if not resolved quickly</strong>.  The average time to resolve a cyber attack is 18 days, with an average cost of $415,748 over this 18-day period.  This represents a 67% increase from last year’s estimated average cost of $247,744, which was compiled for a 14-day period.  Malicious insider attacks can take more than 45 days on average to contain.</li>
<li><strong>Information theft continues to represent the highest external costs of cyber crime, followed by the costs associated with business disruption</strong>. Information theft accounts for 40% of total external costs per year (down 2% from 2010). Costs associated with disruption to business or lost productivity account for 28% of external costs (up 6% from 2010). Recovery and detection are the most costly internal activities, accounting for 45% of the total internal activity cost, with cash outlays and labor representing the majority of these costs.</li>
<li><strong>All industries fall victim to cyber crime, but to different degrees</strong>. The average cost of cyber crime appears to vary by industry segment, where defense, utilities and energy, and financial service companies experience higher costs per year than organizations in retail, hospitality and consumer products.</li>
</ul>
<p>One of the more hopeful takeaways from the study indicates that strong security measures do mitigate the cost of cyber attacks, creating one more reason to institute a <a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">data breach plan</a> and back it up with <a href="http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/" target="_blank">robust resources</a> for protection.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_100411_article">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/&via=Experian_DBR&text=Cyber crime gets costlier&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>