<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Cyber Security</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Little progress made in the prevention of medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/#comments</comments>
		<pubDate>Tue, 01 Jan 2013 16:32:55 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1919</guid>
		<description><![CDATA[Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been 495 medical data breaches involving 21 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security,HIPAA,HITECH+Act,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> has made very little improvement according to the latest <a href="http://www.hitrustalliance.net/breachreport/HITRUST%20Report%20-%20U.S.%20Healthcare%20Data%20Breach%20Trends.pdf" class="broken_link" rel="nofollow">study</a> from Health Information Trust Alliance (HITRUST)<sup>1</sup>.  The study reports that from 2009 to the first half of 2012, there have been 495 <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">medical data breaches</a> involving 21 million records costing roughly $4 billion.  Government organizations including VA hospitals accounted for the highest number of lost records and the states with the most health care data breaches are California, Texas and New York.  Since 2009 the total number of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breaches</a> at hospitals and health systems decreased only slightly but increased at smaller private physician practices, which accounted for more than 60% of the 459 breaches reviewed in the study.</p>
<p> The report also found that the majority of breaches (70 percent) were electronic and the leading cause data breach incidents were due to stolen devices such as laptops and mobile media.  However, paper records still play a role in data breaches, totaling 24 percent of medical data breaches, second only to lost laptops.  Mailing errors and improper disposal of records were the main reasons for paper-based breaches. </p>
<p>The Health Information Technology for Economic and Clinical Health (HITECH) Act states that healthcare organizations have 60 days in which to notify victims about a data breach but over 50 percent of companies failed to meet this deadline after a breach.</p>
<p>And it may get worse before it gets better if the medial industry does not find a way to protect themselves from BYOD (bring your own device) policies.  BYOD has become commonplace at smaller physician offices where medical personnel commonly look up patient information on their own smartphones without sufficient encryption or passwords in place which could pose a problem in the event that the device is lost.  In addition, due to the smaller sizes of this group, they lack the resources and awareness to properly arm themselves with the proper data breach protection<strong> </strong>in all areas of their practice.<strong>  </strong>This could expose a larger problem for the entire healthcare industry since community health records and health information is often shared between medical institutions of all sizes. </p>
<p>&nbsp;</p>
<p><sup>1</sup> HITRUST is a non-profit coalition of healthcare, business, technology and information security leaders, established to insure information security is a core value in the broad adoption of health information systems and exchanges.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/&via=Experian_DBR&text=Little progress made in the prevention of medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F&amp;title=Little%20progress%20made%20in%20the%20prevention%20of%20medical%20data%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Online holiday shopping is also big business for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 18:47:08 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[online shopping]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1901</guid>
		<description><![CDATA[According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Cyber+Security,Data+Breach,Data+Security,Federal+Trade+Commission,hackers,Identity+Theft,online+shopping&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg"><img class="aligncenter  wp-image-1905" title="online-shopping" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg" alt="" width="476" height="316" /></a></p>
<p>According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> measures in order to avoid illegal online activity.  Of the 1.4 billion dollars spent in online sales during 2011’s holiday shopping season (November 1 to December 31), $82 million of those dollars were identified as fraudulent, resulting in a 219% increase from 2010.  Cyber Monday alone accounted for $2.5 million of online fraud.</p>
<p>Most web-based fraud activity is due to stolen credit cards and since <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is at an all time high, online merchants of all sizes need to implement fraud protection procedures and be proactive in watching for signs of unscrupulous activity.  Early detection is the key to stopping con artists who like to prey on new, inexperienced online businesses.  However, if they discover a merchant has implemented active data security procedures, fraudsters generally won’t waste their time and will most likely move on to their next victim.  The best way for businesses to protect themselves from fraud is to be diligent in watching out for signs of suspicious activity.  These include bulk orders for items that are not usually bought in bulk, orders for multiple high end items, international orders and several orders placed by the same person within a short time.  Con artists try to make as many purchases as possible before a fraud alert is sent to the real owner so they tend to order as much merchandise as they can.</p>
<p>Although it’s impossible to erase online credit card fraud, here are several strategies to reduce it:</p>
<ol start="1">
<li>Use an Address Verification Service (AVS) to make sure the billing address entered online matches the cardholder’s billing information. Institute a policy that merchandise will not ship unless the addresses match.</li>
<li>Always ask for the Card Verification Number (CVN) on all credit card orders. The number must be read from the actual card so more than likely the person has the card in his possession. Although it’s not a guarantee that he is its rightful owner, this step provides a small measure of protection.</li>
<li>Send a confirmation email or letter to customers when you send an item telling them their order has shipped and when they can expect it to appear on their bill. This can help flag any illegal activity and enable the customer to report credit fraud to the proper authorities before the perpetrator has a chance to do any further credit damage. It will also help businesses to reduce complaints and chargebacks from people who sometimes simply forget they placed an order.</li>
</ol>
<p>Retailers should keep in mind that once an order has been sent, it is very difficult to regain any loss so prevention is the number one way to combat online fraud.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/&via=Experian_DBR&text=Online holiday shopping is also big business for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F&amp;title=Online%20holiday%20shopping%20is%20also%20big%20business%20for%20fraudsters" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>7 Things you should think about when you audit your response plan</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 17:30:03 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1874</guid>
		<description><![CDATA[Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Breach+Notification,data+breach+response,data+privacy,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg"><img class="aligncenter  wp-image-1875" title="response-plan-checklist" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg" alt="" width="509" height="339" /></a></p>
<p>Now that your <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach</a> response plan is in place and you’re confident that your company is safeguarded from malicious <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/"> data breach</a> attempts, what can possibly be still the biggest threat to your <a href="http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/">data breach protection</a> plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing so it’s necessary to ensure that your response plan stays current and functional.</p>
<p>That is why it’s imperative that you regularly audit, test and update your plan on preferably, a quarterly basis.</p>
<p>Here are 7 checklist items to keep in mind when auditing your response plan:</p>
<p>1) Update your data breach response team contact list &#8211; Employees come and go therefore it’s important that the contact information for the members of your internal and external breach response team is current.  Make sure department heads are noted and once updated, re-distribute the list to the appropriate people.</p>
<p>2) Verify that your data breach response plan is comprehensive &#8211; Revise the plan to include any major company changes, such as new departments or adjustments in data management policies.  Check in with each response team member to ensure their department understands its role and what they need to do during a data breach.  Set up a mock <strong>breach of data</strong> scenario so that your response team can practice trial runs. Practice a full scale rehearsal annually so the plan is fully vetted and any adjustments can be made before an event occurs.</p>
<p>3) Double check your vendor contracts – Check that your contracts with your forensics firm, data breach resolution provider and other vendors are current and easily accessible.  Review your vendors and contracts and make sure they both still match your data protection and security needs.</p>
<p>4) Review notification guidelines – Verify that the data breach notification section of your response plan reflects the latest state legislation and that your notification letter templates address any new laws.  Ensureyour contact list of attorneys, government agencies and media is updated so you can easily notify them after a breach.  For medical data breaches, healthcare providers need to verify that Department of Health &amp; Human Services contacts are updated and their response team understands data breach information reporting procedures.</p>
<p>5) Check up on third parties that have access to your data &#8211; Evaluate how third parties are managing your data and if they are following your data protection rules.  Educate them on any new legislation that may affect you during a data breach.  Stress to third parties the importance of reporting a data breach to you immediately and what is expected in the resolution process. Healthcare companies need to meet HIPAA requirements and should check that business associate agreements (BAAs) are established.</p>
<p>6) Evaluate IT Security &#8211; Ensure proper data access controls are in place. Check that automated software and operating system updates for the entire company are installed properly. Verify that any automated security monitoring and reporting system is up to date and working.  Store backup copies of data securely.</p>
<p>7) Review staff security awareness – Verify that your staff is up to date on company policy regarding data security procedures, including what digital and paper documents to keep and how to securely discard what is not needed.  Train staffto identify signs of cyber security threats in their daily work life and know the proper course of action in reporting a breach.  Check that employees are keeping their work related laptops, mobile and digital devices secure at all times and remind them to change passwords every three months.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/&via=Experian_DBR&text=7 Things you should think about when you audit your response plan&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F&amp;title=7%20Things%20you%20should%20think%20about%20when%20you%20audit%20your%20response%20plan" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/#comments</comments>
		<pubDate>Wed, 07 Nov 2012 00:30:44 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1797</guid>
		<description><![CDATA[As Superstorm Sandy demonstrated to the East Coast during the last week of National Cyber Security Awareness Month; life happens so do you know where your data is? Data breach protection is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national cyber [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F07%2Fsuperstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/data-protection.jpg"><img class="aligncenter  wp-image-1798" title="data protection" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/data-protection.jpg" alt="" width="486" height="324" /></a></p>
<p>As Superstorm Sandy demonstrated to the East Coast during the last week of <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">National Cyber Security</a> Awareness Month; life happens so do you know where your data is?</p>
<p><a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/">Data breach protection</a> is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national <a href="http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/">cyber security</a> protection at an event in Washington.  During her speech, Napolitano spoke about how Sandy’s devastation left many financial institutions vulnerable to <a href="http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/">business data breaches</a><strong> </strong>due to lack of electricity and other utilities.  She also highlighted the exorbitant <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">costs of a data breach</a> which total billions of dollars annually and are generally paid for by consumers and companies.  From Washington to Wall Street, Superstorm Sandy was a forceful reminder the best thing businesses can do to mitigate natural disasters is to have a <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> plan in place to not only protect their business data but to ensure that their disaster recovery time is brief, enabling their business to return to functioning as quickly as possible.</p>
<p>In developing an IT disaster recovery plan, companies need to first address the potential threats to hardware and data caused by natural disasters. Earthquakes can destroy physical infrastructures and floods can prevent offices from being accessed for days until the water subsides, creating a need for long term <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">business data breach</a> protection.  And hurricanes such as Sandy create both problems, potentially destroying hardware and software.  Therefore, the most effective way a business can protect itself from a breach of data in the event of a natural disaster is to implement a strategy that combines <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">data protection solutions</a> with a disaster recovery plan.</p>
<p>Since IT systems are comprised of hardware, software, data and connectivity, without one component, business recovery will be halted.  An IT recovery plan needs to address how to deal with the loss of each of these parts.  First, every recovery strategy needs to create an inventory list of hardware, software applications and data.  Then there must be a plan as to how to replicate and reimage hardware if the hardware is destroyed.  Next, copies of software programs need to be accessible for re-installation with multiple copies kept in more than one place.  The final piece of a data recovery plan is to reclaim the actual data so it is crucial that all business data is constantly backed up and protected using data protection solutions that are reliable and accessible.  Companies then should periodically test their recovery plan to make sure that it works.</p>
<p>Recovering from a disaster is not all about technology; a company’s disaster recovery strategy needs resources such as people, processes and a plan.  However, if a company is well prepared and their recovery plan is well-executed, their disaster recovery time will be less and hopefully, less painful.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/&via=Experian_DBR&text=Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F07%2Fsuperstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature%2F&amp;title=Superstorm%20Sandy%E2%80%99s%20wake-up%20call%3A%20Is%20your%20data%20protected%20from%20Mother%20Nature%3F" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/07/superstorm-sandys-wake-up-call-is-your-data-protected-from-mother-nature/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Companies Beware: Cyber security escalates in importance</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/#comments</comments>
		<pubDate>Tue, 09 Oct 2012 17:35:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1660</guid>
		<description><![CDATA[How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F09%2Fcyber-security-escalates-in-importance%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,Data+Breach,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg"><img class="aligncenter  wp-image-1665" title="Communications connectivity" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg" alt="" width="448" height="335" /></a></p>
<p>How important is <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html ">cyber security</a>? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.</p>
<p>So important that a top U.S. cyber warrior is recommending that his cyber command division be elevated into a top-level military unit under the Department of Defense. The Cyber Command, created two years ago, is currently under the U.S. Strategic  Command, which is responsible for U.S. nuclear and space operations.</p>
<p>Rear Admiral Samuel Cox, the cyber command’s top intelligence officer, believes his unit needs more power to combat the growing number of cyber threats facing the nation, according to Reuters. Many of those threats come from foreign hackers who are trying to pierce the Pentagon’s computer networks to obtain highly-classified information.</p>
<p>But cyber attacks aren’t just a threat to the military. Look at the numerous banks that experienced online outages due to cyber attacks in the past few weeks. And what about the flurry of data breaches reported this year by healthcare organizations?</p>
<p>The fact is that no organization &#8211; large or small &#8211; is immune from cyber attacks, hackers or simply the loss of a portable device containing the personal identifying information of consumers. Every organization and &#8211; every individual for that matter &#8211; needs to take cyber security seriously. And what better time to check on your security measures than during <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html">National Cyber Security Awareness Month</a>. So here’s a checklist to help you keep your data safe.</p>
<ul>
<li> Install the most up-to-date firewall, anti-spam and anti-virus software.</li>
<li>Establish policies for handling sensitive data, mobile devices and computers. Educate everyone from C-suite executives to employees to contractors and vendors.</li>
<li>Upload patches to fix any problems with your software programs.</li>
<li>Use passwords on laptops, computers and mobile devices. Educate employees and contractors on the importance of using long, strong passwords.</li>
<li>Encrypt laptops and mobile devices. Also encrypt sensitive files.</li>
<li>Back up sensitive files and properly dispose of files you no longer need. Store backup data in a separate location &#8211; ideally off-site &#8211; from your main servers. To dispose of sensitive data, you should physically destroy the hard drive that contains the data. Otherwise, someone may be able to retrieve that data if the computer is sold or donated.</li>
</ul>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_100912_article_CTA">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/&via=Experian_DBR&text=Companies Beware: Cyber security escalates in importance&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Congress fails to reach agreement on cybersecurity legislation</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/#comments</comments>
		<pubDate>Wed, 05 Sep 2012 19:23:58 +0000</pubDate>
		<dc:creator>zsmith</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity legislation]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1579</guid>
		<description><![CDATA[  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess. After several revisions, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F05%2Fcongress-fails-to-reach-agreement-on-cybersecurity-legislation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+fraud,Cyber+Security,cybersecurity+legislation,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/cybersecurity-legislation.jpg"><img class="aligncenter size-full wp-image-1582" title="cybersecurity-legislation" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/cybersecurity-legislation.jpg" alt="" width="440" height="317" /></a></em></p>
<p><em></em> </p>
<p><em>Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. </em></p>
<p>Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning for August recess.</p>
<p>After several revisions, the Senate began debate on the Cybersecurity Act of 2012 during the last week of July.  The bill would have created a National Cybersecurity Council to develop best practices for industries designated as “critical infrastructure.”  These industries might include utilities, pipelines and financial service companies.  In addition, the legislation would have encouraged the establishment of voluntary data exchanges to allow government agencies and private companies to share cyber threat information.</p>
<p>Disagreements arose between over the level of authority that the proposal would provide the Federal government to establish new cybersecurity standards for certain entities that it deemed to be “critical infrastructure.”  A majority of Senate Republicans voiced support for alternative legislation that would make the participation by private entities completely voluntary.</p>
<p>There were also attempts to establish a new law for a national data breach notification standard.  However, the Senate could not reach agreement on specific provisions of a preemptive program. </p>
<p>There is a possibility that the Senate could revisit cybersecurity legislation when it returns for a brief work period in September or during the lame duck session after the election.  However, unless there are significant changes made to the bill so that it is palatable to a significant majority in the Senate, it is highly unlikely that legislation will be passed and signed into law this year.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/&via=Experian_DBR&text=Congress fails to reach agreement on cybersecurity legislation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F05%2Fcongress-fails-to-reach-agreement-on-cybersecurity-legislation%2F&amp;title=Congress%20fails%20to%20reach%20agreement%20on%20cybersecurity%20legislation" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/05/congress-fails-to-reach-agreement-on-cybersecurity-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber insurance: the risk-reduction remedy some companies want and need</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/#comments</comments>
		<pubDate>Tue, 10 Jul 2012 17:54:02 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1422</guid>
		<description><![CDATA[  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg"><img class="aligncenter size-full wp-image-1436" title="Cyber-Liability-Insurance" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/Cyber-Liability-Insurance.jpg" alt="" width="474" height="298" /></a></p>
<p>Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: <em>cyber insurance coverage</em>.</p>
<p>As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, where<a title="protecting-high-risk-information-in-ehrs" href="http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/"> protecting high-risk information in EHRs </a>(electronic health records) is among the top priorities. </p>
<p><strong>Why cyber insurance?<br />
</strong>For most, the goal of adding cyber insurance is to mitigate <a title="five-trends-on-security-threats" href="http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/">threats</a>, liabilities and costs sustained from (what else?) “cyber incidents” – a broad term covering an ever-growing range of mishaps and misuse, from hacked accounts and stolen credentials to pilfered laptops and wayward thumb drives.  </p>
<p>Given the frequency and severity of recent breaches, and the financial fallout that invariably results, who can blame companies for wanting an extra layer of protection?</p>
<p>Certainly not attorneys Theodore J. Kobus III and Kimberly M. Wong, data security experts and co-authors of a new paper entitled <a title="cyber-insurance-breach-response-plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-breach-response-plan.jsp"><span style="text-decoration: underline;">“Risk Management: Cyber Insurance &amp; Your Data Response Plan.”</span> </a>In fact, Kobus and Wong strongly suggest that, depending on budget, exposure profile and potential loss scenarios, cyber insurance may be a risk-reduction remedy that businesses sorely need.</p>
<p><strong>Surprisingly customizable coverage<br />
</strong>Companies seeking first-party cyber insurance coverage have a surprisingly diverse range of choices, say the authors, including protection against losses stemming from: data destruction and theft, extortion and hacking, and revenue lost from network intrusion or interruption.</p>
<p>Notification expenses, such as printing, mailing, credit monitoring and call center support may be included in a policy, along with third-party cyber liability coverage for vendors and partners.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_071012_article ">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<p><strong>Procuring the proper policy</strong><br />
The paper also includes suggestions for working with your broker, including:  </p>
<ol>
<li><strong>Determine</strong> what coverage you have under current general commercial liability or professional liability policies.  Identify potential gaps and opportunities to increase long-term protection.</li>
<li><strong>Assess</strong> your current level of exposure and types of cyber incidents that pose the biggest threats.</li>
<li><strong>Inventory</strong> the nature and location of all sensitive data. Is it stored in areas that are vulnerable to physical or digital theft? Knowing this will inform cyber coverage decisions.</li>
<li><strong>Step through</strong> potential employee/non-employee loss scenarios, such as: hacking, theft of data or computer equipment and unauthorized publication of information online.</li>
</ol>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/&via=Experian_DBR&text=Cyber insurance: the risk-reduction remedy some companies want and need&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F10%2Fcyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need%2F&amp;title=Cyber%20insurance%3A%20the%20risk-reduction%20remedy%20some%20companies%20want%20and%20need" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/10/cyber-insurance-the-risk-reduction-remedy-some-companies-want-and-need/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Password management</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/#comments</comments>
		<pubDate>Tue, 19 Jun 2012 17:21:47 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[password security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1354</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,password+security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg"><img class="aligncenter size-full wp-image-1357" title="Password Management" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg" alt="" width="461" height="461" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p><em>The</em> rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect those accounts.  I personally have accounts (and passwords) for sites I no longer even remember.  And while I have more accounts than most due to my profession, my hunch is that many people deal with the issue of password overload.  Password overload is when you attempt to use your Pinterest, Twitter, work email and university login passwords (one after another) to get into your Money Market Account only to be locked out.  Now you have to go into the branch with photo ID, or endure the dreaded “customer service hotline” (not-line) to prove that “you are you.”  I expect that you have experienced such “password overload” inconveniences, or you almost certainly know someone who has.</p>
<p>The problem seems like it could be easily solved by using the same password for everything.  One password to remember, and no more jumbling through your notebook trying to find what password you used for your newest account creation or Facebook app.  The problem with this approach is that if you are using the same <a title="passwords-that-wont-crack" href="http://blog.protectmyid.com/2012/05/30/passwords-that-wont-crack-under-pressure/" class="broken_link" rel="nofollow">passwords</a> for all (or even several) of your accounts, then if someone manages to get the password for say, your Instagram account, they would probably be able to then drain your savings account, phish your family for personal information (such as your Social Security Number), or rack up a warrant in your name for writing bad checks….  This could all happen because you logged into Facebook at an unsecured Wi-fi location, where your password for that one <a title="state-of-identity-theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">account is compromised</a>, and it happens to be the same password you use for multiple accounts.</p>
<p>So, what do you do if you don’t want to tattoo 25 passwords on your arm and you don’t want to end up cuffed for felony check fraud? The answer is a password manager.  This new service was created so that users can remember just one password, yet have access to all other passwords. The best part is that you can have access to these passwords from anywhere as most of the new password managers are internet based. As the need for password management increases, the options consumers have grown leaving even the strictest cybersecurity aficionado pleased with the service. </p>
<p>A few things you should look for when finding a password manager are:</p>
<ol>
<li>Is it cross platform? Will it work on your iPhone and your PC?</li>
<li>How is the information (your passwords) encrypted?</li>
<li>Does the service sync automatically, or will the user need to update the password storage database every time they sign up for a new account?</li>
<li>What is the initial authentication process and how strong is it?</li>
<li>How reputable is the company who created the product and what is reported about the product itself?</li>
</ol>
<p>By asking yourself these questions you should be on your way to making sure that your passwords are protected and you won’t lose your mind trying to keep track of them all. Just make sure you protect your login credentials for your password manager…. like <strong>really, really well</strong>&#8230;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/19/password-management/&via=Experian_DBR&text=Password management&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F&amp;title=Password%20management" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Share National Internet Safety Month with every employee</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/#comments</comments>
		<pubDate>Tue, 12 Jun 2012 15:50:14 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1340</guid>
		<description><![CDATA[Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of organizations had experienced at least one [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Cyber+Security,Data+Breach,Data+Security,Fraud,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg"><img class="aligncenter size-full wp-image-1345" title="Man's hands on the keyboard of laptop" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg" alt="" width="425" height="282" /></a></p>
<p>Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business.</p>
<p>In a recent study, 78% of organizations had experienced at least one data breach due to the actions of a careless or malicious employee.<sup>1</sup> It’s important to <a title="Your biggest data breach risk may be on your payroll" href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">educate and empower your employees </a>to do their part for data security, and that means being safe online.</p>
<p>Anyone who uses the Internet in your office needs to be mindful of Internet safety. Even if someone doesn’t handle sensitive data directly, his/her actions could infect your network with a virus that leads to data loss.</p>
<p>One of the obstacles to Internet safety is that cyber risk is so intangible it doesn’t seem like an immediate threat at all.  Cyber threats are oftentimes the opposite. A virus could slowly siphon data from your network for weeks, months or longer without anyone knowing.</p>
<p>Because cyber risk is often veiled, regular educational sessions with your employees are vital. Be sure they know and follow your Internet usage policy. Don’t have one in place? National Internet Safety Month is the perfect time to organize and implement your guidelines. You can find examples online to help shape your own policies.</p>
<p>Here are a few things to consider addressing:</p>
<p>Personal Internet Use<br />
Blocking employees from logging in and using their personal accounts at work isn’t just an issue of lost productivity. It’s also a security issue. Links, videos and attachments online and in emails can contain unseen threats, such as a virus or malware that undermines the security of your data. That could include your employees’ own personal data. Be sure they understand that the precautions are for their benefit as well as for the stability of the business and their jobs. You can use the honor system for off-limit sites or use software that blocks unsecure and other URLs.</p>
<p>Software Downloads<br />
Have your IT team handle all software downloads and ensure operating systems and software are updated regularly. Automatic updates implemented across the entire network at once help ensure there isn’t a weak link, an outdated computer, in your system. Again, you can use the honor system and ask employees not to install any software themselves or block them from doing so for added security. After all, accidents and human error do occur.</p>
<p>Email Dos and Don’ts<br />
Some employees handle a hundred or more emails a day. Considering the high volume and the ease of communicating by email, mistakes are bound to occur. Sensitive data sent to the wrong email address could be detrimental for your business and customers. Be sure your employees understand what type of data is and isn’t permissible to send by email. And that they don’t open any attachments, click on any links or respond to any requests for sensitive data if the source is not verified.</p>
<p>As part of your Internet usage policy and National Internet Safety Month, impart on your staff the importance of not only being mindful and careful but also sounding the alarm when anything goes wrong. The sooner you know about threats to your network, the sooner you can protect your data and business.</p>
<p>1 The Human Factor in Data Protection, Ponemon Institute (2012)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/&via=Experian_DBR&text=Share National Internet Safety Month with every employee&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F&amp;title=Share%20National%20Internet%20Safety%20Month%20with%20every%20employee" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The compliance risks of social media</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/#comments</comments>
		<pubDate>Tue, 29 May 2012 15:49:04 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1274</guid>
		<description><![CDATA[Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg"><img class="aligncenter size-full wp-image-1277" title="social_media" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg" alt="" width="381" height="315" /></a></p>
<p>Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory obligations using social media platforms. </p>
<p>According to the report, critical reliance on third parties for information collection and capture, rapidly rising social media content volume and fast-changing applications, and the difficulty of ensuring authentication all make it difficult for security professionals to keep up with the<a title="Create a social media policy to protect you and your employees" href="http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/"> legal and regulatory compliance </a>associated with social media.</p>
<p>The report suggested that security pros should look to financial services for guidance on social media risks, keeping in mind that retention obligations clearly apply to social media, retention obligations also apply to both corporate- and employee-owned mobile devices, and firms should monitor and provide ongoing training to employees.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_052912_article ">Download this free checklist</a> to learn what steps to take when it&#8217;s go-time for data breach response. </div></div>
<p>Above all, critical steps that security professionals must take in order to respond to the risks that social media poses include the following:</p>
<p>1.  Build effective policies governing social media usage in your enterprise.<br />
Your <a title="Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/">social media policy </a>should cover what your organization will and will not do online, what your employees can and cannot do, and what members of the public can and cannot do on your social media sites.</p>
<p>2.  Determine how tools that control social media fit into broader information governance.<br />
Look before you leap when it comes to adopting tools that help enforce social media controls and make sure they’ll integrate with your company’s existing systems.</p>
<p>3.  Incorporate flexibility and continuous monitoring in social media.<br />
Social media is constantly innovating end evolving &#8211; your organization will need to do so as well.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/&via=Experian_DBR&text=The compliance risks of social media&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F&amp;title=The%20compliance%20risks%20of%20social%20media" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>