Posts Tagged ‘ Cyber Security ’
As data breaches have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished. Do these lawsuits have a common pattern? A recent draft research paper, Empirical Analysis of Data Breach Litigation, takes a look at federal data breach lawsuits to assess the common characteristics. The findings were illuminating: The odds [...][ READ MORE ]
Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.[ READ MORE ]
This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.[ READ MORE ]
Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. [ READ MORE ]
As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. [ READ MORE ]
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.[ READ MORE ]
A recent study by Trend Micro indicates data loss is a growing concern for small businesses. The 2010 Corporate End User Study found that close to 60% of business respondents feared that data loss would be the result of data-stealing malware or by intentional or unintentional data leaks outside the company network. Even though data [...][ READ MORE ]
Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children. Experts point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.[ READ MORE ]
A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee. However, the 2010 Verizon Data Breach Investigations report points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.[ READ MORE ]
As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure. [ READ MORE ]
The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.
Have you had a data breach? Call us on our Rapid Response Hotline: 1-866-751-1323 or Email: databreachinfo@experian.com
Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!