Tag: Cyber Security

Loading...
Final ruling for HIPAA/HITECH Act protects patients fr...

By now you are aware that the much anticipated final ruling from the Department of Health and Human Services (HHS) regarding regulations implementing the security, privacy, and data breach notification provisions of the HITECH Act were released on January 17, 2013.  The HHS’s hope in issuing this final rule...

Read More Final ruling for HIPAA/HITECH Act protects patients from data breaches
Learn how to accelerate your response to a breach...

Responding to a data breach quickly and accurately is the key to minimizing damage and steering clear of litigation and hefty fines. In our third “Answer Men” podcast, a global privacy attorney offers tips on how to accelerate your response to a data breach. Ozzie Fonseca, Experian’s Senior Director...

Read More Learn how to accelerate your response to a breach
Don’t Be a Stranger at IAPP. Stop by the Experian Boot...

Is the IAPP Global Privacy Summit in your future? Well, it’s in ours. Join the Experian Data Breach team on March 6-8, 2013 at booth #18/19 to gain valuable insight on how to accelerate your response to a data breach. In addition, we’ll be participating in two sessions –...

Read More Don’t Be a Stranger at IAPP. Stop by the Experian Booth.
Five Tips to Combat a Denial of Service Cyber Attack...

Who’s next? That’s a question probably lingering on the minds of many American banking executives these days. After all, eight U.S. banks were hammered by distributed denial of service (DDoS) cyber attacks in recent weeks and more could be in the works. A DDoS attack typically floods a website...

Read More Five Tips to Combat a Denial of Service Cyber Attack
Dramatic changes on horizon for healthcare breach noti...

Healthcare data breaches will be treated much differently under the new HIPAA Omnibus rule. But do you know how? Find out in the latest installment of our “Answer Men” podcast series. Answer man Bob Krenek, also known as Experian’s Senior Director of Data Breach Resolution, interviews healthcare attorney Paula...

Read More Dramatic changes on horizon for healthcare breach notifications
Want to learn how you can save millions? Tune into our...

Do you want to save millions – or in some cases – tens of millions of dollars? In the first of our new podcast series, Dr. Larry Ponemon, chairman of The Ponemon Institute, explains how.  Experian Data Breach Vice President Michael Bruemmer, one of our “Answer Men,” interviews Dr....

Read More Want to learn how you can save millions? Tune into our “Answer Men” podcast
Small to medium-sized businesses face a long recovery ...

Understanding why data breach preparedness is a priority is key. According to the latest Ponemon Institute Study, State of SMB Cyber Security Readiness: US Study, the road to recovery is long and hard for small to medium-sized businesses (SMBs) after a data breach.  Not only did the SMBs lose...

Read More Small to medium-sized businesses face a long recovery road after a data breach
Information Superiority can boost cybersecurity and pr...

In today’s data driven world, information is king so if you are not armed with the same information as your competitor or worse, experience a data breach, an information imbalance can occur that puts you at a disadvantage. In the public sector, an information imbalance is also known as...

Read More Information Superiority can boost cybersecurity and prevent data breaches
5th Annual HIMSS Survey reports progress in medical da...

The recently released 2012 Healthcare Information and Management Systems Society (HIMSS) Security Survey reports a notable increase in security measures undertaken by U.S.hospitals to protect their electronic records from data breaches.  However, their counterparts in healthcare, private physician practices have not been as diligent in implementing cyber security measures...

Read More 5th Annual HIMSS Survey reports progress in medical data protection and security
10,000 identity fraud rings discovered in the Southeas...

When people hear “identity fraud,” they usually conjure up images of a lone hacker furtively typing on a laptop.  However the reality is identity theft is largely committed by identity fraud rings composed of two or more criminals actively working together.  Currently in the U.S., there are more than...

Read More 10,000 identity fraud rings discovered in the Southeastern U.S.
Cyber Security Act of 2012 dies as an executive order ...

The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department...

Read More Cyber Security Act of 2012 dies as an executive order is born
Little progress made in the prevention of medical data...

Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been...

Read More Little progress made in the prevention of medical data breaches