<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; data breach prevention</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-breach-prevention/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Do your passwords pass the hack test?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/#comments</comments>
		<pubDate>Tue, 23 Aug 2011 15:41:26 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach prevention]]></category>
		<category><![CDATA[password]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=741</guid>
		<description><![CDATA[The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations.  These incidents have spotlighted the need for improved breach prevention measures.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F23%2Fdo-your-passwords-pass-the-hack-test%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+prevention,password&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/instory_security.jpg"><img class="aligncenter size-full wp-image-743" title="instory_security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/instory_security.jpg" alt="" width="363" height="336" /></a><br />
The steady drumbeat of recent data breaches has called significant <a href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">attention</a> to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations.  These incidents have spotlighted the need for improved <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">breach prevention measures</a>, from basic tools like <a href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">encryption</a> to loftier cyber goals such as <a href="http://www.nist.gov/nstic/identity-ecosystem.html" target="_blank" class="broken_link" rel="nofollow">identity ecosystems</a>, which would utilize new technologies, policies and standards to help protect and authenticate consumer transactions.</p>
<p>But sometimes lost amidst the heady discussion is the importance of the simple yet essential first line of security defense: passwords.  Too many people are <a rel="”nofollow” nofollow" href="http://www.huffingtonpost.com/2011/07/19/internet-risks-password-security_n_901979.html" target="_blank" class="broken_link">complacent</a> about this critical cyber-safety key, creating passwords that are weak and predictable, and then using those same or similar passwords for all of their online accounts.  Flimsy passwords are like an open invitation for hackers – no different than keeping the back door to your home wide open, especially in a time when the technology to crack passwords is becoming ever cheaper and more powerful.</p>
<p>The President himself was cyber-attacked when a <a rel="”nofollow” nofollow" href="http://www.dailymail.co.uk/news/article-1260488/Barack-Obamas-Twitter-password-revealed-French-hacker-arrested.html" target="_blank" class="broken_link">hacker</a> uncovered his Twitter account password as Bo, the name of his dog.  And since <a rel="”nofollow” nofollow" href="http://www.securityweek.com/study-reveals-75-percent-individuals-use-same-password-social-networking-and-email" target="_blank" class="broken_link">one study</a> revealed that 75 percent of people use identical passwords for their social media and email accounts, it isn’t a stretch to cause major damage once a hacker gains a foothold into your online identity.  This is especially true when it comes to your email password; hackers can select the “I forgot my password” button to have new passwords sent to your email address and then steal from all of your accounts.</p>
<p>Even companies that require their employees and customers to adhere to strict password requirements can’t protect themselves and their consumers when individuals fall back on predictable password patterns.  Indeed, most people just re-use their standard passwords and, when necessary, modify them slightly with capital first letters and a number or special character at the end.</p>
<p>“Qwerty,” “12345,” and “password” are among the <a rel="”nofollow” nofollow" href="http://www.smartplanet.com/blog/business-brains/top-20-most-common-passwords-of-all-time-revealed-8216123456-8216princess-8216qwerty/4519" target="_blank" class="broken_link">top 20</a> most common (and therefore worst) passwords, but the truth is that any word that can be found in the dictionary is a bad one for password use.  That’s because hackers specialize in sending out “bots” to harvest emails and possible password entry into the most common websites, and actual words and logical patterns are the lowest hanging password fruit.  Names, places, book, movie and song titles; dates in any format; words disguised with letter substitutions; keyboard sequences; and any real word at all – all of these are password don’ts.</p>
<p>At the most recent annual ShmooCon hacker conference, expert panelists weighed in on some key <a rel="”nofollow” nofollow" href="http://cybersecurityreport.nextgov.com/2011/01/tips_from_hackers_on_how_to_craft_passwords.php" target="_blank" class="broken_link">password pointers</a>:</p>
<ul>
<li>It’s best to create passwords unusual enough that you have to write down subtle cues to remember them, then keep the paper in your wallet.  You’re less likely to lose your wallet than get hacked.</li>
<li>Don’t re-use your passwords, or pretend you’re not re-using them by making small modifications.</li>
<li>Use longer passwords – they’re more difficult to hack.</li>
<li>People are lazy; getting employees to choose strong passwords might require regular password audits and institutional pressure.</li>
</ul>
<p><a rel="”nofollow” nofollow" href="http://macmost.com/online-password-security.html" target="_blank" class="broken_link">Other tips</a>:</p>
<ul>
<li>Third-party <a rel="”nofollow” nofollow" href="http://password-management-software-review.toptenreviews.com/" target="_blank" class="broken_link">password programs</a> can help you securely store passwords, although beware that even these companies <a rel="”nofollow” nofollow" href="http://www.gsnmagazine.com/node/23238" target="_blank" class="broken_link">aren’t immune</a> to security threats.</li>
<li>Only access secure “https” sites when using public WiFi connections.</li>
<li>After using a public computer, log out of your program, clean the cookies and cache, change your password and monitor your accounts closely.</li>
<li>Create your own security backup question, if possible “What is my back-up password?”  If you can’t create your own question, then lie about the standard question – for example, make up a string of random letters to the question, “What is your mother’s maiden name?”</li>
<li>One password idea: create a sentence, then take the first letter from each word to assemble a unique and hacker-unfriendly password.<span id="mce_marker"> </span></li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/&via=Experian_DBR&text=Do your passwords pass the hack test?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>As organized crime goes virtual, the law cyber-saddles up</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/#comments</comments>
		<pubDate>Tue, 26 Jul 2011 15:52:11 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data breach prevention]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[organized crime]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=688</guid>
		<description><![CDATA[Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F26%2Fas-organized-crime-goes-virtual-the-law-cyber-saddles-up%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,data+breach+prevention,FBI,NATO,organized+crime&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg"><img class="aligncenter size-full wp-image-691" title="cyber criminal" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg" alt="" width="448" height="282" /></a></em></p>
<p><em>Our guest blogger this week is</em><em> Tom Bowers, Managing Director, <a rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a> –</em> <em>a security architecture, data leakage prevention and global enterprise information consulting firm.</em></p>
<p>Back in the days of Prohibition, organized crime burst into the national consciousness with the “ka-pow” of a Tommy gun, capturing a sometimes romantic fascination that continues to this day.  The public face of organized crime may have morphed somewhat over the years, from Al Capone and Bugsy Siegal to Vito Corleone and Tony Soprano, but the mugshots have been generally similar and the contours of “the life” familiar.</p>
<p>With the advent of technology, however, organized crime has flocked to new outlaw opportunities that depart wildly from the old stomping grounds.  Today, cyber crime is the hot modern racket, with <a rel="”nofollow” nofollow" href="http://scamfraudalert.wordpress.com/2011/02/27/fbi-2010-cybercrime-statistics/" target="_blank" class="broken_link">offenses</a> ranging from the seemingly mundane (non-delivery of payment or merchandise top the list at 14.4% of all online crime), to the daring (scams impersonating the FBI, which come in second place at 13.2%), to the now well-known standbys (identity theft, rounding out third place at 9.8%).  At the center of the cyber crime explosion is organized crime, often formed into <a rel="”nofollow” nofollow" href="http://www.washingtonpost.com/wp-dyn/content/article/2009/04/15/AR2009041501196.html" target="_blank" class="broken_link">global gangs</a> (frequently based in Eastern Europe), ever more sophisticated, and comprising a new kind of operation that doesn’t look anything like the movies.</p>
<p>Indeed, cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.  The FBI gained headway &#8211; and large-scale arrests in the U.S. &#8211; with the hiring of more agents with computer science, business and operational analysis backgrounds, but cyber criminals responded by <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2010/03/24/us-technology-scareware-idUSTRE62N29T20100324" target="_blank" class="broken_link">outsourcing</a> their operations to countries with weak computer crime laws and law enforcement capabilities.  Investigations across borders were bogged down by legal proceedings, arrests and convictions were slow to materialize, and negative public outcry placed pressure on governments around the world.</p>
<p>But now the tide has changed.  The three-year-old <a rel="”nofollow” nofollow" href="http://www.impact-alliance.org/home/index.html" target="_blank" class="broken_link">International Multilateral Partnership Against Cyber Threats (IMPACT)</a> is the world’s first not-for-profit comprehensive global public-private partnership against cyber threats, bringing together academia, industry experts and governments from more than 120 partner countries.  The <a rel="”nofollow” nofollow" href="http://www.theregister.co.uk/2011/05/25/uk_ratifies_cybercrime_convention/" target="_blank" class="broken_link">Budapest Convention on Cybercrime</a>, an effort to synchronize national cyber security laws, has been joined by more than 30 different countries.  The European Union, U.S and NATO are working together to tackle cyber crime and have announced the formation of a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/211297/eu_us_and_nato_to_work_together_on_cyber_defense.html" target="_blank" class="broken_link">new cybercrime center</a>, to be operational by 2013.</p>
<p>As international agreements begin to take shape, global law enforcement benefits from common frameworks for cooperation.  Accordingly, countries are beginning to share enforcement officers, time and talent…and <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/235390/uk_claims_cybercrime_victory_after_phishing_gang_sentencing.html" target="_blank" class="broken_link">cyber crime arrests</a> are on the rise.  Clearly, a mobilized, globalized and flexible law enforcement response to cyber criminal activity – combined with <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">best practices</a> for data breach prevention – are the best ways to keep today’s mob offline and on the run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/&via=Experian_DBR&text=As organized crime goes virtual, the law cyber-saddles up&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>