Stress, Apathy and Winning by Default: How Consumers Respond...

Data Policy

Jun 26 2014 by
Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants its notification letter to do, however, is make the recipients any more upset than they...

Read more ››

Views on Consumer Reactions

to Data Breaches...

Data Policy

Jun 09 2014 by
Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon report to Michael...

Read more ››

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts...

Data Policy

May 28 2014 by
No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time to review your cyber security measures. Of course, larger companies entrust their IT teams to take care of hardware and software, firewalls and...

Read more ››

Cyber Security Act of 2012 dies as an executive order is bor...

Data Policy

Jan 08 2013 by
The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department and other key federal agencies consider this cyber legislation critical to national security and DOD officials expressed...

Read more ››

‘Tis the season for data privacy...

Data Policy

Jan 24 2012 by
  It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all. OK, perhaps it isn’t exactly Christmas, but Data Privacy Day - observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be...

Read more ››

Avoiding holiday scams...

Data Policy

Dec 06 2011 by
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers. Here, according to McAfee, are 12 common holiday scams to beware of: 1. iPad scams.  Watch out for bogus offers for free iPads on...

Read more ››

Data breaches make the hospitality industry less hospitable...

Data Policy

Nov 16 2011 by
The tourism industry may be bouncing back from the worst of the recession, but occupancy, unfortunately, isn’t the only thing on the rise.  So are data breaches. According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies. Why are hackers...

Read more ››

Warning: Medical data breaches are on the rise...

Data Policy

Sep 07 2010 by
According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period...

Read more ››

Does your company have a wireless device data policy in plac...

Data Policy

Sep 07 2010 by
Smart phones and other wireless devices are increasingly popular among individual and business users with a 64% year over year market share growth, according to Canalys.  As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure. Earlier this year,...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets