Views on Consumer Reactions

to Data Breaches...

data privacy

Jun 09 2014 by
Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon report to Michael...

Read more ››

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts...

data privacy

May 28 2014 by
No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time to review your cyber security measures. Of course, larger companies entrust their IT teams to take care of hardware and software, firewalls and...

Read more ››

Cyber Security Requires a Three-stage Approach to Data Breac...

data privacy

Jun 25 2013 by
Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource Center (ITRC). Perpetrated against companies large and small, these breaches compromised more than 4.6 million records. Research by the Ponemon Institute indicates the number of data breaches continues to grow, yet businesses...

Read more ››

Tips to save your reputation following a big data breach...

data privacy

Apr 23 2013 by
The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value to customers, or patients and make better decisions. But along with the rewards, comes risk.  Big data can result...

Read more ››

Secure your outsourcing practices to prevent data breaches...

data privacy

Apr 15 2013 by
Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once.  Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also found that the most common cause for breaches were negligence and lost or stolen devices. Despite the gravity of...

Read more ››

Data Privacy Day: A day to recognize data protection and sec...

data privacy

Jan 28 2013 by
Today’s digital world has enabled us to enjoy and take advantage of all that the internet and digital communications have to offer, however, in our progressively connected society, the benefits also come with risks. In the United States, identity theft is the largest type of consumer fraud affecting more than 11 million people annually*. Online data breaches and online identity theft are the two most popular forms of...

Read more ››

7 Things you should think about when you audit your response...

data privacy

Dec 13 2012 by
Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing...

Read more ››

The next big cyber security threat: Your fingers...

data privacy

Nov 27 2012 by
We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo can lead to typo-squatting also known as URL hijacking. Typo-squatters count on...

Read more ››

Three tips for choosing a cloud provider...

data privacy

Oct 23 2012 by
To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets