<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; data privacy</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>7 Things you should think about when you audit your response plan</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 17:30:03 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1874</guid>
		<description><![CDATA[Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Breach+Notification,data+breach+response,data+privacy,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg"><img class="aligncenter  wp-image-1875" title="response-plan-checklist" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg" alt="" width="509" height="339" /></a></p>
<p>Now that your <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach</a> response plan is in place and you’re confident that your company is safeguarded from malicious <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/"> data breach</a> attempts, what can possibly be still the biggest threat to your <a href="http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/">data breach protection</a> plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing so it’s necessary to ensure that your response plan stays current and functional.</p>
<p>That is why it’s imperative that you regularly audit, test and update your plan on preferably, a quarterly basis.</p>
<p>Here are 7 checklist items to keep in mind when auditing your response plan:</p>
<p>1) Update your data breach response team contact list &#8211; Employees come and go therefore it’s important that the contact information for the members of your internal and external breach response team is current.  Make sure department heads are noted and once updated, re-distribute the list to the appropriate people.</p>
<p>2) Verify that your data breach response plan is comprehensive &#8211; Revise the plan to include any major company changes, such as new departments or adjustments in data management policies.  Check in with each response team member to ensure their department understands its role and what they need to do during a data breach.  Set up a mock <strong>breach of data</strong> scenario so that your response team can practice trial runs. Practice a full scale rehearsal annually so the plan is fully vetted and any adjustments can be made before an event occurs.</p>
<p>3) Double check your vendor contracts – Check that your contracts with your forensics firm, data breach resolution provider and other vendors are current and easily accessible.  Review your vendors and contracts and make sure they both still match your data protection and security needs.</p>
<p>4) Review notification guidelines – Verify that the data breach notification section of your response plan reflects the latest state legislation and that your notification letter templates address any new laws.  Ensureyour contact list of attorneys, government agencies and media is updated so you can easily notify them after a breach.  For medical data breaches, healthcare providers need to verify that Department of Health &amp; Human Services contacts are updated and their response team understands data breach information reporting procedures.</p>
<p>5) Check up on third parties that have access to your data &#8211; Evaluate how third parties are managing your data and if they are following your data protection rules.  Educate them on any new legislation that may affect you during a data breach.  Stress to third parties the importance of reporting a data breach to you immediately and what is expected in the resolution process. Healthcare companies need to meet HIPAA requirements and should check that business associate agreements (BAAs) are established.</p>
<p>6) Evaluate IT Security &#8211; Ensure proper data access controls are in place. Check that automated software and operating system updates for the entire company are installed properly. Verify that any automated security monitoring and reporting system is up to date and working.  Store backup copies of data securely.</p>
<p>7) Review staff security awareness – Verify that your staff is up to date on company policy regarding data security procedures, including what digital and paper documents to keep and how to securely discard what is not needed.  Train staffto identify signs of cyber security threats in their daily work life and know the proper course of action in reporting a breach.  Check that employees are keeping their work related laptops, mobile and digital devices secure at all times and remind them to change passwords every three months.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/&via=Experian_DBR&text=7 Things you should think about when you audit your response plan&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F&amp;title=7%20Things%20you%20should%20think%20about%20when%20you%20audit%20your%20response%20plan" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The next big cyber security threat: Your fingers</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/#comments</comments>
		<pubDate>Tue, 27 Nov 2012 19:43:27 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[typo-squatting]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1832</guid>
		<description><![CDATA[We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,data+privacy,Data+Security,typo-squatting&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg"><img class="aligncenter  wp-image-1836" title="typo-squatting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg" alt="" width="491" height="266" /></a></p>
<p>We’re all familiar with well-known causes of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data security breaches</a><strong> </strong>and<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity fraud</a>; phishing, malware attacks, and lack of <a href="http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/">cyber security</a><strong> </strong>protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of <a href="http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/">data breaches</a> is surprisingly, a person’s typing skills due to the fact that a simple typo can lead to typo-squatting also known as URL hijacking.</p>
<p>Typo-squatters count on accidental misspellings and typing errors of web addresses in a web browser’s address bar to get people to their page which can often be unscrupulous hacker sites designed to extract a person’s private information.  Typo-squatters buy up domains that are similar to popular domain addresses to lie in wait for web surfers to make typing mistakes which is now even more widespread with the popularity of touch screen devices.  For example, instead of typing dot-com, you mistakenly type dot-org and are transferred to an authentication or login page that asks you to input your account information and password before proceeding.  These pages are actually typo-squatted pages that were created to not only steal your information but they can also make you vulnerable to a computer virus or <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">identity theft</a>.  The most dangerous scenario is when a person uses the same user name and password for every website since a hacker then can access financial information such as banking and credit cards accounts using the stolen log-in information.  </p>
<p>Typo-squatters can also cause a <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">business data breach</a><strong> </strong>by<strong> </strong>creating<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/">doppelganger domains</a> for large companies that use subdomains for their various worldwide offices.  Business emails are intercepted when a user mistypes a recipient’s e-mail address.  Using a doppelganger domain, a hacker configures an email server to intercept any correspondence addressed to a person with that name.  Extra large companies with many subdomains are at the biggest risk since they have more employees with more email addresses which means more chances for typos.<strong></strong></p>
<p>A key way to practice <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data breach protection</a> in preventing typo-squatting is to use a search engine to find a website instead of directly typing in the web address especially if you are searching for a financial institution.  All the big search engines will have companies’ legitimate web addresses as well as <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">data protection and security</a><strong> </strong>software to<strong> </strong>scan for malware and prevent hacking.  Common sense is also another powerful tool to prevent a <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">breach of data;</a> if a site doesn’t look right, it probably isn’t so exit quickly and try again through a search engine.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/&via=Experian_DBR&text=The next big cyber security threat: Your fingers&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F&amp;title=The%20next%20big%20cyber%20security%20threat%3A%20Your%20fingers" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three tips for choosing a cloud provider</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/#comments</comments>
		<pubDate>Tue, 23 Oct 2012 23:44:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cloud provider]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1688</guid>
		<description><![CDATA[To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cloud+provider,data+privacy,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg"><img class="aligncenter  wp-image-1692" title="choosing-cloud-provider" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg" alt="" width="488" height="296" /></a></p>
<p>To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure <a href="http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/">cloud storage</a> really is.</p>
<p>Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when using a cloud provider:</p>
<p><strong>Look for robust authentication:</strong> If a cloud provider offers a one-step login, i.e. password-only security, that’s a red flag. If there’s just a single password standing between your sensitive data and hackers, how long until that password gets cracked? Or it could be accidentally or <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">maliciously shared</a> with the wrong person or written down on a piece of paper that’s later lost. The bottom line is, you need more than a password. Look for and use a cloud provider that has a robust login and authentication process. Yes, it takes longer every time you log in. But it also helps to keep hackers out. Be sure to change your passwords and other authentication data regularly. And remember that not everyone in your organization needs to know how to access the cloud.</p>
<p><strong>Take your time:</strong> It’s good to be cautious when you’re talking data storage, especially when it’s an outsourced service. So take your time choosing a cloud provider. Ask questions about what security measures are in place and how they are maintained. A dependable cloud provider should be able to answer all of your questions quickly. That likely means they know their service well and have anticipated your concerns. If you’re getting the runaround or don’t feel confident with the answers you’re receiving, look elsewhere. There’s not just one cloud in the sky.</p>
<p><strong>Sign on the dotted line:</strong> You’ve thoroughly vetted a cloud provider’s security and authentication measures and have determined you’ll actually have a higher level of security using the cloud than with internal, on-site storage. You’ve asked about risk management, documented policies, incident preparedness, encryption levels, employee training and all of your other concerns. You’ve conducted a thorough audit and you’re happy with what you’ve found. Then and only then enter into a service agreement with a cloud provider.</p>
<p>Just remember that any type of <a href="http://www.experian.com/data-breach/cyber-security.html">cyber security</a> is never foolproof and new threats constantly emerge in the cyber world. So keep up with what’s going on at your cloud provider and keep access to the cloud restricted only to individuals in your organization who really need it. If one of those individuals leaves your organization, change all of your cloud passwords and authentication data at once.</p>
<p>The fewer people who have access to your sensitive data – both inside and outside your organization – the more secure it is.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/&via=Experian_DBR&text=Three tips for choosing a cloud provider&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F&amp;title=Three%20tips%20for%20choosing%20a%20cloud%20provider" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How data breaches harm reputations</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/#comments</comments>
		<pubDate>Tue, 17 Jan 2012 17:17:28 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=919</guid>
		<description><![CDATA[The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F17%2Fhow-data-breaches-harm-reputations%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+response,data+privacy,Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Within the world of cyber security, a great deal of attention has been focused lately on the escalating hazards and frequency of data breaches, with considerable discussion on the <a title="Cyber crime gets costlier" href="http://www.experian.com/blogs/data-breach/2011/10/04/cyber-crime-gets-costlier/" target="_blank">high cost</a> of such breaches.  But as the industry has assessed the financial toll of breaches, it has never taken into account the impact breaches have on a company’s brand image and, consequently, its bottom line.</p>
<p>Until now.</p>
<p>A recently released <a title="Ponemon Institute Study " href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute study</a>, sponsored by <a title="Experian Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Experian’s Data Breach Resolution</a> and believed to be the first of its kind, explores the “Reputation Impact of a Data Breach” to provide more context for the full scope of data breaches.  The findings draw enlightening conclusions around the financial toll that data breaches wreak upon harmed corporate reputations, including these key takeaways:</p>
<p>Reputation is one of an organization’s most important and valuable assets.<br />
Reputation and brand image are perceived as very valuable…and highly vulnerable to negative events, including a data breach.</p>
<p>Calculating the value of reputation and brand reveals how valuable these assets are to an organization. The average value of brand and reputation for the study’s participating organizations was determined to be approximately $1.5 billion.  Depending upon the type of information lost as a result of the breach, the average loss in the value of the brand ranged from $184 million to more than $330 million. Depending upon the type of breach, the value of brand and reputation could decline as much as 17 percent to 31 percent.</p>
<p>Not all data breaches are equal. Some breaches are more devastating than others to an<br />
organization’s reputation and brand image, with the<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/" target="_blank"> loss or theft of customer information</a> ranked as the most devastating (followed by confidential financial business information and confidential non-financial business information).</p>
<p>Data breaches occur in most organizations represented in this study and have at least a moderate or a significant impact on reputation and brand image. According to 82 percent of respondents, their organizations had a data breach involving sensitive or confidential information.  Fifty-three percent say the data breaches had a moderate impact on reputation and brand image and 23 percent say it was significant.</p>
<p>Most organizations in the study have had a data breach involving the theft of sensitive or confidential business information. On average these types of breaches have occurred 2.9 times in surveyed organizations, with the theft or loss of confidential financial information having the most significant impact on reputation and brand.</p>
<p>Respondents strongly believe in understanding the root cause of the breach and<br />
protecting victims from identity theft. When asked what their organizations did following a<br />
breach to preserve or restore brand and reputation, the top three steps are: conduct investigations and forensics, work closely with law enforcement and protect those affected from potential harms such as identity theft.</p>
<p>The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Reputation Impact Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_011712_article ">Download the Ponemon Reputation Impact Study </a>to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/&via=Experian_DBR&text=How data breaches harm reputations&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Quick glance: data breach litigation &amp; legislation in 2012</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/#comments</comments>
		<pubDate>Tue, 10 Jan 2012 16:53:34 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=912</guid>
		<description><![CDATA[With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud resolution plans are strongly built to ward off malicious attacks and the complications that follow.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F10%2Fquick-glance-data-breach-litigation-legislation-in-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,breach+prevention,Data+Breach+Notification,data+breach+response,data+privacy,Federal+Trade+Commission,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>It was only a matter of time before a flood of class action lawsuits began to wash over breached companies. In general, these suits allege that a company: 1) did not adequately protect the sensitive data entrusted to it and 2) did not notify consumers of the breach in a timely enough manner. In 2011, after one of the biggest breaches of the year went public, it took just one day for the first class action lawsuit to be lodged.</p>
<p>The avalanche of recent breaches has been worrisome for consumers, causing lawyers, as well as lawmakers, to take note. Moving into 2012, businesses will want to carefully watch the changing landscape of litigation and legislation.<br />
Two recently submitted bills would require companies to inform affected customers, the <a title="Develop a data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/" target="_blank">Federal Trade Commission</a> and law authorities of a data loss within 48 hours of completing a breach assessment.</p>
<p>No matter the outcome of these bills, companies that delay making their breaches public will continue to face the consequences. In 2011, a large financial institution found itself in hot water after waiting weeks to notify customers of a breach. The controversial delay prompted a leading industry group representing the country’s largest financial institutions to testify before congress. The testimony suggested that banks should immediately notify federal officials and affected customers of a breach.</p>
<p>While the outcome of recent litigation remains to be seen, many lawyers expect these suits to inevitably increase in size – and rewards. To date, Internet privacy-related lawsuits have yet to yield the hefty settlements of securities fraud cases. Still, with the escalating breadth of data breaches, higher profile law firms, ones known for mounting successful security fraud litigation on behalf of shareholders, are getting involved.</p>
<p>The challenge for plaintiffs’ lawyers in security breach cases is not in proving liability but establishing damages. Judges must determine whether the compromise of personal data represents a loss of value or if there should be additional proof of tangible harm.</p>
<p>With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of <a title="Data breaches - to prepare or not to prepare?" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">prevention</a> is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your<a title="Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"> security practices and fraud resolution</a> plans are strongly built to ward off malicious attacks and the complications that follow.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/&via=Experian_DBR&text=Quick glance: data breach litigation & legislation in 2012&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Resources for managing your enterprise security and privacy risk in the new year</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/#comments</comments>
		<pubDate>Tue, 03 Jan 2012 08:00:57 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=901</guid>
		<description><![CDATA[Here’s a look at some of the resources I find useful in testing and training for a data breach.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F03%2Fresources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,data+privacy,Data+Security,hackers,National+Cyber+Security+Awareness+Month,PII,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg"><img class="aligncenter size-full wp-image-902" title="Data locked" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg" alt="" width="518" height="337" /></a></p>
<p><em>Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of <a title="Security Constructs" rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a>, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.</em></p>
<p>I&#8217;ve been actively involved in InfraGard for many years. InfraGard is a public/FBI partnership with a primary mission of protecting critical infrastructure.  Because of this partnership, I began to wonder if the U.S government had anything I could leverage in my own business operations. The answer is, “yes.”</p>
<p>I&#8217;ve used the guidelines from the National Institute of Standards and Technology (NIST) for many years as a basis for building information security programs around the world. While these are excellent building blocks, they don&#8217;t address my training needs in preparing for a cyber attack. So I also leverage resources from the Department of Homeland Security (DHS) and other agencies.</p>
<p>Here’s a look at some of the resources I find useful in testing and training for a data breach:</p>
<p><strong>NIST Computer Security Handling Guide </strong><br />
In the back of this document (special publication 800-61) are table-top exercises to help train your incident response team.<br />
While a bit limited in scope, they are an excellent starting point at no cost to you.</p>
<p><strong>DHS/FEMA Certified Cyber Security Training</strong><br />
The online Domestic Preparedness Campus is a portal for<br />
10 courses that address three demographics of your enterprise: Non-technical, Technical and Business Professional. While they are perhaps a bit broad and general at times, they are an excellent starting point for your enterprise.</p>
<p>The different courses include:</p>
<ul>
<li>Information Security for Everyone</li>
<li>Cyber Ethics</li>
<li>Cyber Law and White Collar Crime</li>
<li>Information Security Basics</li>
<li>Secure Software</li>
<li>Network Assurance</li>
<li>Digital Forensics Basics</li>
<li>Business Information Continuity</li>
<li>Information Risk Management</li>
<li>Cyber Incident Analysis and Response</li>
</ul>
<p><strong>Homeland Security Exercise and Evaluation Program </strong></p>
<p>This program from the DHS provides a standardized method of creating cyber security exercises. You work with a member of the DHS team to create and ultimately execute a testing program. My organization is currently setting up a tabletop exercise with DHS for all 23 of our organizational Information Security Officers next spring. For your company, I expect that the Training Exercises portion will prove the most valuable.</p>
<p>In total, they offer seven exercise types broken down into training and operational exercises.</p>
<p><em>Training Exercises</em><br />
1. Seminar &#8211; A seminar is an informal discussion designed to orient participants to new or updated plans, policies or procedures.<br />
2. Workshop &#8211; A workshop resembles a seminar but is employed to build specific products, such as a draft plan or policy.<br />
3. Tabletop Exercise (TTX) &#8211; A table top exercise involves key personnel discussing simulated scenarios in an informal setting.<br />
4. Games &#8211; A game is a simulation of operations that often involves two or more teams, usually in a competitive environment using rules, data and procedure designed to depict an actual or assumed real-life situation.</p>
<p><em>Operations-based Exercises </em><br />
5. Drill &#8211; A drill is a coordinated, supervised activity usually employed to test a specific operation or function within a single entity.<br />
6. Functional Exercise (FE) &#8211; A functional exercise examines and/or validates the coordination, command, and control between various multi-agency coordination centers. A functional exercise does not involve any &#8220;boots on the ground.&#8221;<br />
7. Full-Scale Exercises (FSE) &#8211; A full-scale exercise is a multi-agency, multi-jurisdictional, multi-discipline exercise involving functional and &#8220;boots on the ground&#8221; response.</p>
<p><em>Cyber Storm</em><br />
<a title="Cyber Storm" rel="”nofollow” nofollow" href="http://www.dhs.gov/files/training/gc_1204738275985.shtm" target="_blank" class="broken_link">Cyber Storm</a> is a biennial exercise that provides the framework for a government-sponsored cybersecurity exercise. It is a combination of international government agencies, national and state government agencies and private industry. Its stated aims are to:</p>
<ul>
<li> “Examine organizations’ capability to prepare for, protect from, and respond to cyber attacks’ potential effects</li>
<li>Exercise strategic decision making and interagency coordination of incident response(s) in accordance with national level policy and procedures</li>
<li>Validate information sharing relationships and communications paths for collecting and disseminating cyber incident situational awareness, response and recovery information</li>
<li>Examine means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests.”</li>
</ul>
<p>Cyber Storm III was used to hone and tune the latest U.S National Cyber Incident Response Plan released early in 2011. The 2010 exercise had 60 companies participating across many industry sectors.It also tested the newly formed National Cybersecurity and Communications Integration Center, which is the &#8220;boots on the ground&#8221; hub for national <a title="Cyber Security Facts" href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">cybersecurity</a> coordination.</p>
<p>Managing your enterprise security and <a title="Data Breach Resources" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">privacy</a> risk posture can be a daunting task at times. Hackers are more sophisticated and coordinated in their attacks. It’s pretty tough out there right now but new tools, processes and procedures will ultimately gain the upper hand. You are not alone. There are a wide range of resources freely available to help build the skill sets of our teams. I remain encouraged and look forward to the battle with new hope and fortitude.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/&via=Experian_DBR&text=Resources for managing your enterprise security and privacy risk in the new year&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches don’t take a holiday at the arcade</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 08:00:45 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[credit card fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=894</guid>
		<description><![CDATA[A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F27%2Fdata-breaches-don%25e2%2580%2599t-take-a-holiday-at-the-arcade%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,credit+card+fraud,cyber+crime,data+privacy,Identity+Theft,Identity+Theft+Prevention&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg"><img class="aligncenter size-full wp-image-897" title="credit card changing hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg" alt="" width="539" height="362" /></a></p>
<p>A recent data breach <a rel="”nofollow” nofollow" href="http://www.computerworld.com/s/article/9219945/Vending_machine_company_announces_major_data_breach?taxonomyId=82" class="broken_link">discovery</a> serves as a reminder that even when you’re on vacation, cyber criminals never sleep.</p>
<p>Vacationland Vendors, a company that supplies vending machines and video games to entertainment venues, recently reported that an unknown intruder penetrated its point of sale systems, resulting in a data breach affecting approximately 40,000 customers at waterland resorts in Tennessee and Wisconsin.  Although credit card and debit information was apparently stolen between December 2008 and May 2011, Vacationland Vendors did not state how the breach was discovered or whether affected customers have been notified.  The company did issue a general recommendation to anyone who visited the affected resorts within the targeted time frame to remain vigilant for fraud activity on their bank and credit card statements and to consider adding a <a href="../../../data-breach/data-compromise.html" class="broken_link" rel="nofollow">fraud alert</a> with the major credit bureaus.</p>
<p>The Vacationland Vendors data breach highlights the continued vulnerabilities of point of sale technology to crafty cyber criminals.  <a href="../../../data-breach/wp-security-as-business-risk.html" class="broken_link" rel="nofollow">Heartland Payment Systems</a>, a leading payment processing company, discovered this several years ago when it was hit by a historically large breach that exposed the accounts of as many as 100 million cardholders.  The same kind of breach affected CardSystems Solutions when a breach exposed the accounts of 40 million debit and credit card holders, leading to the sale and ultimate closure of the company.  Indeed, the theft of credit card data is one of the most common forms of fraud and the very reason that the Payment Card Industry Data Security Standard strengthened its requirements of payment card device vendors last year.</p>
<p>The <a href="../2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/">debate</a> about how to best secure credit card transactions has continued this year with the burgeoning introduction of end to end encryption technologies that can better protect cardholder data throughout the entire transaction process.  An example of improved safety mechanisms in the POS process is newer chip and PIN technology, as evidenced by Visa’s recent <a rel="”nofollow” nofollow" href="http://usa.visa.com/download/merchants/bulletin-us-adopt-dynamic-authentication-080911.pdf" class="broken_link">announcement</a> that it is accelerating chip migration and adoption of mobile payments.</p>
<p>Until the technology around POS systems is more bulletproof, it’s especially important for companies to implement added <a href="../../../data-breach/data-breach-resources.html">safety measures</a> around its current credit card payment processes.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/&via=Experian_DBR&text=Data breaches don’t take a holiday at the arcade&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding holiday scams</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/#comments</comments>
		<pubDate>Tue, 06 Dec 2011 17:24:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=872</guid>
		<description><![CDATA[With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F06%2Favoiding-holiday-scams%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,hackers,Identity+Theft+Prevention,PII,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg"><img class="size-full wp-image-873 aligncenter" title="holiday 1210_intro_390x220" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg" alt="" width="390" height="220" /></a></p>
<p>With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.</p>
<p>Here, according to <a rel="nofollow" href="http://blogs.mcafee.com/consumer/consumer-threat-alerts/holidays-are-high-time-for-cybercrime" target="_blank" class="broken_link">McAfee</a>, are 12 common holiday scams to beware of:</p>
<p><strong>1. </strong><strong>iPad scams</strong>.  Watch out for bogus offers for free iPads on social media sites and via spam.</p>
<p><strong> </strong></p>
<p><strong>2. </strong><strong>“Help! I’ve been robbed” scam. </strong>Fraudsters send emails appearing to come from the account of friends which state that they’ve been robbed while traveling abroad and need money to be wired in order to get home.</p>
<p><strong> </strong></p>
<p><strong>3. </strong><strong>Fake gift cards. </strong>With these scams, cybercriminals promise fake <a href="http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/" target="_blank">gift cards</a> in exchange for personal information that can be used for <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity theft</a>.</p>
<p><strong> </strong></p>
<p><strong>4. </strong><strong>Holiday</strong><strong> job offers. </strong>Fake, high-paying, work at home jobs are offered in exchange for <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a>.</p>
<p><strong> </strong></p>
<p><strong>5. </strong><strong>“Smishing.” </strong>Scammers “phish” via text message, or <a href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">smish</a>, often posing as a bank or online retailer requesting personal information to address a problem with a target’s account.</p>
<p><strong> </strong></p>
<p><strong>6. </strong><strong>Holiday</strong><strong> rental scams.</strong> Fake, attractive rental properties at low prices are advertised on phony websites in order to lure deposits via wire transfer.</p>
<p><strong> </strong></p>
<p><strong>7. </strong><strong>Recession scams</strong>.  Financial “help” is offered to targets in the form of pay-in-advance credit schemes and pre-qualified low-interest loans, all in exchange for an upfront processing free.</p>
<p><strong> </strong></p>
<p><strong>8. </strong><strong>Grinch-like Greetings. </strong>Fake e-cards are loaded with links to computer viruses and other malware.</p>
<p><strong> </strong></p>
<p><strong>9. </strong><strong>Low price traps. </strong>Auction sites and phony websites are used to offer too-good-to-be-true prices on holiday gifts; the scammers walk away with information and/or money.</p>
<p><strong> </strong></p>
<p>10.  <strong>Charity scams. </strong>Solicitations for phony charities play on the spirit of holiday giving and philanthropic generosity.</p>
<p><strong> </strong></p>
<p><strong>11. </strong><strong>Dodgy holiday downloads.</strong> Watch out for holiday-themed jingles, screensavers and animations distributed via downloads, spam or dubious websites – they could contain malware.</p>
<p><strong> </strong></p>
<p><strong>12. </strong><strong>Hotel and airport Wi-Fi. </strong>During this season of high travel, Wi-Fi hotspots are criminal hangouts, with scammers eager to hack into unprotected networks.</p>
<p><strong> </strong></p>
<p>This holiday season, make sure that you, your employees and your customers are on high alert for the seasonal scams that turn up with the regularity of fruitcake…and are just as unwanted.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/&via=Experian_DBR&text=Avoiding holiday scams&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>