Tag: data protection and security

Loading...
Stress, Apathy and Winning by Default: How Consumers R...

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks....

Read More Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters
Views on Consumer Reactions

to Data Breaches...

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions...

Read More Views on Consumer Reactions

to Data Breaches

3 Steps To Ease Your Cyber Security Spring Cleaning Ef...

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of...

Read More 3 Steps To Ease Your Cyber Security Spring Cleaning Efforts
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Advances in Cyber Insurance Risk Management Services H...

Written by: Rick Betterley, President, Betterley Risk Consultants Insurance against data loss has developed rapidly to protect organizations from the economic consequences of a data breach. Insurance companies have broadened their coverage to include not only the cost of notifying and monitoring affected persons, but also costs such as...

Read More Advances in Cyber Insurance Risk Management Services Help Protect Against Data Loss – But More Can Be Done
Reborn CISPA cyber security bill experiences déjà vu...

Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection Act (CISPA) was reintroduced to the House by its authors Reps. Mike Rogers and Dutch Ruppersberger, heads of the House...

Read More Reborn CISPA cyber security bill experiences déjà vu
Cyber Insurance Adds to Cyber Security...

The purpose of any type of insurance is to protect your most valuable assets so in order to combat the prevalence of cyber attacks and data breaches, an increasing number of businesses in the health-care, financial services and technology industries have purchased cyber insurance policies to protect themselves from...

Read More Cyber Insurance Adds to Cyber Security
Get up to speed on cyber insurance and breach response...

How does cyber insurance factor into data breach response? Get the answer – and many more insights – at the NetDiligence® 2013 Cyber Risk & Privacy Liability Forum on June 6-7 in Philadelphia. We’ll see you there! During the forum, be sure to visit Experian® to see everything we...

Read More Get up to speed on cyber insurance and breach response at the NetDiligence Forum in Philly
IAPP Panel Discusses BYOD and the “Technology Divorce”...

As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices?...

Read More IAPP Panel Discusses BYOD and the “Technology Divorce”
Controversial Cyber Security Bill Passes The House...

Despite President Obama’s January signing of an Executive Order (EO) which outlines national cyber security policies in protecting U.S. companies and government agencies against cyber threats, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) was passed in a 288-127 House vote sending it now to the Senate.¹ CISPA...

Read More Controversial Cyber Security Bill Passes The House
Cyber security: a key topic at 2013 HCCA Conference...

The 17th annual Health Care Compliance Association (HCCA) Compliance Institute Conference took place in National Harbor, MD and was attended by healthcare personnel and data protection and security professionals.  Key topics covered in various panels related to cyber security issues including medical identity theft, data breaches and patient health...

Read More Cyber security: a key topic at 2013 HCCA Conference
Secure your outsourcing practices to prevent data brea...

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once.  Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also...

Read More Secure your outsourcing practices to prevent data breaches