Stress, Apathy and Winning by Default: How Consumers Respond...

data protection and security

Jun 26 2014 by
Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants its notification letter to do, however, is make the recipients any more upset than they...

Read more ››

Views on Consumer Reactions

to Data Breaches...

data protection and security

Jun 09 2014 by
Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions on the findings in the Ponemon report to Michael...

Read more ››

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts...

data protection and security

May 28 2014 by
No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time to review your cyber security measures. Of course, larger companies entrust their IT teams to take care of hardware and software, firewalls and...

Read more ››

Data Breach News for the First Quarter of 2014...

data protection and security

Apr 08 2014 by
With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches had been reported, according to the Identity Theft Resource Center, which tracks such statistics. Those breaches exposed more than 4.2 million records, the...

Read more ››

Advances in Cyber Insurance Risk Management Services Help Pr...

data protection and security

Jun 18 2013 by
Written by: Rick Betterley, President, Betterley Risk Consultants Insurance against data loss has developed rapidly to protect organizations from the economic consequences of a data breach. Insurance companies have broadened their coverage to include not only the cost of notifying and monitoring affected persons, but also costs such as crisis response, legal guidance, and forensics. But insurance isn't enough - Cyber...

Read more ››

Reborn CISPA cyber security bill experiences déjà vu...

data protection and security

Jun 12 2013 by
Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection Act (CISPA) was reintroduced to the House by its authors Reps. Mike Rogers and Dutch Ruppersberger, heads of the House Intelligence Committee. CISPA focuses on improving real time information sharing between the federal...

Read more ››

Cyber Insurance Adds to Cyber Security...

data protection and security

Jun 04 2013 by
The purpose of any type of insurance is to protect your most valuable assets so in order to combat the prevalence of cyber attacks and data breaches, an increasing number of businesses in the health-care, financial services and technology industries have purchased cyber insurance policies to protect themselves from the crippling cost of a data breach.  Cyber insurance is especially popular among start-up tech companies in...

Read more ››

Get up to speed on cyber insurance and breach response at th...

data protection and security

May 30 2013 by
How does cyber insurance factor into data breach response? Get the answer – and many more insights – at the NetDiligence® 2013 Cyber Risk & Privacy Liability Forum on June 6-7 in Philadelphia. We’ll see you there! During the forum, be sure to visit Experian® to see everything we can do for you during a breach or as part of your cyber insurance panel. Plus, enter to win an iPad mini! Our own Ozzie Fonseca will...

Read more ››

IAPP Panel Discusses BYOD and the “Technology Divorce”...

data protection and security

May 15 2013 by
As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices? This was the subject of mock debate held recently at the IAPP Global Privacy Summit. The debate,...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets