Posts Tagged ‘ Data Security ’
As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly. While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data [...][ READ MORE ]
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address [...][ READ MORE ]
Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach scams. According to a recent report [...][ READ MORE ]
Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.[ READ MORE ]
As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. [ READ MORE ]
Here’s a look at some of the resources I find useful in testing and training for a data breach.[ READ MORE ]
Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.[ READ MORE ]
The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. [ READ MORE ]
According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies. Why are hackers increasingly making themselves at home in the hospitality sector? [ READ MORE ]
A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.[ READ MORE ]
The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.
Have you had a data breach? Call us on our Rapid Response Hotline: 1-866-751-1323 or Email: databreachinfo@experian.com
Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!