<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Fraud</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>When it comes to data breach, hackers are not the biggest threat</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/#comments</comments>
		<pubDate>Thu, 27 Dec 2012 17:54:38 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1911</guid>
		<description><![CDATA[Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches from January 2009 to May 2012 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F27%2Fwhen-it-comes-to-data-breach-hackers-are-not-the-biggest-threat%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Fraud,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/human-error-data-breach.jpg"><img class="aligncenter size-full wp-image-1914" title="human-error-data-breach" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/human-error-data-breach.jpg" alt="" width="460" height="276" /></a></p>
<p>Human errors are the most common threats to exposing a person’s personal information to <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/">data breaches</a> according to <a href="http://www.rapid7.com/docs/Data-Breach-Report.pdf" target="_blank" class="broken_link" rel="nofollow">an analysis</a> of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the <a href="http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/">data breach information</a> for the report based on the number of reported public information data breaches from January 2009 to May 2012 in the <a href="https://www.privacyrights.org/data-breach" target="_blank" class="broken_link" rel="nofollow">Chronology of Data Breaches</a> maintained by the Privacy Rights Clearinghouse, a nonprofit privacy advocacy group.</p>
<p>The <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach statistics</a> from the report totaled 268 incidents affecting 94 million people.  The biggest factor responsible for the largest number of <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">breaches of data</a> was unintended disclosure due to negligence and clerical errors. 78 incidents led to exposing almost 12 million records of private information.  The next highest number was 51 incidents due to the loss of a portable data storage device which resulted in breaching almost 82 million personal records.  Hacking was low on the list, adding up to 40 incidents exposing about 1 million records.   </p>
<p>What can be done about this alarming problem?</p>
<p>Security experts advise implementing nationally mandated <a href="http://www.experian.com/business-services/risk-management.html">data breach protection</a> protocols and developing effective breach response programs in conjunction with <a href="http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/">cyber security</a> training for employees who handle sensitive public data.  Employing technology such as encryption is another method to counter human error since it is inexpensive, simple to administer and highly effective in protecting data.  Using management software that can track and monitor which devices are being used, monitor downloaded data and has the ability to remotely wipe the memories of lost or stolen devices is another data protection tool.</p>
<p>Some experts even go so far as to suggest that all these initiatives need to be backed by a law that punishes workers who fail to follow these protocols with either firing them from their jobs or jail time, depending on the severity of the data breach.  The bottom line is that protecting the public’s most private information is serious business and those who are entrusted with such sensitive information need to recognize that they have a responsibility to protect the public’s privacy.  And in turn, it’s a responsibility that we, the people must ensure that they take seriously.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/&via=Experian_DBR&text=When it comes to data breach, hackers are not the biggest threat&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F27%2Fwhen-it-comes-to-data-breach-hackers-are-not-the-biggest-threat%2F&amp;title=When%20it%20comes%20to%20data%20breach%2C%20hackers%20are%20not%20the%20biggest%20threat" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/27/when-it-comes-to-data-breach-hackers-are-not-the-biggest-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What does increased enforcement mean to you?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/#comments</comments>
		<pubDate>Tue, 18 Sep 2012 17:33:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1618</guid>
		<description><![CDATA[&#160; Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Compliance,Fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg"><img class="aligncenter  wp-image-1627" title="Healthcare costs" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg" alt="" width="458" height="305" /></a></p>
<p>Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage.</p>
<p>The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance plans. These tools include technology that’s being used to spot fraud and suspicious activity before any claims are paid.</p>
<p>The law is also creating partnerships between government agencies and private organizations that are working together to fight fraud and health care abuse. One of the more visible examples of this increased collaboration is the Health Care Fraud Prevention and Enforcement Action Team or “HEAT,” which is a joint effort between the U.S. Department of Health and Human Services and the Department of Justice. </p>
<p>So where do you fit into this battle against health care fraud? What defense counsel advice could you give your clients in this era of increased enforcement?</p>
<p>Join us at the Fraud &amp; Compliance Forum to find out. Experian will be one of the exhibitors at the conference, which will be held Sept. 30-0ct. 2, in Baltimore, MD. The forum is sponsored by the American Health Lawyers Association (AHLA) and the Health Care Compliance Association (HCCA).  It will feature speakers from the Inspector General’s Office, Department of Justice and Centers for Medicare and Medicaid Services, along with private practitioners.</p>
<p>In addition to discussing increased enforcement, there will also be sessions on some of the following topics:</p>
<ul>
<li>50 Shades of Gray: Strategies for hospital-physician alignment in the light of recent developments</li>
<li>CIAs: What enhanced Corporate Integrity Obligations tell us about OIG expectations for compliance programs</li>
<li>Compliance, criminal and civil liability for overpayments</li>
<li>Strategies for a medical necessity case</li>
<li>Exit strategies for voluntary disclosures</li>
</ul>
<p>For more information, call HCCA at 888-580-8373 or visit <a href="http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx" class="broken_link" rel="nofollow">http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/&via=Experian_DBR&text=What does increased enforcement mean to you?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F&amp;title=What%20does%20increased%20enforcement%20mean%20to%20you%3F" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>World-class scammers vie for Olympic gold</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 17:49:26 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1532</guid>
		<description><![CDATA[Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,Identity+Theft,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png"><img class="aligncenter  wp-image-1539" title="scammers vie for Olympic gold" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png" alt="" width="480" height="233" /></a></p>
<p>Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities.</p>
<p>One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets that are never delivered is another way unwary buyers are tricked into giving up personal and/or credit card information.</p>
<p><strong>Beware the cyber threats</strong></p>
<p>Acknowledging the widespread use of smartphones, tablets and similar devices to retrieve Games-related content, the UK’s national fraud reporting center, Action Fraud, cautions fans to browse wisely, warning that worms, viruses and other malware can penetrate mobile devices just as easily as PCs.</p>
<p>Top malware delivery threats listed on Action Fraud’s blog site include:</p>
<ul>
<li><strong>Search Engine Poisoning</strong> – The most prevalent form of malware delivery (40% of all malware infections), in which attackers link what appear to be legitimate search result “bait” pages to malware infected sites.</li>
<li><strong>Drive-by-Downloads</strong> – Technique that automatically downloads malware when devices interact with an infected website, email, pop-up ad or other apparently authentic Olympic content.</li>
<li><strong>Information Phishing</strong> – Disguised links from Facebook and Twitter abound this year. When clicked, infected links, in the shortened bit.ly/ format, for example, <a title="Data protection strategies to catch a phish" href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">can instantly extract, disable or destroy a device’s content or operating system.</a></li>
</ul>
<p><strong>Staying off the scammers’ scorecards</strong></p>
<p>A fraudster’s goal is to rip you off in record time and disappear into the shadows with their<br />
ill-gotten gains.  To avoid being victimized during the Olympics (or anytime) follow these common-sense rules for browsing and buying:</p>
<ul>
<li>Never click a link from someone you don’t know.</li>
<li>Avoid giving personal or credit card information to anyone whose identity and organization you can’t positively confirm.</li>
<li>For Olympics news or memorabilia, frequent only sites known to be credible and trustworthy, such as London2012.com.</li>
</ul>
<p>Such simple precautions can make for a winning Olympics experience, and help send the fakes, frauds and phonies home empty handed.</p>
<p>Have you or a friend encountered scammers during the Olympics? Take a minute to briefly share your story.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/&via=Experian_DBR&text=World-class scammers vie for Olympic gold&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F&amp;title=World-class%20scammers%20vie%20for%20Olympic%20gold" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A mobile test of human threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/#comments</comments>
		<pubDate>Tue, 17 Jul 2012 20:39:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1447</guid>
		<description><![CDATA[Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F17%2Fa-mobile-test-of-human-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,Fraud,hackers&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/mobile-threats.jpg"><img class="aligncenter size-full wp-image-1451" title="mobile threats" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/mobile-threats.jpg" alt="" width="402" height="330" /></a></p>
<p>Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down.</p>
<p>In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with fake corporate and personal information.  The phones included a tracking device so Symantec could monitor what happened once the devices were found.  The purpose of the test was to assess the human threats to a lost smartphone’s data and the connected corporate systems.  Specifically, Symatec set out to assess the following circumstances: </p>
<p>● Likelihood of a finder attempting to access data on the smartphone<br />
● Likelihood of a finder attempting to access corporate applications and data<br />
● Likelihood of a finder attempting to access personal applications and data<br />
● Likelihood of attempted access to particular types of apps<br />
● Amount of time before a lost smartphone is moved or accessed<br />
● Likelihood of a finder attempting to return a device to its owner<br />
 <br />
On every count, the results were a disappointment to anyone hoping for better from their fellow mankind.  Bottom line: if you lose your business-connected mobile device, there’s more than an 80% chance that an attempt will be made to breach corporate data and/or networks.  A total of 83% of the devices showed attempts to access corporate-related apps or data, and attempts to access a corporate email client occurred on 45% of the devices.  A file titled “HR Salaries” was accessed on 53% of the phones and another titled “HR Cases” was accessed on 40% of the devices.</p>
<p>The study underscored yet again that businesses must impress upon employees the importance of adhering to strict security guidelines regarding their mobile devices.  What does that look like?  Here are five key reminders:<br />
   <br />
1. Require that employees use <a title="Do passwords pass the hack test?" href="http://www.experian.com/blogs/data-breach/2011/08/23/do-your-passwords-pass-the-hack-test/">password protection </a>on all electronic devices especially if they use it to access work related files and email.<br />
2. Implement software that allows you to use remote wiping so a device can be killed if its lost or untraceable.<br />
3. Invest in employee <a title="Preparing for a data breach" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/">training and education </a>about <a title="Are you hiding after a data breach?" href="http://www.experian.com/blogs/data-breach/2012/01/31/947/">data breaches </a>and the impact it has not only on the business but also on the employees themselves since most people also program their personal information into business devices.<br />
4. Account for every device that has access to your company’s networks and take inventory often so nothing slips through the cracks or gets lost.<br />
5. Use business security software for all your electronic devices and implement a security management program. When a device is lost or stolen, have a recovery system in place so employees know what to do immediately in order to prevent any lost of data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/&via=Experian_DBR&text=A mobile test of human threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F17%2Fa-mobile-test-of-human-threats%2F&amp;title=A%20mobile%20test%20of%20human%20threats" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Share National Internet Safety Month with every employee</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/#comments</comments>
		<pubDate>Tue, 12 Jun 2012 15:50:14 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1340</guid>
		<description><![CDATA[Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of organizations had experienced at least one [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Cyber+Security,Data+Breach,Data+Security,Fraud,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg"><img class="aligncenter size-full wp-image-1345" title="Man's hands on the keyboard of laptop" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg" alt="" width="425" height="282" /></a></p>
<p>Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business.</p>
<p>In a recent study, 78% of organizations had experienced at least one data breach due to the actions of a careless or malicious employee.<sup>1</sup> It’s important to <a title="Your biggest data breach risk may be on your payroll" href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">educate and empower your employees </a>to do their part for data security, and that means being safe online.</p>
<p>Anyone who uses the Internet in your office needs to be mindful of Internet safety. Even if someone doesn’t handle sensitive data directly, his/her actions could infect your network with a virus that leads to data loss.</p>
<p>One of the obstacles to Internet safety is that cyber risk is so intangible it doesn’t seem like an immediate threat at all.  Cyber threats are oftentimes the opposite. A virus could slowly siphon data from your network for weeks, months or longer without anyone knowing.</p>
<p>Because cyber risk is often veiled, regular educational sessions with your employees are vital. Be sure they know and follow your Internet usage policy. Don’t have one in place? National Internet Safety Month is the perfect time to organize and implement your guidelines. You can find examples online to help shape your own policies.</p>
<p>Here are a few things to consider addressing:</p>
<p>Personal Internet Use<br />
Blocking employees from logging in and using their personal accounts at work isn’t just an issue of lost productivity. It’s also a security issue. Links, videos and attachments online and in emails can contain unseen threats, such as a virus or malware that undermines the security of your data. That could include your employees’ own personal data. Be sure they understand that the precautions are for their benefit as well as for the stability of the business and their jobs. You can use the honor system for off-limit sites or use software that blocks unsecure and other URLs.</p>
<p>Software Downloads<br />
Have your IT team handle all software downloads and ensure operating systems and software are updated regularly. Automatic updates implemented across the entire network at once help ensure there isn’t a weak link, an outdated computer, in your system. Again, you can use the honor system and ask employees not to install any software themselves or block them from doing so for added security. After all, accidents and human error do occur.</p>
<p>Email Dos and Don’ts<br />
Some employees handle a hundred or more emails a day. Considering the high volume and the ease of communicating by email, mistakes are bound to occur. Sensitive data sent to the wrong email address could be detrimental for your business and customers. Be sure your employees understand what type of data is and isn’t permissible to send by email. And that they don’t open any attachments, click on any links or respond to any requests for sensitive data if the source is not verified.</p>
<p>As part of your Internet usage policy and National Internet Safety Month, impart on your staff the importance of not only being mindful and careful but also sounding the alarm when anything goes wrong. The sooner you know about threats to your network, the sooner you can protect your data and business.</p>
<p>1 The Human Factor in Data Protection, Ponemon Institute (2012)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/&via=Experian_DBR&text=Share National Internet Safety Month with every employee&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F&amp;title=Share%20National%20Internet%20Safety%20Month%20with%20every%20employee" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ITRC report identifies top three data breach triggers</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/#comments</comments>
		<pubDate>Mon, 07 May 2012 23:20:31 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1201</guid>
		<description><![CDATA[For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F07%2Fitrc-report-identifies-top-three-data-breach-triggers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Fraud,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/Data-Breach31.jpg"><img class="aligncenter size-full wp-image-1210" title="Data-Breach Lock" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/Data-Breach31.jpg" alt="" width="428" height="265" /></a></p>
<p style="text-align: left;">For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft</a> <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Resource Center </a>(ITRC), the three primary causes of data breaches have remained the same since 2009:</p>
<ul>
<li>Hacking</li>
<li>Data on the move</li>
<li>Insider theft</li>
</ul>
<p>ITRC has been releasing an annual Breach Report since 2007. For the first time, hacking outpaced all other triggers to account for just more than a quarter of the 419 breaches in 2011. Incidents of hacking rose from 17.1% in 2010 and, the previous high, 19.5% in 2009 to 25.8% in 2011.</p>
<p>Data on the move* was the second highest trigger, accounting for 18.1% of the breaches in 2011. Insider theft, falling slightly from 2010, caused 13.4% of the breaches as the third trigger. ITRC further counts hacking and insider theft together as a malicious attack, adding up to nearly 40% of breaches in 2011.</p>
<p>The numbers make it clear that companies can’t rely on one form of data breach prevention alone. The 2011 Breach Report further illustrates that no company is immune. Of the entities reporting data breaches, 47% fell into the business category. Both business and educational entities experienced an upswing in data loss incidents in 2011.</p>
<p>The report also considers government/military, financial/credit and health/medical entities, the third of which accounted for 20.5% of the breaches in 2011.</p>
<p>Among the more alarming findings is that 61.6% of the reported breaches in 2011 exposed Social Security numbers (SSN), one of the most valuable pieces of personal data an individual has. Such exposure can leave a consumer vulnerable to identity theft indefinitely. Individuals can’t easily exchange their SSN for a new number like they can with credit or debit cards. (Loss of credit and debit card data was a factor in 26.5% of incidents in 2011.)</p>
<p>Drawing on what’s known about how breaches occur, companies can plan ahead to prevent and respond to incidents in order to protect themselves and the consumer data they use and collect. A comprehensive prevention and response plan should account for all of the various ways, including accidental exposure and subcontractor loss, that breaches occur.</p>
<p>Staying aware of vulnerabilities can only help companies strengthen their defense. Data breaches are here to stay, so there’s no time like the present to take prevention and preparation seriously.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Resolution Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_050712_article ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div>
<p>*“Data on the move” refers to data that has left its usual place of rest, i.e. its proper storage place. This includes data in transport to a new storage location as well as data that has left an office on an electronic drive, a mobile device or paper.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/&via=Experian_DBR&text=ITRC report identifies top three data breach triggers&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F07%2Fitrc-report-identifies-top-three-data-breach-triggers%2F&amp;title=ITRC%20report%20identifies%20top%20three%20data%20breach%20triggers" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What consumers should know about data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 16:36:27 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=854</guid>
		<description><![CDATA[It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F02%2Fwhat-consumers-should-know-about-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+fraud,Data+Breach,Data+Breach+Notification,data+breach+response,Fraud,Identity+Theft,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg"><img class="aligncenter size-full wp-image-856" title="lettermailbox" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg" alt="Notification Letter Mailbox" width="448" height="336" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.</p>
<p>Often times, there is a lot of speculation surrounding the company’s timing of the <a href="../2011/09/20/over-reporting-vs-under-reporting-data-breaches/">breach notification</a>.  The timing of notification may depend upon a variety of state laws, some of which may delay notification if law enforcement is doing an investigation of the incident and has requested a delay to make the investigation easier.  In most breach cases, the company will want to investigate internally prior to making public notice.  It is important to the consumer and the company that they provide a notice which is accurate.  No one is happy when a notice is made public, and then has to be changed as further information comes to light.  Everyone is better served when the company gets the information right the first time.</p>
<p>It is also important to understand the complexities which may surround various types of data breaches. Not all breaches are equal in the amount of risk posed to the consumer.  For instance, some pieces of information about you are generally available and public, and pose little risk to you taken alone, such as your email address, or first and last name.  Credit card numbers that are exposed are a risk, but not a long term problem, as the issuer will provide a new card with a different account number very quickly.</p>
<p>Additionally, malicious attacks on a company’s server, insider (employee) theft, or the theft of mobile devices (i.e. storage devices, laptops) may be more likely to lead to identity theft than accidental posting on a long-ago cached website or papers left behind in an old abandoned building.  Knowing whether or not the breach incident was malicious or accidental in nature may help you to put the level of risk into a better perspective.</p>
<p>Just remember, unless you know otherwise, the fact that your data was compromised does NOT mean you are an <a href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft</a> victim.  In fact, there have been millions of people notified that their information may have been breached who have not become identity theft victims. Your <a href="../../../data-breach/data-breach-resources.html">response</a> to the breach will depend on the type of information that was compromised.  Here are some steps you can take at this time:</p>
<p><strong>Financial Account Numbers: </strong></p>
<p>This includes checking accounts, credit cards, money market funds, stocks, and bank accounts:</p>
<ul>
<li>Close      ONLY the affected accounts and have account numbers changed.</li>
<li><a href="../2011/08/23/do-your-passwords-pass-the-hack-test/">Password</a>-protect      <strong>all </strong>your accounts, the new ones      as well as the closed.  This restricts      thieves from re-opening closed accounts.</li>
<li>Monitor      your account and billing statements closely</li>
<li>Report      any fraudulent activity immediately to the bank and law enforcement.</li>
</ul>
<p><strong>Social Security Numbers:<br />
</strong>Call the credit reporting agencies.  These are automated and secure systems.   Place a fraud alert with each agency and request a free copy of each of your credit reports.  It is free because your information was breached and you are a potential victim of identity theft.  Do this for any person whose Social Security Number (SSN) was compromised. If the SSN belongs to a child, you should find that there is <strong>no credit report </strong>available for that <a href="http://www.familysecure.com/default.aspx?sc=668285" class="broken_link" rel="nofollow">child</a>.  If there is a credit report for a child, it indicates that the child’s information may have been used. In that case, you need to get a copy of the credit report in order to repair the incorrect items.</p>
<p>It is also recommended that you call all three credit reporting agencies and not just one.  Check your report carefully for any irregularities.  Sometimes people see errors on the report that were on the report before the data breach occurred.</p>
<p>You can use, without charge, the annual credit reports system <a href="http://www.annualcreditreport.com/" class="broken_link" rel="nofollow">www.annualcreditreport.com</a> to monitor your credit report over the next year. Stagger them throughout the year by ordering one every four months.</p>
<p>Or, if you want real-time updates on your credit report, you may want to consider a paid service which monitors your credit report and alerts you immediately upon any change.</p>
<p><strong> </strong></p>
<p><strong>Other:</strong></p>
<ul>
<li>If your auto or medical insurance policy information is      involved, ask the company about their policy to protect compromised      policies.</li>
<li>If it is HR data that was compromised, change account numbers      for your 401-K, life insurance, and accounts holding your stock options.  Password-protect these accounts.</li>
<li>Driver’s License’s &#8211; contact your state Department/Bureau of      Motor Vehicles and notify them of the theft.  They most likely will not change your      number.</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/&via=Experian_DBR&text=What consumers should know about data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>8 insights into the underground fraud economy</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/#comments</comments>
		<pubDate>Tue, 24 May 2011 15:42:55 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[credit card theft]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Secret Service]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=575</guid>
		<description><![CDATA[These days, the fraud economy has matured to a point where it is run like a global marketplace, with specialists for every aspect of fraud – from identity thieves to the consumers of stolen identities.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F24%2F8-insights-into-the-underground-fraud-economy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=credit+card+theft,Fraud,Identity+Theft,Secret+Service&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/fraud.bmp"><img class="aligncenter size-full wp-image-577" title="fraud" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/fraud.bmp" alt="" /></a></p>
<p>Quick – conjure the image that comes to mind when you hear the term cybercriminal.</p>
<p>Perhaps an unkempt, lone operator working out of a boiler room late at night?</p>
<p>How about – more commonly these days – a sophisticated fraud businessman running a high-stakes organization with international teams of experts, raking in millions through his illegal tactics.</p>
<p>When <a rel="”nofollow” nofollow" href="http://www.scmagazineuk.com/tj-maxx-hacker-albert-gonzalez-sentenced-to-20-years-for-his-part-in-the-compromise-of-almost-100-million-credit-and-debit-cards/article/166615/" target="_blank" class="broken_link">Albert Gonzalez</a> was arrested for hacking into the networks of <a rel="”nofollow” nofollow" href="http://www.informationweek.com/news/security/showArticle.jhtml?articleID=198701100" target="_blank" class="broken_link">TJ Maxx</a>, Barnes and Nobles, and OfficeMax, amongst others, and stealing 45 million credit and debit card numbers, he had $1.65 million in cash, a crew of international <a rel="”nofollow” nofollow" href="http://www.afterdawn.com/news/article.cfm/2010/04/02/albert_gonzalez_accomplice_gets_seven_year_sentence" target="_blank" class="broken_link">co-conspirators</a>, and secret bank accounts across the world stuffed with millions more.  Gonzalez, who <a rel="”nofollow” nofollow" href="http://www.cnbc.com/id/40535839/" target="_blank" class="broken_link">formerly worked for the Secret Service</a> busting other cyber criminals, was later indicted for an even bigger, separate attack that compromised 140 stolen credit card numbers.</p>
<p>These days, the fraud economy has matured to a point where it is run like a global marketplace, with specialists for every aspect of fraud – from <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity thieves</a> to the <em>consumers</em> of stolen identities.  <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">Data theft</a> is only one part of what fuels this economy – the second and equally important aspect is the conversion of these thefts into cash, which is where the fraud economy connects illegal data traffickers with underground data buyers.</p>
<p><a rel="”nofollow” nofollow" href="http://www.firstdata.com/downloads/thought-leadership/fraudtrends2010_wp.pdf" target="_blank" class="broken_link">First Data’s report</a> on this topic offers a cheat sheet of the cheating way of life:</p>
<p>1.       According to a <a rel="”nofollow” nofollow" href="http://www.symantec.com/en/aa/business/resources/articles/article.jsp?aid=20090127_symc_provides_info_on_boming_underground_economy" target="_blank" class="broken_link">study from Symantec Corp</a>. which followed a year in the life of the underground economy, the value of the advertised goods on underground economy Web servers in a given year was more than $276 million</p>
<p>2.       The Symantec study found that the most popular item for sale, as well as the most requested for purchase, is credit card data, which are inexpensive to buy and have the potential for high profit</p>
<p>3.       The price for stolen credit card data ranges from 10 cents to $25 per card, with discounts offered for bulk purchases</p>
<p>4.       The average stolen credit card has a credit limit of $4,000</p>
<p>5.       The potential worth of all credit cards observed for sale during Symantec’s yearlong reporting period was estimated to be $5.3 billion</p>
<p>6.       Stolen financial account information is the second most popular item for sale in the underground economy, selling for $10 to $1,000 per account (with an average account balance of nearly $40,000)</p>
<p>7.       The potential value of all bank accounts advertised on underground economy servers during the reporting period was $1.7 billion</p>
<p>8.       <a rel="”nofollow” nofollow" href="https://www.infosecisland.com/blogview/3520-Meikle-FaaS-Fraud-as-a-Service.html" target="_blank" class="broken_link">Fraud as a Service (FaaS)</a> has evolved as an infrastructure that helps fraudsters operate efficiently, just as software as a service (SaaS) has evolved to help the online needs of businesses.  FaaS includes online Fraud Forums, which serve as web-based marketplaces for illegal goods and services</p>
<p>As ever-developing fraud techniques challenge the wits of security experts, it’s important to <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">understand as much as possible</a> about the underground fraud economy that orchestrates advanced methods to rob businesses and consumers as well as how to address these concerns.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/&via=Experian_DBR&text=8 insights into the underground fraud economy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ensuring compliance with new healthcare legislation</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/#comments</comments>
		<pubDate>Tue, 23 Nov 2010 16:45:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=216</guid>
		<description><![CDATA[Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This legislation comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  Medical fraud is estimated to cost the U.S. health care system $100 billion a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH,Identity+Theft+Resource+Center,Medical+Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This <span style="text-decoration: underline;"><a href="http://www.ofr.gov/inspection.aspx" target="_blank" class="broken_link" rel="nofollow">legislation</a></span> comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  <span style="text-decoration: underline;"><a href="http://money.cnn.com/2010/01/13/news/economy/health_care_fraud/" target="_blank" class="broken_link" rel="nofollow">Medical fraud</a></span> is estimated to cost the U.S. health care system $100 billion a year.</p>
<p>The <span style="text-decoration: underline;"><a href="http://www.usatoday.com/news/washington/2010-09-20-medicare-new-rules_N.htm?loc=interstitialskip" target="_blank" class="broken_link" rel="nofollow">new rules</a></span> will give federal health officials key powers to detect fraud early and prevent improper payments from being made.  For example, medical provider employees will be subject to fingerprinting, payments will be suspended to health organizations that are under investigation and medical programs will be required to stop using providers kicked out of Medicare or Medicaid programs.</p>
<p>These rules have serious implications for the health care industry that must also comply with stringent new HITECH rules. As I mentioned in a <span style="text-decoration: underline;"><a href="../2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/" target="_blank">previous blog</a></span> entry, some professionals feel the best way to comply with the new requirements is to be proactive.  For example, providers should consider actively working with their vendors to ensure all parties comply with the new standards.</p>
<p>Another recommendation is to conduct an internal risk assessment. A thorough assessment can identify where a business is not complying with the HITECH Act or HIPAA standards and provide an opportunity to make the right adjustments. Non-compliance can result in up to $1.5 million in fines or even civil action from a State Attorney General.</p>
<p>Learn more about <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank"><span style="text-decoration: underline;">risk assessments</span> </a>and act now before it’s too late.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/&via=Experian_DBR&text=Ensuring compliance with new healthcare legislation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F&amp;title=Ensuring%20compliance%20with%20new%20healthcare%20legislation" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>