Posts Tagged ‘ hackers ’
Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches from January 2009 to May 2012 [...][ READ MORE ]
According to EMC’s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists. If 2012 is anything like 2011, retailers will need to increase their data protection and security [...][ READ MORE ]
Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out of 25) users were filched and openly [...][ READ MORE ]
Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers. Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with [...][ READ MORE ]
For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. [...][ READ MORE ]
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address [...][ READ MORE ]
Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.[ READ MORE ]
Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. [ READ MORE ]
Here’s a look at some of the resources I find useful in testing and training for a data breach.[ READ MORE ]
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.[ READ MORE ]
The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.
Have you had a data breach? Call us on our Rapid Response Hotline: 1-866-751-1323 or Email: databreachinfo@experian.com
Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!