When it comes to data breach, hackers are not the biggest th...

hackers

Dec 27 2012 by
Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches from January 2009 to May 2012 in the Chronology of Data Breaches maintained by the Privacy Rights...

Read more ››

Online holiday shopping is also big business for fraudsters...

hackers

Dec 18 2012 by
According to EMC's November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security measures in order to avoid illegal online activity.  Of the 1.4 billion dollars...

Read more ››

Report gives readers the latest inside(r) scoop...

hackers

Aug 14 2012 by
Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out of 25) users were filched and openly posted to a Russian hacker...

Read more ››

A mobile test of human threats...

hackers

Jul 17 2012 by
Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with fake corporate and personal information.  The phones included a...

Read more ››

ITRC report identifies top three data breach triggers...

hackers

May 07 2012 by
For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. For the first time, hacking outpaced all other triggers to account for just more than a quarter...

Read more ››

The data breach reporting landscape – part 1...

hackers

Feb 28 2012 by
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address some of the differences and provide some insight into our approach for...

Read more ››

Expanding the scope of security testing...

hackers

Feb 15 2012 by
Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of Security Constructs LLC, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.     Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration...

Read more ››

Five top trends in security threats...

hackers

Jan 31 2012 by
Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. Download Your Free Data Breach Response Guide! According to Symantec, here...

Read more ››

Resources for managing your enterprise security and privacy ...

hackers

Jan 03 2012 by
Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of Security Constructs LLC, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System. I've been actively involved in InfraGard for many years. InfraGard is a public/FBI partnership with a primary mission of protecting critical infrastructure.  Because of this partnership, I began to...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets