<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Identity Theft Prevention</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/identity-theft-prevention/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Three tips for choosing a cloud provider</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/#comments</comments>
		<pubDate>Tue, 23 Oct 2012 23:44:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cloud provider]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1688</guid>
		<description><![CDATA[To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cloud+provider,data+privacy,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg"><img class="aligncenter  wp-image-1692" title="choosing-cloud-provider" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg" alt="" width="488" height="296" /></a></p>
<p>To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure <a href="http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/">cloud storage</a> really is.</p>
<p>Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when using a cloud provider:</p>
<p><strong>Look for robust authentication:</strong> If a cloud provider offers a one-step login, i.e. password-only security, that’s a red flag. If there’s just a single password standing between your sensitive data and hackers, how long until that password gets cracked? Or it could be accidentally or <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">maliciously shared</a> with the wrong person or written down on a piece of paper that’s later lost. The bottom line is, you need more than a password. Look for and use a cloud provider that has a robust login and authentication process. Yes, it takes longer every time you log in. But it also helps to keep hackers out. Be sure to change your passwords and other authentication data regularly. And remember that not everyone in your organization needs to know how to access the cloud.</p>
<p><strong>Take your time:</strong> It’s good to be cautious when you’re talking data storage, especially when it’s an outsourced service. So take your time choosing a cloud provider. Ask questions about what security measures are in place and how they are maintained. A dependable cloud provider should be able to answer all of your questions quickly. That likely means they know their service well and have anticipated your concerns. If you’re getting the runaround or don’t feel confident with the answers you’re receiving, look elsewhere. There’s not just one cloud in the sky.</p>
<p><strong>Sign on the dotted line:</strong> You’ve thoroughly vetted a cloud provider’s security and authentication measures and have determined you’ll actually have a higher level of security using the cloud than with internal, on-site storage. You’ve asked about risk management, documented policies, incident preparedness, encryption levels, employee training and all of your other concerns. You’ve conducted a thorough audit and you’re happy with what you’ve found. Then and only then enter into a service agreement with a cloud provider.</p>
<p>Just remember that any type of <a href="http://www.experian.com/data-breach/cyber-security.html">cyber security</a> is never foolproof and new threats constantly emerge in the cyber world. So keep up with what’s going on at your cloud provider and keep access to the cloud restricted only to individuals in your organization who really need it. If one of those individuals leaves your organization, change all of your cloud passwords and authentication data at once.</p>
<p>The fewer people who have access to your sensitive data – both inside and outside your organization – the more secure it is.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/&via=Experian_DBR&text=Three tips for choosing a cloud provider&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F&amp;title=Three%20tips%20for%20choosing%20a%20cloud%20provider" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Companies Beware: Cyber security escalates in importance</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/#comments</comments>
		<pubDate>Tue, 09 Oct 2012 17:35:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1660</guid>
		<description><![CDATA[How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F09%2Fcyber-security-escalates-in-importance%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,Data+Breach,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg"><img class="aligncenter  wp-image-1665" title="Communications connectivity" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg" alt="" width="448" height="335" /></a></p>
<p>How important is <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html ">cyber security</a>? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.</p>
<p>So important that a top U.S. cyber warrior is recommending that his cyber command division be elevated into a top-level military unit under the Department of Defense. The Cyber Command, created two years ago, is currently under the U.S. Strategic  Command, which is responsible for U.S. nuclear and space operations.</p>
<p>Rear Admiral Samuel Cox, the cyber command’s top intelligence officer, believes his unit needs more power to combat the growing number of cyber threats facing the nation, according to Reuters. Many of those threats come from foreign hackers who are trying to pierce the Pentagon’s computer networks to obtain highly-classified information.</p>
<p>But cyber attacks aren’t just a threat to the military. Look at the numerous banks that experienced online outages due to cyber attacks in the past few weeks. And what about the flurry of data breaches reported this year by healthcare organizations?</p>
<p>The fact is that no organization &#8211; large or small &#8211; is immune from cyber attacks, hackers or simply the loss of a portable device containing the personal identifying information of consumers. Every organization and &#8211; every individual for that matter &#8211; needs to take cyber security seriously. And what better time to check on your security measures than during <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html">National Cyber Security Awareness Month</a>. So here’s a checklist to help you keep your data safe.</p>
<ul>
<li> Install the most up-to-date firewall, anti-spam and anti-virus software.</li>
<li>Establish policies for handling sensitive data, mobile devices and computers. Educate everyone from C-suite executives to employees to contractors and vendors.</li>
<li>Upload patches to fix any problems with your software programs.</li>
<li>Use passwords on laptops, computers and mobile devices. Educate employees and contractors on the importance of using long, strong passwords.</li>
<li>Encrypt laptops and mobile devices. Also encrypt sensitive files.</li>
<li>Back up sensitive files and properly dispose of files you no longer need. Store backup data in a separate location &#8211; ideally off-site &#8211; from your main servers. To dispose of sensitive data, you should physically destroy the hard drive that contains the data. Otherwise, someone may be able to retrieve that data if the computer is sold or donated.</li>
</ul>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_100912_article_CTA">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/&via=Experian_DBR&text=Companies Beware: Cyber security escalates in importance&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three things you should never do to identity theft victims</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 18:16:31 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1555</guid>
		<description><![CDATA[Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg"><img class="aligncenter size-full wp-image-1558" title="Identity_Theft_Victim" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg" alt="" width="371" height="282" /></a></p>
<p>Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft.</p>
<p>In fact, 90% of the respondents in a <a title="Ponemon Institute: Third Annual Study on Medical Identity Theft " href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">recent study </a>knew the definition of medical identity theft this year, compared with 77% last year, according to the Ponemon Institute.</p>
<p>Awareness of the crime, along with its number of victims, is obviously rising. But interestingly, a majority of victims are either not sure what to do or don’t do anything about having their medical identities stolen. What about your organization? Does it know what to do?</p>
<p>Here are three things you should never do if your organization experiences a data breach that puts patients or consumers at risk of identity theft:</p>
<ul>
<li>Ignore the incident thinking no one will find out</li>
<li>Take one year or longer to notify potential victims. Or even worse, don’t notify them at all if you’re not required to do so by law.</li>
<li>Don’t offer any compensation or services to help potential victims</li>
</ul>
<p>So what should you do? Here’s what people expect when their medical records are lost or stolen.</p>
<p>1)      Reimbursement for the cost of finding another provider. If you’re a doctor, this may seem worse than it actually is, as most victims take no action. But if they do leave, reimbursing them is an act of goodwill that can only benefit your organization in the long run.</p>
<p>2)      <a title="Ponemon Institute: 2012 Consumer Study on Data Breach Notification " href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">To be notified of the loss </a>or theft within 30 days. It may behoove you to be honest and forthright. Some organizations maintained the loyalty of their patients by issuing a press release and developing a website dedicated to the breach.</p>
<p>3)      To be provided with free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity protection </a>for one year.</p>
<p>The best remedy for identity theft is to avoid it altogether by taking precautions to protect data and train your staff on security measures. But if you do experience a breach that leads to identity theft, the best thing you can do is help your victims. It’s not only the right thing to do, it’s also the best way to protect your brand and reputation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_082112_article">Download your free Data Breach Response Guide! </a></div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/&via=Experian_DBR&text=Three things you should never do to identity theft victims&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F&amp;title=Three%20things%20you%20should%20never%20do%20to%20identity%20theft%20victims" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Students and cyber defense</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/#comments</comments>
		<pubDate>Tue, 07 Feb 2012 21:41:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Student Identity Theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=957</guid>
		<description><![CDATA[This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F07%2Fstudents-and-cyber-defense%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Identity+Theft,Identity+Theft+Prevention,Student+Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg"><img class="aligncenter size-full wp-image-961" title="college-students-easy-target-for-identity-thieves-10092901" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg" alt="Identity thief reaching for student ID" width="425" height="282" /></a></p>
<p>&nbsp;</p>
<p>A great deal of data is collected on students of all ages.  Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive data such as social security numbers.  Unfortunately, school administrators don’t always protect this information as well as they should and education institutions are just as susceptible to data breaches as any other organization.</p>
<p>This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are <a title="Child Identity Theft Blog Article" href="http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/" target="_blank">51 times more likely</a> to suffer from identity theft than adults.</p>
<p>The Federal Trade Commission recently issued a <a title="FTC Website" rel="nofollow" href="http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt056.shtm" target="_blank" class="broken_link">release</a> alerting parents about how to protect students from fraudulent activity.  Of particular note is information about the federal <a title="Education Website" rel="nofollow" href="http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank" class="broken_link">Family Educational Rights Privacy Act </a>(FERPA), enforced by the U.S. Department of Education, which protects the privacy of student records and gives parents of school-age kids the right to opt out of sharing contact information with third parties, including other families.</p>
<p>The FTC’s safety tips for parents include:<br />
•	Read the notice schools must distribute that explains the rights of students and parents under FERPA.  This legislation protects the privacy of student education records and gives parents the right to inspect and review your child&#8217;s education records, consent to the disclosure of information in the records and correct errors in the records.<br />
•	Ask your child&#8217;s school about its directory information policy. Student directory information can include a child&#8217;s name, address, date of birth, telephone number, email address, and photo. FERPA requires schools to notify parents and guardians about their school directory policy and give them the right to opt out of the release of directory information to third parties. Absent opting out, directory information may be available not only to the people in a child&#8217;s class and school, but also to the general public.<br />
•	Take action if your child&#8217;s school experiences a data breach. If you believe there&#8217;s been a data breach and your child&#8217;s information has been compromised, contact the school to learn more. Talk with teachers, staff, or administrators about the incident and their practices. Keep a written record of your conversations. Write a letter to the appropriate administrator, and to the school board, if necessary. The U.S. Department of Education takes complaints about these incidents. Contact the Family Policy Compliance Office, U.S. Department of Education, 400 Maryland Ave., SW, Washington, DC 20202-5920, and keep a copy for your records.</p>
<p>Perhaps it’s no coincidence that as more attention is directed to the risks of identity theft amongst children, cyber defense is becoming a hot new field of study for students.  National cyber defense competitions have emerged as spirited forums for budding technical talent, including the <a title="National Security Agency" rel="nofollow" href="http://www.nsa.gov/public_info/press_room/2010/cyber_defense.shtml" target="_blank" class="broken_link">National Security Agency’s Cyber Defense Exercise</a> – a competition that pits students from a series of military academies against each other – and against the competition’s leaders at NSA; the Air Force Association’s National High School Cyber Defense Competition, <a title="CyberPatriot" rel="nofollow" href="http://www.uscyberpatriot.org/Pages/default.aspx" target="_blank" class="broken_link">CyberPatriot</a>, created to inspire high school students towards careers in cyber security and associated fields; and the <a rel="nofollow" href="http://www.nationalccdc.org/" target="_blank" class="broken_link">National Collegiate Cyber Defense Competition</a>, designed to provide practical experience for students in a fast-changing field that needs ever more talented workers.<br />
We can only hope that this new generation of cyber experts – borne from a time when new risks have posed threats to their own personal safety – can meet the growing challenges of cyber defense.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/&via=Experian_DBR&text=Students and cyber defense&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches don’t take a holiday at the arcade</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 08:00:45 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[credit card fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=894</guid>
		<description><![CDATA[A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F27%2Fdata-breaches-don%25e2%2580%2599t-take-a-holiday-at-the-arcade%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,credit+card+fraud,cyber+crime,data+privacy,Identity+Theft,Identity+Theft+Prevention&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg"><img class="aligncenter size-full wp-image-897" title="credit card changing hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/creditcardhands.jpg" alt="" width="539" height="362" /></a></p>
<p>A recent data breach <a rel="”nofollow” nofollow" href="http://www.computerworld.com/s/article/9219945/Vending_machine_company_announces_major_data_breach?taxonomyId=82" class="broken_link">discovery</a> serves as a reminder that even when you’re on vacation, cyber criminals never sleep.</p>
<p>Vacationland Vendors, a company that supplies vending machines and video games to entertainment venues, recently reported that an unknown intruder penetrated its point of sale systems, resulting in a data breach affecting approximately 40,000 customers at waterland resorts in Tennessee and Wisconsin.  Although credit card and debit information was apparently stolen between December 2008 and May 2011, Vacationland Vendors did not state how the breach was discovered or whether affected customers have been notified.  The company did issue a general recommendation to anyone who visited the affected resorts within the targeted time frame to remain vigilant for fraud activity on their bank and credit card statements and to consider adding a <a href="../../../data-breach/data-compromise.html" class="broken_link" rel="nofollow">fraud alert</a> with the major credit bureaus.</p>
<p>The Vacationland Vendors data breach highlights the continued vulnerabilities of point of sale technology to crafty cyber criminals.  <a href="../../../data-breach/wp-security-as-business-risk.html" class="broken_link" rel="nofollow">Heartland Payment Systems</a>, a leading payment processing company, discovered this several years ago when it was hit by a historically large breach that exposed the accounts of as many as 100 million cardholders.  The same kind of breach affected CardSystems Solutions when a breach exposed the accounts of 40 million debit and credit card holders, leading to the sale and ultimate closure of the company.  Indeed, the theft of credit card data is one of the most common forms of fraud and the very reason that the Payment Card Industry Data Security Standard strengthened its requirements of payment card device vendors last year.</p>
<p>The <a href="../2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/">debate</a> about how to best secure credit card transactions has continued this year with the burgeoning introduction of end to end encryption technologies that can better protect cardholder data throughout the entire transaction process.  An example of improved safety mechanisms in the POS process is newer chip and PIN technology, as evidenced by Visa’s recent <a rel="”nofollow” nofollow" href="http://usa.visa.com/download/merchants/bulletin-us-adopt-dynamic-authentication-080911.pdf" class="broken_link">announcement</a> that it is accelerating chip migration and adoption of mobile payments.</p>
<p>Until the technology around POS systems is more bulletproof, it’s especially important for companies to implement added <a href="../../../data-breach/data-breach-resources.html">safety measures</a> around its current credit card payment processes.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/&via=Experian_DBR&text=Data breaches don’t take a holiday at the arcade&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/27/data-breaches-don%e2%80%99t-take-a-holiday-at-the-arcade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding holiday scams</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/#comments</comments>
		<pubDate>Tue, 06 Dec 2011 17:24:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=872</guid>
		<description><![CDATA[With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F06%2Favoiding-holiday-scams%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,hackers,Identity+Theft+Prevention,PII,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg"><img class="size-full wp-image-873 aligncenter" title="holiday 1210_intro_390x220" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg" alt="" width="390" height="220" /></a></p>
<p>With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.</p>
<p>Here, according to <a rel="nofollow" href="http://blogs.mcafee.com/consumer/consumer-threat-alerts/holidays-are-high-time-for-cybercrime" target="_blank" class="broken_link">McAfee</a>, are 12 common holiday scams to beware of:</p>
<p><strong>1. </strong><strong>iPad scams</strong>.  Watch out for bogus offers for free iPads on social media sites and via spam.</p>
<p><strong> </strong></p>
<p><strong>2. </strong><strong>“Help! I’ve been robbed” scam. </strong>Fraudsters send emails appearing to come from the account of friends which state that they’ve been robbed while traveling abroad and need money to be wired in order to get home.</p>
<p><strong> </strong></p>
<p><strong>3. </strong><strong>Fake gift cards. </strong>With these scams, cybercriminals promise fake <a href="http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/" target="_blank">gift cards</a> in exchange for personal information that can be used for <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity theft</a>.</p>
<p><strong> </strong></p>
<p><strong>4. </strong><strong>Holiday</strong><strong> job offers. </strong>Fake, high-paying, work at home jobs are offered in exchange for <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a>.</p>
<p><strong> </strong></p>
<p><strong>5. </strong><strong>“Smishing.” </strong>Scammers “phish” via text message, or <a href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">smish</a>, often posing as a bank or online retailer requesting personal information to address a problem with a target’s account.</p>
<p><strong> </strong></p>
<p><strong>6. </strong><strong>Holiday</strong><strong> rental scams.</strong> Fake, attractive rental properties at low prices are advertised on phony websites in order to lure deposits via wire transfer.</p>
<p><strong> </strong></p>
<p><strong>7. </strong><strong>Recession scams</strong>.  Financial “help” is offered to targets in the form of pay-in-advance credit schemes and pre-qualified low-interest loans, all in exchange for an upfront processing free.</p>
<p><strong> </strong></p>
<p><strong>8. </strong><strong>Grinch-like Greetings. </strong>Fake e-cards are loaded with links to computer viruses and other malware.</p>
<p><strong> </strong></p>
<p><strong>9. </strong><strong>Low price traps. </strong>Auction sites and phony websites are used to offer too-good-to-be-true prices on holiday gifts; the scammers walk away with information and/or money.</p>
<p><strong> </strong></p>
<p>10.  <strong>Charity scams. </strong>Solicitations for phony charities play on the spirit of holiday giving and philanthropic generosity.</p>
<p><strong> </strong></p>
<p><strong>11. </strong><strong>Dodgy holiday downloads.</strong> Watch out for holiday-themed jingles, screensavers and animations distributed via downloads, spam or dubious websites – they could contain malware.</p>
<p><strong> </strong></p>
<p><strong>12. </strong><strong>Hotel and airport Wi-Fi. </strong>During this season of high travel, Wi-Fi hotspots are criminal hangouts, with scammers eager to hack into unprotected networks.</p>
<p><strong> </strong></p>
<p>This holiday season, make sure that you, your employees and your customers are on high alert for the seasonal scams that turn up with the regularity of fruitcake…and are just as unwanted.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/&via=Experian_DBR&text=Avoiding holiday scams&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches make the hospitality industry less hospitable</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/#comments</comments>
		<pubDate>Wed, 16 Nov 2011 18:00:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=867</guid>
		<description><![CDATA[According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies.
Why are hackers increasingly making themselves at home in the hospitality sector?  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F16%2Fdata-breaches-make-the-hospitality-industry-less-hospitable%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Data+Breach,data+breach+response,Data+Policy,Data+Security,Identity+Theft+Prevention,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg"><img class="aligncenter size-full wp-image-868" title="Travel destination" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg" alt="Palm trees over a clear blue ocean and white sand" width="557" height="417" /></a></p>
<p>The tourism industry may be bouncing back from the worst of the recession, but occupancy, unfortunately, isn’t the only thing on the rise.  So are <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank">data breaches</a>.</p>
<p>According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks &#8211; 38% &#8211; targeting hotels, reports and tour companies.</p>
<p>Why are <a href="http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/" target="_blank">hackers</a> increasingly making themselves at home in the hospitality sector?</p>
<p>According to <a title="Hotel News Now" rel="nofollow" href="http://www.hotelnewsnow.com/Articles.aspx/3329/Hotel-data-breaches-the-result-of-basic-failures-within-industry" target="_blank" class="broken_link">hospitality experts</a>, the reasons are multi-fold:</p>
<p>1.    Labor cutbacks.  Given the recessionary climate, hotels have reduced staff and are trying to do more with less.  While the lean and mean approach may help hospitality businesses bolster bottom lines, it hurts the industry’s front line defenses against hackers.</p>
<p>2.    Software and equipment reductions.  While hotels ride out the recession, security maintenance, implementation and upgrades fall lower in the priority checklist, creating an easy welcome mat for fraudsters.</p>
<p>3.    Multiple entry points.  Customers book hotels through hotel websites, online travel reservation portals, phone calls, email, postal mail, and in-person with concierges.  Each channel offers its own risks for <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> and must be individually addressed.</p>
<p>4.    Large access to <a href="http://www.experian.com/data-breach/data-breach-security.html" target="_blank">personal data</a>.  The hospitality industry keeps massive amounts of personal data on file for years and can sometimes lose track of what they have stored and where – all within databases that may be far less than bullet-proof.</p>
<p>5.    Guest room computers with flimsy protection.  Those networked desktops that hotels sometimes provide for guests can be so helpful…and harmful.  Often these computers are riddled with viruses or hiding bits and bytes of old customer data.</p>
<p>6.    Insecure cultures.  Even in the best of times, much of the hospitality industry simply doesn’t prioritize security as it should.  By creating business cultures that don’t sufficiently respect privacy, hotels are jeopardizing the trust of their customers.</p>
<p>Given that hackers have identified the hospitality sector as a soft target, what can hotels do to keep these unwanted guests out?  Here are some tips from industry watchdogs:</p>
<ol>
<li>Minimize data collection.  If you don’t need it, don’t collect it.</li>
<li>Understand and comply with PCI-DSS.  Make sure your business is completely aware of its “cardholder data environment” and is providing appropriate protections.</li>
<li>Find and digitally shred unneeded information.  Old, forgotten data is dangerous. Don’t be “data blind” – eliminate what you no longer need.</li>
<li>Simplify your reports.  For example, don’t offer up social security numbers if not needed.</li>
<li>Limit access.  Employees should be on a “need to know” basis with PCI and HR data.</li>
<li>Split up your network.  Create electronic firewalls that limit the spread of viruses and attacks.</li>
<li>Encrypt. Proper encryption renders hacked data unusable.</li>
<li>Understand your network.  Review network logs for unauthorized activity, and make sure your security professionals do, too.</li>
<li>Don’t put security in the ghetto.  Security isn’t just for IT professionals; make sure your entire organization creates and respects a culture of privacy that prioritizes security as the basis for all of its operations</li>
</ol>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/&via=Experian_DBR&text=Data breaches make the hospitality industry less hospitable&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>