<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Identity Theft</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/identity-theft/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Online holiday shopping is also big business for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 18:47:08 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[online shopping]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1901</guid>
		<description><![CDATA[According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Cyber+Security,Data+Breach,Data+Security,Federal+Trade+Commission,hackers,Identity+Theft,online+shopping&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg"><img class="aligncenter  wp-image-1905" title="online-shopping" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg" alt="" width="476" height="316" /></a></p>
<p>According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> measures in order to avoid illegal online activity.  Of the 1.4 billion dollars spent in online sales during 2011’s holiday shopping season (November 1 to December 31), $82 million of those dollars were identified as fraudulent, resulting in a 219% increase from 2010.  Cyber Monday alone accounted for $2.5 million of online fraud.</p>
<p>Most web-based fraud activity is due to stolen credit cards and since <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is at an all time high, online merchants of all sizes need to implement fraud protection procedures and be proactive in watching for signs of unscrupulous activity.  Early detection is the key to stopping con artists who like to prey on new, inexperienced online businesses.  However, if they discover a merchant has implemented active data security procedures, fraudsters generally won’t waste their time and will most likely move on to their next victim.  The best way for businesses to protect themselves from fraud is to be diligent in watching out for signs of suspicious activity.  These include bulk orders for items that are not usually bought in bulk, orders for multiple high end items, international orders and several orders placed by the same person within a short time.  Con artists try to make as many purchases as possible before a fraud alert is sent to the real owner so they tend to order as much merchandise as they can.</p>
<p>Although it’s impossible to erase online credit card fraud, here are several strategies to reduce it:</p>
<ol start="1">
<li>Use an Address Verification Service (AVS) to make sure the billing address entered online matches the cardholder’s billing information. Institute a policy that merchandise will not ship unless the addresses match.</li>
<li>Always ask for the Card Verification Number (CVN) on all credit card orders. The number must be read from the actual card so more than likely the person has the card in his possession. Although it’s not a guarantee that he is its rightful owner, this step provides a small measure of protection.</li>
<li>Send a confirmation email or letter to customers when you send an item telling them their order has shipped and when they can expect it to appear on their bill. This can help flag any illegal activity and enable the customer to report credit fraud to the proper authorities before the perpetrator has a chance to do any further credit damage. It will also help businesses to reduce complaints and chargebacks from people who sometimes simply forget they placed an order.</li>
</ol>
<p>Retailers should keep in mind that once an order has been sent, it is very difficult to regain any loss so prevention is the number one way to combat online fraud.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/&via=Experian_DBR&text=Online holiday shopping is also big business for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F&amp;title=Online%20holiday%20shopping%20is%20also%20big%20business%20for%20fraudsters" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three things you should never do to identity theft victims</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 18:16:31 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1555</guid>
		<description><![CDATA[Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg"><img class="aligncenter size-full wp-image-1558" title="Identity_Theft_Victim" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg" alt="" width="371" height="282" /></a></p>
<p>Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft.</p>
<p>In fact, 90% of the respondents in a <a title="Ponemon Institute: Third Annual Study on Medical Identity Theft " href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">recent study </a>knew the definition of medical identity theft this year, compared with 77% last year, according to the Ponemon Institute.</p>
<p>Awareness of the crime, along with its number of victims, is obviously rising. But interestingly, a majority of victims are either not sure what to do or don’t do anything about having their medical identities stolen. What about your organization? Does it know what to do?</p>
<p>Here are three things you should never do if your organization experiences a data breach that puts patients or consumers at risk of identity theft:</p>
<ul>
<li>Ignore the incident thinking no one will find out</li>
<li>Take one year or longer to notify potential victims. Or even worse, don’t notify them at all if you’re not required to do so by law.</li>
<li>Don’t offer any compensation or services to help potential victims</li>
</ul>
<p>So what should you do? Here’s what people expect when their medical records are lost or stolen.</p>
<p>1)      Reimbursement for the cost of finding another provider. If you’re a doctor, this may seem worse than it actually is, as most victims take no action. But if they do leave, reimbursing them is an act of goodwill that can only benefit your organization in the long run.</p>
<p>2)      <a title="Ponemon Institute: 2012 Consumer Study on Data Breach Notification " href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">To be notified of the loss </a>or theft within 30 days. It may behoove you to be honest and forthright. Some organizations maintained the loyalty of their patients by issuing a press release and developing a website dedicated to the breach.</p>
<p>3)      To be provided with free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity protection </a>for one year.</p>
<p>The best remedy for identity theft is to avoid it altogether by taking precautions to protect data and train your staff on security measures. But if you do experience a breach that leads to identity theft, the best thing you can do is help your victims. It’s not only the right thing to do, it’s also the best way to protect your brand and reputation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_082112_article">Download your free Data Breach Response Guide! </a></div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/&via=Experian_DBR&text=Three things you should never do to identity theft victims&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F&amp;title=Three%20things%20you%20should%20never%20do%20to%20identity%20theft%20victims" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>World-class scammers vie for Olympic gold</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 17:49:26 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1532</guid>
		<description><![CDATA[Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,Identity+Theft,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png"><img class="aligncenter  wp-image-1539" title="scammers vie for Olympic gold" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png" alt="" width="480" height="233" /></a></p>
<p>Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities.</p>
<p>One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets that are never delivered is another way unwary buyers are tricked into giving up personal and/or credit card information.</p>
<p><strong>Beware the cyber threats</strong></p>
<p>Acknowledging the widespread use of smartphones, tablets and similar devices to retrieve Games-related content, the UK’s national fraud reporting center, Action Fraud, cautions fans to browse wisely, warning that worms, viruses and other malware can penetrate mobile devices just as easily as PCs.</p>
<p>Top malware delivery threats listed on Action Fraud’s blog site include:</p>
<ul>
<li><strong>Search Engine Poisoning</strong> – The most prevalent form of malware delivery (40% of all malware infections), in which attackers link what appear to be legitimate search result “bait” pages to malware infected sites.</li>
<li><strong>Drive-by-Downloads</strong> – Technique that automatically downloads malware when devices interact with an infected website, email, pop-up ad or other apparently authentic Olympic content.</li>
<li><strong>Information Phishing</strong> – Disguised links from Facebook and Twitter abound this year. When clicked, infected links, in the shortened bit.ly/ format, for example, <a title="Data protection strategies to catch a phish" href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">can instantly extract, disable or destroy a device’s content or operating system.</a></li>
</ul>
<p><strong>Staying off the scammers’ scorecards</strong></p>
<p>A fraudster’s goal is to rip you off in record time and disappear into the shadows with their<br />
ill-gotten gains.  To avoid being victimized during the Olympics (or anytime) follow these common-sense rules for browsing and buying:</p>
<ul>
<li>Never click a link from someone you don’t know.</li>
<li>Avoid giving personal or credit card information to anyone whose identity and organization you can’t positively confirm.</li>
<li>For Olympics news or memorabilia, frequent only sites known to be credible and trustworthy, such as London2012.com.</li>
</ul>
<p>Such simple precautions can make for a winning Olympics experience, and help send the fakes, frauds and phonies home empty handed.</p>
<p>Have you or a friend encountered scammers during the Olympics? Take a minute to briefly share your story.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/&via=Experian_DBR&text=World-class scammers vie for Olympic gold&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F&amp;title=World-class%20scammers%20vie%20for%20Olympic%20gold" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Webinar: Data breaches can happen anytime, anywhere</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/#comments</comments>
		<pubDate>Thu, 19 Jul 2012 16:15:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1460</guid>
		<description><![CDATA[Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Identity+Theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg"><img class="aligncenter  wp-image-1469" title="data-breach-hacker" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg" alt="" width="509" height="339" /></a></p>
<p>Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being prepared for the inevitable.</p>
<p>I would like to invite you to participate in an informative webinar on this important issue. I will be joined by Dr. Larry Ponemon, a data protection “think tank” pioneer and Chairman of the Ponemon Institute, and Karen Murray, Vice President, Chief Compliance Officer of Steward Health Care System in a discussion focusing on the latest data breach trends, how to prepare for a data breach and the best ways to respond to a breach.</p>
<p>The 90-minute webinar, delivered in conjunction with the Health Care Compliance Association (HCCA), will be held at noon CST on July 25, 2012 and participants may be eligible for CEUs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Webinar: Preparing for the First 24 Hours of a Data Breach" href="http://www.experian.com/innovation/business-resources/data-breach-compliance-and-response.jsp?WT.srch=ecd_dbres_blog_070912_article">Webinar Download: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond</a></div></div>
<p>In addition, the webinar will feature:</p>
<p>• The latest research about consumer notification from the Ponemon Institute<br />
• A look at healthcare data breach statistics<br />
• Best practices for data breach preparation from a compliance officer’s perspective.<br />
• Examples of what works &#8211; and doesn’t work &#8211; when responding to a data breach<br />
• How and why data breaches happen<br />
• How to budget the resources for a  potential breach<br />
• What do regulators expect from an organization that experienced a breach?<br />
• A question and answer period for participants</p>
<p>Come learn the best ways to try and prevent a data breach and the most effective methods to respond to one. Learn to minimize your costs and help protect your reputation.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/&via=Experian_DBR&text=Webinar: Data breaches can happen anytime, anywhere&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F&amp;title=Webinar%3A%20Data%20breaches%20can%20happen%20anytime%2C%20anywhere" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vigilance is still the best medicine for avoiding medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 18:09:33 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1378</guid>
		<description><![CDATA[  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=HIPAA,Identity+Theft,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg"><img class="aligncenter size-full wp-image-1402" title="Doctor conducting research" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg" alt="" width="448" height="299" /></a></p>
<p>The latest <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">Ponemon Institute Medical Identity Theft </a>survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly 2 million annually), while breach frequency and financial damages continue<br />
to rise, unabated.   </p>
<p><strong>Losses up 44% from 2010</strong></p>
<p>Data extrapolated for 2012 reveals that losses from medical identity theft will top $40 billion, up 34% from last year and 44% from 2010. During any given hour thieves using pilfered credentials will steal nearly $5 million worth of medical services, equipment and prescriptions.</p>
<p>The survey also revealed:</p>
<ul>
<li><strong>Higher costs for recovery and resolution</strong>: victims pay on average $22,346<br />
(up 10% from 2011) to resolve medical identity theft, including the cost of identity theft protection and retaining legal counsel</li>
<li><strong>Difficulty knowing when the crime occurred</strong>: one quarter of those asked did not know when their medical identity was stolen, while 34% said it took more than a year to find out</li>
<li><strong>Collection letters still top the list</strong>: though more consumers learn of medical identity theft from suspicious statement or invoice entries, nearly 40% of victims first hear of their misfortune through collection letters</li>
</ul>
<p>In a subtle but potentially instructive revelation, just 4% of survey respondents said a healthcare provider or insurance company notified them of the theft.  </p>
<p><strong>Providers beware</strong></p>
<p>So how is all this flavoring consumers’ attitudes toward healthcare and insurance providers? The biggest non-financial consequence, according to Ponemon, is a loss of trust and confidence. If people perceive a lack of effective data safeguards, most (58%) feel no compunction about going elsewhere for services. If their medical records were ever lost or stolen 56% of respondents would also feel justified making a change.  </p>
<p><strong>Watch the vital signs</strong></p>
<p>The top three actions desired by victims following medical identity theft include: reimbursement for the costs of changing providers; <a title="Ponemon Notification Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">prompt notification of the loss or theft</a>; and free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft protection </a>for at least one year. (Hint: Providers can use these survey insights to develop post-breach strategies and programs aimed at reestablishing trust and confidence.)  </p>
<p>Employers can also play a role in medical identity theft awareness by encouraging (and if needed, teaching) employees how to:</p>
<ul>
<li>Keep medical information private</li>
<li>Regularly check medical records for accuracy (57% of those surveyed don’t)</li>
<li>Be more proactive about monitoring statements and charges</li>
<li>Review and interpret credit reports</li>
<li>Engage an identity theft protection service</li>
</ul>
<p>Bottom line? When it comes to <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">medical identity theft</a>, vigilance is good medicine&#8211;for consumers and healthcare providers alike.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_062612_article  ">View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/&via=Experian_DBR&text=Vigilance is still the best medicine for avoiding medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F&amp;title=Vigilance%20is%20still%20the%20best%20medicine%20for%20avoiding%20medical%20identity%20theft" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 Differentiating factors of a healthcare breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/#comments</comments>
		<pubDate>Tue, 10 Apr 2012 08:30:58 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1125</guid>
		<description><![CDATA[Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting. With breaches of medical records increasing 97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,healthcare+data+breach,HIPAA,HITECH+Act,Identity+Theft,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg"><img class="aligncenter size-full wp-image-1131" title="hand-stealing-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg" alt="" width="426" height="282" /></a></p>
<p>Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting.<br />
With <a title="Trends in healthcare data breaches" href="http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/" target="_blank">breaches of medical records increasing </a>97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors that make breaches in this one industry so cumbersome, dangerous and difficult to deter.<br />
 <br />
1. Heavy regulations<br />
While various state laws govern many breaches, a healthcare breach falls under federal law—both for providers and their business associates. The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 to govern PHI management. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 further enforced it. HITECH’s tiered system of fines can cost a company as much as $1.5 million for mishandling a breach.</p>
<p>2. Black market premium<br />
By many estimates, a medical record sells for $50 on the black market, compared to just $1 for a Social Security number (SSN), according to a GovTech.com article. A single breach can be highly lucrative with an average of 49,000 records impacted per incident. This profitability makes it all the more difficult to deter medical breaches and protected health information (PHI) fraud stemming from both internal and external threats.</p>
<p>3. Substantial harm to patients<br />
Ninety percent of healthcare organizations in a recent study agreed that breaches cause patients harm. One example of this is medical identity theft. Another study found that resolving medical identity theft costs victims $20,663, an extrapolated average. Patients with breached PHI may face even worse. They could lose their medical insurance altogether, due to abuse of their benefits by an imposter. And that imposter’s health conditions, blood type, allergies and prescriptions could end up being part of the victim’s medical file. That misinformation could lead to improper medical care, potentially resulting in a life-threatening situation for the victim.</p>
<p>4. High volume of breaches<br />
According to data from the<a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" rel="nofollow" target="_blank" class="broken_link"> Identity Theft Resource Center</a>, the overall volume of breached records increased 35% from 2010 to 2011. Yet, according to HHS data, the volume of breached PHI records increased 97% in the same timeframe. In fact, three of the top six breaches of 2011 were in healthcare, according to the Privacy Rights Clearinghouse. The numbers point to an industry in crisis. Ninety-six percent of providers in a recent study have experienced at least one breach in the past two years.</p>
<p>5. Unprepared entities<br />
The increase in medical breaches comes at a time when entities are updating their offices with both electronic health records (EHR) and mobile devices. Many are doing so without putting the proper security measures and access controls in place first. In a recent study, 81% of healthcare entities reported using mobile devices to “collect, store and/or transmit” PHI but 49% haven’t implemented any protection measures for the devices.</p>
<p>With so many different factors at play in <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">healthcare breaches</a>, the sector will continue to be an interesting one to watch. As the HHS promotes greater transferability of EHR, the road ahead may become even rockier.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_041012_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/&via=Experian_DBR&text=5 Differentiating factors of a healthcare breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F&amp;title=5%20Differentiating%20factors%20of%20a%20healthcare%20breach" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Students and cyber defense</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/#comments</comments>
		<pubDate>Tue, 07 Feb 2012 21:41:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Student Identity Theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=957</guid>
		<description><![CDATA[This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F07%2Fstudents-and-cyber-defense%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Identity+Theft,Identity+Theft+Prevention,Student+Identity+Theft&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg"><img class="aligncenter size-full wp-image-961" title="college-students-easy-target-for-identity-thieves-10092901" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/college-students-easy-target-for-identity-thieves-10092901.jpg" alt="Identity thief reaching for student ID" width="425" height="282" /></a></p>
<p>&nbsp;</p>
<p>A great deal of data is collected on students of all ages.  Registration forms, health forms, emergency contact forms and permission slips are all a part of the information overload that schools typically require from their pupils, and many of these forms request sensitive data such as social security numbers.  Unfortunately, school administrators don’t always protect this information as well as they should and education institutions are just as susceptible to data breaches as any other organization.</p>
<p>This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are <a title="Child Identity Theft Blog Article" href="http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/" target="_blank">51 times more likely</a> to suffer from identity theft than adults.</p>
<p>The Federal Trade Commission recently issued a <a title="FTC Website" rel="nofollow" href="http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt056.shtm" target="_blank" class="broken_link">release</a> alerting parents about how to protect students from fraudulent activity.  Of particular note is information about the federal <a title="Education Website" rel="nofollow" href="http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank" class="broken_link">Family Educational Rights Privacy Act </a>(FERPA), enforced by the U.S. Department of Education, which protects the privacy of student records and gives parents of school-age kids the right to opt out of sharing contact information with third parties, including other families.</p>
<p>The FTC’s safety tips for parents include:<br />
•	Read the notice schools must distribute that explains the rights of students and parents under FERPA.  This legislation protects the privacy of student education records and gives parents the right to inspect and review your child&#8217;s education records, consent to the disclosure of information in the records and correct errors in the records.<br />
•	Ask your child&#8217;s school about its directory information policy. Student directory information can include a child&#8217;s name, address, date of birth, telephone number, email address, and photo. FERPA requires schools to notify parents and guardians about their school directory policy and give them the right to opt out of the release of directory information to third parties. Absent opting out, directory information may be available not only to the people in a child&#8217;s class and school, but also to the general public.<br />
•	Take action if your child&#8217;s school experiences a data breach. If you believe there&#8217;s been a data breach and your child&#8217;s information has been compromised, contact the school to learn more. Talk with teachers, staff, or administrators about the incident and their practices. Keep a written record of your conversations. Write a letter to the appropriate administrator, and to the school board, if necessary. The U.S. Department of Education takes complaints about these incidents. Contact the Family Policy Compliance Office, U.S. Department of Education, 400 Maryland Ave., SW, Washington, DC 20202-5920, and keep a copy for your records.</p>
<p>Perhaps it’s no coincidence that as more attention is directed to the risks of identity theft amongst children, cyber defense is becoming a hot new field of study for students.  National cyber defense competitions have emerged as spirited forums for budding technical talent, including the <a title="National Security Agency" rel="nofollow" href="http://www.nsa.gov/public_info/press_room/2010/cyber_defense.shtml" target="_blank" class="broken_link">National Security Agency’s Cyber Defense Exercise</a> – a competition that pits students from a series of military academies against each other – and against the competition’s leaders at NSA; the Air Force Association’s National High School Cyber Defense Competition, <a title="CyberPatriot" rel="nofollow" href="http://www.uscyberpatriot.org/Pages/default.aspx" target="_blank" class="broken_link">CyberPatriot</a>, created to inspire high school students towards careers in cyber security and associated fields; and the <a rel="nofollow" href="http://www.nationalccdc.org/" target="_blank" class="broken_link">National Collegiate Cyber Defense Competition</a>, designed to provide practical experience for students in a fast-changing field that needs ever more talented workers.<br />
We can only hope that this new generation of cyber experts – borne from a time when new risks have posed threats to their own personal safety – can meet the growing challenges of cyber defense.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/&via=Experian_DBR&text=Students and cyber defense&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/07/students-and-cyber-defense/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>