<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; National Cyber Security Awareness Month</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/national-cyber-security-awareness-month/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Three tips for choosing a cloud provider</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/#comments</comments>
		<pubDate>Tue, 23 Oct 2012 23:44:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cloud provider]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1688</guid>
		<description><![CDATA[To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cloud+provider,data+privacy,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg"><img class="aligncenter  wp-image-1692" title="choosing-cloud-provider" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/choosing-cloud-provider.jpg" alt="" width="488" height="296" /></a></p>
<p>To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure <a href="http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/">cloud storage</a> really is.</p>
<p>Given recent hacking incidents at bigger-than-big companies and popular cloud services, here are a few things you need to consider when using a cloud provider:</p>
<p><strong>Look for robust authentication:</strong> If a cloud provider offers a one-step login, i.e. password-only security, that’s a red flag. If there’s just a single password standing between your sensitive data and hackers, how long until that password gets cracked? Or it could be accidentally or <a href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">maliciously shared</a> with the wrong person or written down on a piece of paper that’s later lost. The bottom line is, you need more than a password. Look for and use a cloud provider that has a robust login and authentication process. Yes, it takes longer every time you log in. But it also helps to keep hackers out. Be sure to change your passwords and other authentication data regularly. And remember that not everyone in your organization needs to know how to access the cloud.</p>
<p><strong>Take your time:</strong> It’s good to be cautious when you’re talking data storage, especially when it’s an outsourced service. So take your time choosing a cloud provider. Ask questions about what security measures are in place and how they are maintained. A dependable cloud provider should be able to answer all of your questions quickly. That likely means they know their service well and have anticipated your concerns. If you’re getting the runaround or don’t feel confident with the answers you’re receiving, look elsewhere. There’s not just one cloud in the sky.</p>
<p><strong>Sign on the dotted line:</strong> You’ve thoroughly vetted a cloud provider’s security and authentication measures and have determined you’ll actually have a higher level of security using the cloud than with internal, on-site storage. You’ve asked about risk management, documented policies, incident preparedness, encryption levels, employee training and all of your other concerns. You’ve conducted a thorough audit and you’re happy with what you’ve found. Then and only then enter into a service agreement with a cloud provider.</p>
<p>Just remember that any type of <a href="http://www.experian.com/data-breach/cyber-security.html">cyber security</a> is never foolproof and new threats constantly emerge in the cyber world. So keep up with what’s going on at your cloud provider and keep access to the cloud restricted only to individuals in your organization who really need it. If one of those individuals leaves your organization, change all of your cloud passwords and authentication data at once.</p>
<p>The fewer people who have access to your sensitive data – both inside and outside your organization – the more secure it is.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/&via=Experian_DBR&text=Three tips for choosing a cloud provider&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F23%2Fthree-tips-for-choosing-a-cloud-provider%2F&amp;title=Three%20tips%20for%20choosing%20a%20cloud%20provider" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/23/three-tips-for-choosing-a-cloud-provider/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Federal breach notice: A view worth the climb?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/#comments</comments>
		<pubDate>Tue, 16 Oct 2012 20:09:05 +0000</pubDate>
		<dc:creator>gredmon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1669</guid>
		<description><![CDATA[Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F16%2Ffederal-breach-notice-a-view-worth-the-climb%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Data+Security,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg"><img class="aligncenter  wp-image-1673" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg" alt="" width="441" height="441" /></a></em></p>
<p>&nbsp;</p>
<p><em>Our guest blogger this week is Gant Redmon, General Counsel &amp; Vice President of Business Development at Co3 Systems.</em></p>
<p>Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. While I don’t rule out a federal law passing at some point, I see it setting a floor of breach response responsibility rather than superseding everything already in place.</p>
<p>Put yourself in the shoes of a legislator trying to harmonize all the different state laws. That legislator is going to have three big political challenges.</p>
<p>The first challenge is choosing a single standard in the face of wildly different state standards. How will affected states feel about the Federal government imposing a different standard than the one they’ve settled on? Changing the rules in dozens of states will cause upheaval with political fallout.</p>
<p>The second challenge will be dealing with state attorneys general and treasurers. State AG’s are becoming more and more active in tracking breaches and cracking down on companies that don’t provide proper notice or have adequate security procedures. Part of that crackdown includes fines collected that go to the state treasury. A federal law will strip those AGs of the rule of privacy protectors and redirect funds to the federal government and away from the states.</p>
<p>The third challenge is that some states, like California and Virginia, go above even Federal notice requirements. What legislator wants to be known as the one who diluted people’s privacy rights by pre-empting strong protections and replacing them with weaker ones?</p>
<p>When trying to solve a problem, the first thing I ask is if I’m dealing with a problem worth solving. Privacy professionals and law firms have become well versed in the different state laws. Software solutions also exist that track all the different laws and provide incident response plans that are easy to follow. If the problem here is the complexity involved in dealing with disparate state breach notice laws, then we don’t have a problem worth solving.</p>
<p><em>“The opinions reflected in this article are solely those of the author and do not reflect the views of Experian Data Breach Resolution or any of its sister companies.”</em></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/&via=Experian_DBR&text=Federal breach notice: A view worth the climb?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Companies Beware: Cyber security escalates in importance</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/#comments</comments>
		<pubDate>Tue, 09 Oct 2012 17:35:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1660</guid>
		<description><![CDATA[How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F09%2Fcyber-security-escalates-in-importance%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,Data+Breach,Data+Security,Identity+Theft+Prevention,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg"><img class="aligncenter  wp-image-1665" title="Communications connectivity" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/cyber-security-month.jpg" alt="" width="448" height="335" /></a></p>
<p>How important is <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html ">cyber security</a>? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.</p>
<p>So important that a top U.S. cyber warrior is recommending that his cyber command division be elevated into a top-level military unit under the Department of Defense. The Cyber Command, created two years ago, is currently under the U.S. Strategic  Command, which is responsible for U.S. nuclear and space operations.</p>
<p>Rear Admiral Samuel Cox, the cyber command’s top intelligence officer, believes his unit needs more power to combat the growing number of cyber threats facing the nation, according to Reuters. Many of those threats come from foreign hackers who are trying to pierce the Pentagon’s computer networks to obtain highly-classified information.</p>
<p>But cyber attacks aren’t just a threat to the military. Look at the numerous banks that experienced online outages due to cyber attacks in the past few weeks. And what about the flurry of data breaches reported this year by healthcare organizations?</p>
<p>The fact is that no organization &#8211; large or small &#8211; is immune from cyber attacks, hackers or simply the loss of a portable device containing the personal identifying information of consumers. Every organization and &#8211; every individual for that matter &#8211; needs to take cyber security seriously. And what better time to check on your security measures than during <a title="Cyber Security Awareness" href="http://www.experian.com/data-breach/cyber-security.html">National Cyber Security Awareness Month</a>. So here’s a checklist to help you keep your data safe.</p>
<ul>
<li> Install the most up-to-date firewall, anti-spam and anti-virus software.</li>
<li>Establish policies for handling sensitive data, mobile devices and computers. Educate everyone from C-suite executives to employees to contractors and vendors.</li>
<li>Upload patches to fix any problems with your software programs.</li>
<li>Use passwords on laptops, computers and mobile devices. Educate employees and contractors on the importance of using long, strong passwords.</li>
<li>Encrypt laptops and mobile devices. Also encrypt sensitive files.</li>
<li>Back up sensitive files and properly dispose of files you no longer need. Store backup data in a separate location &#8211; ideally off-site &#8211; from your main servers. To dispose of sensitive data, you should physically destroy the hard drive that contains the data. Otherwise, someone may be able to retrieve that data if the computer is sold or donated.</li>
</ul>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_100912_article_CTA">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/&via=Experian_DBR&text=Companies Beware: Cyber security escalates in importance&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Connecticut gets serious about breach reporting</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 15:03:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1650</guid>
		<description><![CDATA[Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,data+breach+response,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png"><img class="aligncenter  wp-image-1653" title="connecticut-gets-serious-about-breach-reporting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png" alt="" width="547" height="318" /></a></p>
<p>Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop.</p>
<p>The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney General George Jepsen and his office were tasked with enforcing state breach laws – hard to do when you don’t know about the incidents.</p>
<p>But that’s all changed. Assistant Attorney General Matthew Fitzsimmons and the office’s Privacy Task Force will monitor the incoming emails. The new reporting requirement and newish task force (it was created last year) give the OAG more oversight of breach activity that may be putting consumers at risk. With more oversight comes better enforcement – at least that’s certainly what the OAG hopes.</p>
<p>Connecticut requires consumer notification when a breach involves unencrypted, computerized personal data. The state’s definition of “personal data” includes someone’s first and last names in combination with at least one of three data types: a Social Security number; a driver’s license or state identification number; or a financial account number, such as a credit card number, along with the access code for the account.</p>
<p>Businesses that don’t comply with the new law may find themselves in violation of the state’s Fair Trade Practices Act. Remember that sooner is better than later when it comes to breach reporting. At least if you want to avoid fines and violations.</p>
<p>Here’s the new email address for reporting breaches in Connecticut: <a href="mailto:ag.breach@ct.gov">ag.breach@ct.gov</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_100212_article">Download the Ponemon Notification Study to find out what kind of notification letters your customers want &#8211; and why it&#8217;s important to deliver.</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/&via=Experian_DBR&text=Connecticut gets serious about breach reporting&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F&amp;title=Connecticut%20gets%20serious%20about%20breach%20reporting" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Share National Internet Safety Month with every employee</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/#comments</comments>
		<pubDate>Tue, 12 Jun 2012 15:50:14 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1340</guid>
		<description><![CDATA[Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of organizations had experienced at least one [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Cyber+Security,Data+Breach,Data+Security,Fraud,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg"><img class="aligncenter size-full wp-image-1345" title="Man's hands on the keyboard of laptop" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/laptop-image.jpg" alt="" width="425" height="282" /></a></p>
<p>Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business.</p>
<p>In a recent study, 78% of organizations had experienced at least one data breach due to the actions of a careless or malicious employee.<sup>1</sup> It’s important to <a title="Your biggest data breach risk may be on your payroll" href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">educate and empower your employees </a>to do their part for data security, and that means being safe online.</p>
<p>Anyone who uses the Internet in your office needs to be mindful of Internet safety. Even if someone doesn’t handle sensitive data directly, his/her actions could infect your network with a virus that leads to data loss.</p>
<p>One of the obstacles to Internet safety is that cyber risk is so intangible it doesn’t seem like an immediate threat at all.  Cyber threats are oftentimes the opposite. A virus could slowly siphon data from your network for weeks, months or longer without anyone knowing.</p>
<p>Because cyber risk is often veiled, regular educational sessions with your employees are vital. Be sure they know and follow your Internet usage policy. Don’t have one in place? National Internet Safety Month is the perfect time to organize and implement your guidelines. You can find examples online to help shape your own policies.</p>
<p>Here are a few things to consider addressing:</p>
<p>Personal Internet Use<br />
Blocking employees from logging in and using their personal accounts at work isn’t just an issue of lost productivity. It’s also a security issue. Links, videos and attachments online and in emails can contain unseen threats, such as a virus or malware that undermines the security of your data. That could include your employees’ own personal data. Be sure they understand that the precautions are for their benefit as well as for the stability of the business and their jobs. You can use the honor system for off-limit sites or use software that blocks unsecure and other URLs.</p>
<p>Software Downloads<br />
Have your IT team handle all software downloads and ensure operating systems and software are updated regularly. Automatic updates implemented across the entire network at once help ensure there isn’t a weak link, an outdated computer, in your system. Again, you can use the honor system and ask employees not to install any software themselves or block them from doing so for added security. After all, accidents and human error do occur.</p>
<p>Email Dos and Don’ts<br />
Some employees handle a hundred or more emails a day. Considering the high volume and the ease of communicating by email, mistakes are bound to occur. Sensitive data sent to the wrong email address could be detrimental for your business and customers. Be sure your employees understand what type of data is and isn’t permissible to send by email. And that they don’t open any attachments, click on any links or respond to any requests for sensitive data if the source is not verified.</p>
<p>As part of your Internet usage policy and National Internet Safety Month, impart on your staff the importance of not only being mindful and careful but also sounding the alarm when anything goes wrong. The sooner you know about threats to your network, the sooner you can protect your data and business.</p>
<p>1 The Human Factor in Data Protection, Ponemon Institute (2012)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/&via=Experian_DBR&text=Share National Internet Safety Month with every employee&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F12%2Fshare-national-internet-safety-month-with-every-employee%2F&amp;title=Share%20National%20Internet%20Safety%20Month%20with%20every%20employee" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/12/share-national-internet-safety-month-with-every-employee/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Resources for managing your enterprise security and privacy risk in the new year</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/#comments</comments>
		<pubDate>Tue, 03 Jan 2012 08:00:57 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=901</guid>
		<description><![CDATA[Here’s a look at some of the resources I find useful in testing and training for a data breach.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F03%2Fresources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,data+privacy,Data+Security,hackers,National+Cyber+Security+Awareness+Month,PII,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg"><img class="aligncenter size-full wp-image-902" title="Data locked" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg" alt="" width="518" height="337" /></a></p>
<p><em>Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of <a title="Security Constructs" rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a>, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.</em></p>
<p>I&#8217;ve been actively involved in InfraGard for many years. InfraGard is a public/FBI partnership with a primary mission of protecting critical infrastructure.  Because of this partnership, I began to wonder if the U.S government had anything I could leverage in my own business operations. The answer is, “yes.”</p>
<p>I&#8217;ve used the guidelines from the National Institute of Standards and Technology (NIST) for many years as a basis for building information security programs around the world. While these are excellent building blocks, they don&#8217;t address my training needs in preparing for a cyber attack. So I also leverage resources from the Department of Homeland Security (DHS) and other agencies.</p>
<p>Here’s a look at some of the resources I find useful in testing and training for a data breach:</p>
<p><strong>NIST Computer Security Handling Guide </strong><br />
In the back of this document (special publication 800-61) are table-top exercises to help train your incident response team.<br />
While a bit limited in scope, they are an excellent starting point at no cost to you.</p>
<p><strong>DHS/FEMA Certified Cyber Security Training</strong><br />
The online Domestic Preparedness Campus is a portal for<br />
10 courses that address three demographics of your enterprise: Non-technical, Technical and Business Professional. While they are perhaps a bit broad and general at times, they are an excellent starting point for your enterprise.</p>
<p>The different courses include:</p>
<ul>
<li>Information Security for Everyone</li>
<li>Cyber Ethics</li>
<li>Cyber Law and White Collar Crime</li>
<li>Information Security Basics</li>
<li>Secure Software</li>
<li>Network Assurance</li>
<li>Digital Forensics Basics</li>
<li>Business Information Continuity</li>
<li>Information Risk Management</li>
<li>Cyber Incident Analysis and Response</li>
</ul>
<p><strong>Homeland Security Exercise and Evaluation Program </strong></p>
<p>This program from the DHS provides a standardized method of creating cyber security exercises. You work with a member of the DHS team to create and ultimately execute a testing program. My organization is currently setting up a tabletop exercise with DHS for all 23 of our organizational Information Security Officers next spring. For your company, I expect that the Training Exercises portion will prove the most valuable.</p>
<p>In total, they offer seven exercise types broken down into training and operational exercises.</p>
<p><em>Training Exercises</em><br />
1. Seminar &#8211; A seminar is an informal discussion designed to orient participants to new or updated plans, policies or procedures.<br />
2. Workshop &#8211; A workshop resembles a seminar but is employed to build specific products, such as a draft plan or policy.<br />
3. Tabletop Exercise (TTX) &#8211; A table top exercise involves key personnel discussing simulated scenarios in an informal setting.<br />
4. Games &#8211; A game is a simulation of operations that often involves two or more teams, usually in a competitive environment using rules, data and procedure designed to depict an actual or assumed real-life situation.</p>
<p><em>Operations-based Exercises </em><br />
5. Drill &#8211; A drill is a coordinated, supervised activity usually employed to test a specific operation or function within a single entity.<br />
6. Functional Exercise (FE) &#8211; A functional exercise examines and/or validates the coordination, command, and control between various multi-agency coordination centers. A functional exercise does not involve any &#8220;boots on the ground.&#8221;<br />
7. Full-Scale Exercises (FSE) &#8211; A full-scale exercise is a multi-agency, multi-jurisdictional, multi-discipline exercise involving functional and &#8220;boots on the ground&#8221; response.</p>
<p><em>Cyber Storm</em><br />
<a title="Cyber Storm" rel="”nofollow” nofollow" href="http://www.dhs.gov/files/training/gc_1204738275985.shtm" target="_blank" class="broken_link">Cyber Storm</a> is a biennial exercise that provides the framework for a government-sponsored cybersecurity exercise. It is a combination of international government agencies, national and state government agencies and private industry. Its stated aims are to:</p>
<ul>
<li> “Examine organizations’ capability to prepare for, protect from, and respond to cyber attacks’ potential effects</li>
<li>Exercise strategic decision making and interagency coordination of incident response(s) in accordance with national level policy and procedures</li>
<li>Validate information sharing relationships and communications paths for collecting and disseminating cyber incident situational awareness, response and recovery information</li>
<li>Examine means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests.”</li>
</ul>
<p>Cyber Storm III was used to hone and tune the latest U.S National Cyber Incident Response Plan released early in 2011. The 2010 exercise had 60 companies participating across many industry sectors.It also tested the newly formed National Cybersecurity and Communications Integration Center, which is the &#8220;boots on the ground&#8221; hub for national <a title="Cyber Security Facts" href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">cybersecurity</a> coordination.</p>
<p>Managing your enterprise security and <a title="Data Breach Resources" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">privacy</a> risk posture can be a daunting task at times. Hackers are more sophisticated and coordinated in their attacks. It’s pretty tough out there right now but new tools, processes and procedures will ultimately gain the upper hand. You are not alone. There are a wide range of resources freely available to help build the skill sets of our teams. I remain encouraged and look forward to the battle with new hope and fortitude.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/&via=Experian_DBR&text=Resources for managing your enterprise security and privacy risk in the new year&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Phishing attacks threaten your business</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/#comments</comments>
		<pubDate>Tue, 16 Nov 2010 16:24:28 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[Phishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=211</guid>
		<description><![CDATA[Phishing attacks are on the rise.  According to a Panda Security investigation, scammers are creating 57,000 fake websites a week to falsely represent 375 popular brand names.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F16%2Fphishing-attacks-threaten-your-business%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cybercrime,Data+Breach,Data+Security,National+Cyber+Security+Awareness+Month,Phishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg"><img class="aligncenter size-full wp-image-212" title="Man's hands on the keyboard of laptop" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg" alt="" width="425" height="282" /></a></p>
<p>Hopefully very few us have fallen victim to a phishing scam, but we’ve come across these scams or heard about them in the media. Fortunately, because of this awareness, less than 1% of customers are being foiled by these nefarious attempts, according to a recent <span style="text-decoration: underline;"><a href="http://" target="_blank">report</a> </span>that focused on customers of major US and European banks. However, of those who were lured to these phishing sites, 45% entered in their personal information that resulted in up to $9.4 million in losses.</p>
<p>Phishing attacks are on the rise.  According to a Panda Security <span style="text-decoration: underline;"><a href="http://www.eweek.com/c/a/Security/Internet-Scams-and-Phishing-A-Look-Inside-the-Business-547424/" target="_blank" class="broken_link" rel="nofollow">investigation</a></span>, scammers are creating 57,000 fake websites a week to falsely represent 375 popular brand names. As you can imagine, this large volume of phishing scams has serious implications for businesses as they strive to shield sensitive data from <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a> and protect their customers from misrepresentations of their business.</p>
<p>A recent <a href="http://" target="_blank"><span style="text-decoration: underline;">study</span></a> by SpamTitan found that 75% of IT managers responded that the biggest source of phishing attempts for business users is email spam. An employee may receive an email that appears to be from a legitimate source requesting personal or sensitive business information.  When the employee clicks the link, that action may trigger the download of malware that could access or destroy sensitive data.  As phishing attacks present a clear danger to businesses, it is very important that company leadership establishes and implements strict network security measures to filter spam.<a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg"><br />
</a></p>
<p>Another effective tool to fight phishing is to <span style="text-decoration: underline;"><a href="../../../data-breach/cyber-security.html" target="_blank">know the facts</a></span> and <span style="text-decoration: underline;"><a href="http://websearch.about.com/od/dailywebsearchtips/qt/dnt0810.htm" target="_blank" class="broken_link" rel="nofollow">educate</a></span> the workforce of how avoid falling victim to these scams.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/&via=Experian_DBR&text=Phishing attacks threaten your business&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Learn how to minimize the risk of a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/09/learn-how-to-minimize-the-risk-of-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/09/learn-how-to-minimize-the-risk-of-a-data-breach/#comments</comments>
		<pubDate>Tue, 09 Nov 2010 16:30:43 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=205</guid>
		<description><![CDATA[Unfortunately, data breaches are not specific to just one type of company in a particular industry.  Breaches occur in companies both large and small and in a myriad of industries. What can a business do to minimize the risks and damages of a data breach?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F09%2Flearn-how-to-minimize-the-risk-of-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Data+Breach,Data+Security,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Despite stringent new breach notification laws, the number of reported <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> has sharply increased. According to the <a href="http://www.bizjournals.com/philadelphia/stories/2010/09/20/story1.html" target="_blank" class="broken_link" rel="nofollow">Open Security Foundation</a>, the number of reported breaches shot up from 141 in 2005 to over 500 each year since 2006. These breaches not only result in a loss of customer trust, but also have a significant financial impact as well.  The average cost per company record has increased by over 45% to $204 according to a 2009 <a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1379486,00.html" class="broken_link" rel="nofollow">Poneman Institute</a> study.  That could turn into a lot of money fast for a large breach.</p>
<p>Unfortunately, data breaches are not specific to just one type of company in a particular industry.  Breaches occur in companies both large and small and in a myriad of industries. What can a business do to minimize the risks and damages of a data breach?</p>
<p>A recent article in the New Hampshire Business Review outlines a <a href="http://www.nhbr.com/business/government/849003-279/how-to-minimize-the-risks-of-a.html" class="broken_link" rel="nofollow">series of steps</a> a company can follow to minimize the risks associated with a data breach.  Featured measures include steps I’ve touched on in previous blog entries, including reviewing the data security practices for all <a href="../2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/">third party vendors</a> and ensuring <a href="../2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/">wireless connections</a> are secured.  The more you <a href="../../../data-breach/cyber-security.html">know the facts</a>, the better prepared your company will be.</p>
<p>Nevertheless, none of these precautionary measures can guarantee that a company will not experience a data breach. Cybercriminals are very adept at identifying and exploiting security gaps in company IT systems and data policies. <span style="text-decoration: underline;"><a href="../../../data-breach/cyber-security.html">Learn more</a></span> about what your company can do to stay ahead of cyber-criminals and protect your customers. Your company policies are the first line of defense.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/09/learn-how-to-minimize-the-risk-of-a-data-breach/&via=Experian_DBR&text=Learn how to minimize the risk of a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/09/learn-how-to-minimize-the-risk-of-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Help your customers protect their PHI</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/#comments</comments>
		<pubDate>Tue, 21 Sep 2010 23:15:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=138</guid>
		<description><![CDATA[Recently I addressed the importance of having plans in place to protect personal health information in light of the sharp increase in healthcare data breaches.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F21%2Fhelp-your-customers-protect-their-phi%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cybercrime,Fraud,healthcare,Medical+Data+Breach,National+Cyber+Security+Awareness+Month,PHI,security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Recently <span style="text-decoration: underline;"><a href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank">I addressed</a></span> the importance of having plans in place to protect personal health information in light of the sharp increase in <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare data breaches</a>.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise. A recent Javelin Strategy and Research study noted that fraud resulting from exposed health data has more than doubled over the past year.</p>
<p>This sharp spike is due to the extensive personal information available on an individual’s health record.  According to a recent <span style="text-decoration: underline;"><a href="http://www.rsa.com/solutions/consumer_authentication/intelreport/10947_Online_Fraud_report_0510.pdf" target="_blank" class="broken_link" rel="nofollow">RSA Online Fraud Report</a></span>, the types of fraud that can be committed using full information profiles are limitless. Not only is the individual a potential victim, the healthcare providers, insurers and the pharmaceutical companies are as well.</p>
<p>The RSA Report sites examples where a cybercriminal steals personal health information (PHI) to file false patient claims to an insurer.  A second example includes making false prescription orders to fuel the underground prescription drug trade.  Unfortunately, the consumer whose PHI is being abused may incur damages beyond being a victim of someone stealing their medical information.  Consumers may come under criminal investigation for defrauding the insurer or buying prescriptions illegally.  That doesn’t sound fair, does it?</p>
<p>It is of paramount importance to develop policies to deter and detect <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach </a>threats.  However, it is of equal importance to keep customers informed of how to <span style="text-decoration: underline;"><a href="http://www.worldprivacyforum.org/hipaa/index.html" target="_blank" class="broken_link" rel="nofollow">protect</a></span> their health privacy themselves. <span style="text-decoration: underline;"><a href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">National Cyber Security Awareness Month</a></span> begins October 1 this year. Please consider informing your clients and customers of how they can <span style="text-decoration: underline;"><a href="http://www.staysafeonline.org" target="_blank" class="broken_link" rel="nofollow">remain safe</a></span> online.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/&via=Experian_DBR&text=Help your customers protect their PHI&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>