<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Phishing</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Three data protection strategies to catch a “phish”</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/#comments</comments>
		<pubDate>Tue, 31 Jul 2012 23:38:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1509</guid>
		<description><![CDATA[Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Security,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg"><img class="aligncenter size-full wp-image-1523" title="phishing1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg" alt="" width="500" height="334" /></a></p>
<p>Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected.</p>
<p>So how does an organization protect data from vicious phishing and spear-phishing attacks?</p>
<p>Here’s a comprehensive data loss protection plan:</p>
<p><strong>1) Protect your organization’s computers. </strong>Shop for the newest software that provides spam filters, firewalls, anti-virus, anti-spyware and reputation services. Look for data protection programs that offer automatic updates and free patches from manufacturers to fix problems.</p>
<p><strong>2) Consider hiring a vendor that specializes in software data security. </strong>Data security firms can go beyond traditional data protection programs and conduct audits to determine your risk for phishing and data breach. They can isolate emails that have been quarantined and scan outbound emails to see if any data has been extracted outside of your organization. As experts, they can also provide technical support with the latest email data security technology. Be careful, however, not to overlap your own software with that provided by the vendor or you may be spending too much.</p>
<p><strong>3) Educate your computer users. </strong>Data security software is far from full proof so perhaps the most important cyber security strategy is to keep educating your users. Remind them:</p>
<ul>
<li>To be suspicious of emails with generic salutations, typos or those that try to create a sense of urgency.</li>
<li> Not to open attachments they aren’t expecting. If the attachment looks legitimate, ask your users to call the person to verify that they really did send it.</li>
<li>To be wary of email links. Instead of clicking on the link, users may want to visit the website manually by typing the address into their browser. They can also check a link by hovering their mouse over it to see where it came from.</li>
</ul>
<p><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Resolution Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_073112_article  ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div><strong></strong></p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/&via=Experian_DBR&text=Three data protection strategies to catch a “phish”&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F&amp;title=Three%20data%20protection%20strategies%20to%20catch%20a%20%E2%80%9Cphish%E2%80%9D" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are we suffering from breach notification fatigue?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/#comments</comments>
		<pubDate>Tue, 03 May 2011 15:25:22 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[2011 Data Breaches Investigations Report]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Sony PlayStation breach]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=546</guid>
		<description><![CDATA[With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F03%2Fare-we-suffering-from-breach-notification-fatigue%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=2011+Data+Breaches+Investigations+Report,breach+notification+fatigue,Data+Breach+Notification,Phishing,Sony+PlayStation+breach,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing1.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg"><img class="aligncenter size-full wp-image-559" title="Phishing" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg" alt="" width="480" height="399" /></a></p>
<p>It seems as though every day the news headlines trumpet another high-profile data breach.  The most recent marquee breach is courtesy of a Sony PlayStation Network hacker, whose <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426" target="_blank" class="broken_link">attack</a> on the Sony and Qriocity servers between April 17th and 19th have compromised the personal data and, possibly, stored credit card information of 77 million players.  (Yes, you read that right; 77 million.)  Combine that with other recent cyber-heists affecting millions of unsuspecting consumers or residents, and many organizations have been forced to send out a dizzying array of <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">email notifications</a> to their customer base, many – if not all – of whom are now vulnerable to spear-phishing attacks.</p>
<p>With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them…like the one they’re reading now.</p>
<p>Got that?</p>
<p>This begs the question of whether customers are starting to tune out to the onslaught of breach alerts flooding their email in-boxes.</p>
<p>Some security gurus believe that notifications aren’t effective and customers become numb to these alerts.  Others are convinced that breach information overload is a good thing, educating people to the dangers lurking in the cybershadows and their vulnerability to <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">identity thieves</a>.  After all, how do you know to watch out for email “bait” if you’re not aware there’s a phishing hook with your name on it?</p>
<p>Furthermore, the flip side of over-notification is under-notification.  This is something that Sony is now being accused of in a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/article/226478/sony_sued_over_psn_data_breach_failure_to_disclose.html" target="_blank" class="broken_link">lawsuit</a> that claims the company waited too long to notify its PlayStation customers of the recent breach, which only exacerbated customer vulnerability to credit card fraud.</p>
<p>The irony is that while the dramatic breaches of late have been stealing headlines (as well as data), a <a rel="”nofollow” nofollow" href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" target="_blank" class="broken_link">2011 Data Breaches Investigations Report by Verizon</a> indicates that total thefts from data breaches have in fact declined significantly over the past few years.  The total number of records actually compromised from these breaches was a “mere” 4 million in 2010, quite a drop from the 144 million records compromised in 2009, and the 361 million compromised records in 2008.  The bad news?  If you look at actual data breaches versus compromised records, the <a rel="”nofollow” nofollow" href="http://blogs.smartmoney.com/paydirt/2011/04/20/cyber-crime-break-ins-are-up-but-theft-is-down/?mod=SMBlog" target="_blank" class="broken_link">numbers this year are up</a>; 760 breaches last year, an increase from 141 in 2009.</p>
<p>The bottom line: while fraudsters haven’t been able to recently score as much cyber-loot as in times past, this is <a rel="”nofollow” nofollow" href="http://www.esecurityplanet.com/news/article.php/3931496/article.htm" target="_blank" class="broken_link">no time to relax</a>.  Just be aware that with the steep increase in breaches comes an equally steep increase in breach notifications, and the associated risk that breach notification fatigue will put your customers to sleep.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/&via=Experian_DBR&text=Are we suffering from breach notification fatigue?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tax time scams: adding to the joy</title>
		<link>http://www.experian.com/blogs/data-breach/2011/04/05/tax-time-scams-adding-to-the-joy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/04/05/tax-time-scams-adding-to-the-joy/#comments</comments>
		<pubDate>Tue, 05 Apr 2011 17:12:47 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[IRS]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[ProtectMyID survey]]></category>
		<category><![CDATA[tax fraud]]></category>
		<category><![CDATA[tax time scams]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=466</guid>
		<description><![CDATA[More than 1500 tax scams reportedly target consumers and businesses through hundreds of thousands of scam emails; many use phishing to fool anxious taxpayers into visiting a scam website or providing personal and financial data in order to comply with tax filings. Protecting yourself starts by getting smart about common scams.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F04%2F05%2Ftax-time-scams-adding-to-the-joy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=IRS,Phishing,ProtectMyID+survey,tax+fraud,tax+time+scams&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/tax-evaders-india_26.jpg"><img class="aligncenter size-full wp-image-467" title="tax-evaders-india_26" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/tax-evaders-india_26.jpg" alt="" width="400" height="307" /></a></p>
<p>As if there wasn’t already enough to look forward to at tax time, throw another fun fact on the pile: fraudsters go into overdrive this time of year.  Amidst the busy hubbub, with distracted taxpayers firing off a flurry of sensitive information through what is sometimes less than secure means; tax season might as well be Christmas for scam artists grabbing the “gifts” of stolen identities and other sensitive data.</p>
<p>More than <a rel="”nofollow” nofollow" href="http://idtheft.about.com/od/preventionpractices/a/TaxTimeIDT.htm" target="_blank" class="broken_link">1500 tax scams</a> reportedly target consumers and businesses through hundreds of thousands of scam emails; many use <a href="http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/" target="_blank">phishing</a> to fool anxious taxpayers into visiting a scam website or providing personal and financial data in order to comply with tax filings.  Some scams specifically target businesses, for example several popular scams specifically directed at medical professionals.  Protecting yourself starts by getting smart about common scams and <a rel="”nofollow” nofollow" href="http://www.foxbusiness.com/personal-finance/2011/03/29/beware-tax-scams-tax-season/" target="_blank" class="broken_link">the rules of the road</a> – such as the fact that the IRS never requests sensitive information online.</p>
<p>A recent survey conducted by Impulse Research Group for Experian ProtectMyID<sup>TM</sup>, illustrates the general lack of awareness about this vulnerable time for data theft.  Forty-eight percent of respondents admit that they store their tax documents in an unsecure place, and 89% of those who use a tax professional or service are not concerned about their accountant losing their financial information.</p>
<p>The survey developed some <a rel="”nofollow” nofollow" href="http://businessnewsexpress.com/identity-theft-rampant-at-tax-time/8777522/" target="_blank" class="broken_link">key cautionary tips</a> based on their survey, which consumers and businesses would be wise to follow as they face the hazards of tax time:</p>
<ul>
<li>Enjoy the convenience of filing online, but don’t forget to protect your financial security through up to date antivirus settings, deleted cookies after submission, and due diligence about the security of any online tax service.</li>
<li>Don’t think you’re safe just because you’re filing by hard copy; make sure you send all tax documents by Certified Mail and store tax documents in a secure, locked place.  Shred any unneeded documents.</li>
<li>Don’t assume that using an accountant protects you from identity theft; make sure that your accountant is taking the same precautions to protect your data that you should on your own.</li>
</ul>
<p>During this time when fraudsters are in full force, just remember to remain vigilant about keeping your most sensitive data out of the hands of anyone besides your tax advisers and Uncle Sam.</p>
<p>You can also find more information about tax related business and consumer identity theft <a href="http://www.experian.com/data-breach/tax-day.html" target="_blank">on the Experian® Data Breach Resolution website</a>.<span id="_marker"> </span></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/04/05/tax-time-scams-adding-to-the-joy/&via=Experian_DBR&text=Tax time scams: adding to the joy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/04/05/tax-time-scams-adding-to-the-joy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Scam report: shipping pirates</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/15/scam-report-shipping-pirates/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/15/scam-report-shipping-pirates/#comments</comments>
		<pubDate>Tue, 15 Mar 2011 16:00:14 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[FedEx]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[shipping account fraud]]></category>
		<category><![CDATA[Shipping scams]]></category>
		<category><![CDATA[UPS]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=341</guid>
		<description><![CDATA[With some precautions, your business can safely navigate through hazardous shipping channels without fear of data piracy.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F15%2Fscam-report-shipping-pirates%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,Data+Security,FedEx,Phishing,shipping+account+fraud,Shipping+scams,UPS&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>In the first of our ongoing series on scams to beware of, we call your attention to a con that leverages the trusted names of FedEx and UPS to rip off your business and customers.</p>
<p>The fraud works a couple of ways:</p>
<p>Scenario #1: Your customers are asked to click on an attachment with details of an alleged shipment.  Rather than any package, your customers receive a <a rel="”nofollow” nofollow" href="http://www.scambusters.org/upsscam.html" target="_blank" class="broken_link">virus.</a></p>
<p>Scenario #2: Fraudsters get a hold of your UPS or FedEx accounts and then use this information to <a href="http://www.scambusters.org/shippingscams.html" target="_blank" class="broken_link" rel="nofollow">wreak havoc</a> on your business and customers.  It’s not too difficult to access account information; in the case of UPS, account numbers are printed right on the shipping label.  Alternatively, thieves can hack into your company databases, or – if they’re an employee &#8211; simply find this information by employers who often freely distribute shipping account data.  Crooks then use the accounts to ship drugs and stolen products throughout the country, or send out fake advance payment checks to your customers, who are asked to first wire money as a part of the process.</p>
<p>The <em><a rel="”nofollow” nofollow" href="http://www.chicagotribune.com/business/ct-met-shipping-fraud-20100805,0,19611.story" target="_blank" class="broken_link">Chicago Tribune</a></em> has reported a national increase in this scam, and notes that although UPS and FedEx work hard to investigate all fraud complaints and reimburse consumers, law enforcement officials tend not to investigate these crimes because they’re difficult to solve and often don’t involve high enough amounts of cash to make it worth their while.  Further, companies often don’t even realize they’ve been scammed if they don’t closely monitor their account records.  In the end, the loss of profits, consumer confidence, and employee productivity to repair the damage make these scams a huge headache for business owners.</p>
<p>What can businesses do to protect themselves?</p>
<p>1.      Carefully guard your shipping account information and be careful about how this sensitive data is handled.</p>
<p>2.      Keep close track of your accounts with your shipping vendors.</p>
<p>3.     <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"> Alert customers</a> when there’s been a breach so they understand how to be on the lookout for future scams.</p>
<p>With some precautions, your business can safely navigate through hazardous shipping channels without fear of data piracy.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/15/scam-report-shipping-pirates/&via=Experian_DBR&text=Scam report: shipping pirates&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/15/scam-report-shipping-pirates/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mobile smishing attacks are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 21 Dec 2010 16:48:44 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mobile threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=250</guid>
		<description><![CDATA[Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Data+Breach,Data+Security,mobile+threats,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I <a href="http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/" target="_blank"><span style="text-decoration: underline;">wrote about</span></a> the importance of implementing a wireless data policy to protect employee account data from being used to defraud a company.  However, a recent warning issued by the FBI’s <a href="http://www.ic3.gov/default.aspx" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Internet Crime Complain Center</span></a> points to another danger associated with mobile devices.</p>
<p>Cybercriminals have been increasing their attacks on mobile devices through SMS text messages and fraudulent voice messages.  These tactics are very similar to traditional email phishing scams and ask the recipient to respond to verify an address, credit card number or other form of PII.  <a href="http://www.networkworld.com/community/node/68980" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">For example</span></a>, through a process called smishing, a mobile subscriber receives a text message stating, “ABC credit card is confirming your purchase” and asks the user to visit a URL or call a phone number to verify a credit card number.</p>
<p>Obviously these attacks have serious implications for employees on a personal and professional level.  The <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"><span style="text-decoration: underline;">financial impact</span></a> to a company could be huge if an employee innocently provided a corporate bank account number as a response to a fraudulent SMS text message.</p>
<p>Fortunately, there are <a href="http://www.cmswire.com/cms/enterprise-20/mobile-enterprise-prevent-identity-theft-and-wire-tapping-009414.php" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">several steps</span></a> employees can take to prevent the chance of becoming a victim. For example, you can advise employees not to respond to text messages or automated voice messages from unknown or blocked numbers.</p>
<p>Advise your employees about these potential dangers before any damages are done.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/&via=Experian_DBR&text=Mobile smishing attacks are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F&amp;title=Mobile%20smishing%20attacks%20are%20on%20the%20rise" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Phishing attacks threaten your business</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/#comments</comments>
		<pubDate>Tue, 16 Nov 2010 16:24:28 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[Phishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=211</guid>
		<description><![CDATA[Phishing attacks are on the rise.  According to a Panda Security investigation, scammers are creating 57,000 fake websites a week to falsely represent 375 popular brand names.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F16%2Fphishing-attacks-threaten-your-business%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cybercrime,Data+Breach,Data+Security,National+Cyber+Security+Awareness+Month,Phishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg"><img class="aligncenter size-full wp-image-212" title="Man's hands on the keyboard of laptop" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg" alt="" width="425" height="282" /></a></p>
<p>Hopefully very few us have fallen victim to a phishing scam, but we’ve come across these scams or heard about them in the media. Fortunately, because of this awareness, less than 1% of customers are being foiled by these nefarious attempts, according to a recent <span style="text-decoration: underline;"><a href="http://" target="_blank">report</a> </span>that focused on customers of major US and European banks. However, of those who were lured to these phishing sites, 45% entered in their personal information that resulted in up to $9.4 million in losses.</p>
<p>Phishing attacks are on the rise.  According to a Panda Security <span style="text-decoration: underline;"><a href="http://www.eweek.com/c/a/Security/Internet-Scams-and-Phishing-A-Look-Inside-the-Business-547424/" target="_blank" class="broken_link" rel="nofollow">investigation</a></span>, scammers are creating 57,000 fake websites a week to falsely represent 375 popular brand names. As you can imagine, this large volume of phishing scams has serious implications for businesses as they strive to shield sensitive data from <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a> and protect their customers from misrepresentations of their business.</p>
<p>A recent <a href="http://" target="_blank"><span style="text-decoration: underline;">study</span></a> by SpamTitan found that 75% of IT managers responded that the biggest source of phishing attempts for business users is email spam. An employee may receive an email that appears to be from a legitimate source requesting personal or sensitive business information.  When the employee clicks the link, that action may trigger the download of malware that could access or destroy sensitive data.  As phishing attacks present a clear danger to businesses, it is very important that company leadership establishes and implements strict network security measures to filter spam.<a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/iStock_000002440482XSmall.jpg"><br />
</a></p>
<p>Another effective tool to fight phishing is to <span style="text-decoration: underline;"><a href="../../../data-breach/cyber-security.html" target="_blank">know the facts</a></span> and <span style="text-decoration: underline;"><a href="http://websearch.about.com/od/dailywebsearchtips/qt/dnt0810.htm" target="_blank" class="broken_link" rel="nofollow">educate</a></span> the workforce of how avoid falling victim to these scams.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/&via=Experian_DBR&text=Phishing attacks threaten your business&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/16/phishing-attacks-threaten-your-business/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>