The Worst Things You can Say or Do in a Breach Notification ...

PII

May 06 2014 by
When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in a courteous, straightforward manner. Because of this, notification letters are an integral piece of a firm’s...

Read more ››

Data Breach News for the First Quarter of 2014...

PII

Apr 08 2014 by
With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches had been reported, according to the Identity Theft Resource Center, which tracks such statistics. Those breaches exposed more than 4.2 million records, the...

Read more ››

Big data can mean big breaches...

PII

Mar 27 2012 by
As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data can be personal, sensitive and subject to...

Read more ››

Expanding the scope of security testing...

PII

Feb 15 2012 by
Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of Security Constructs LLC, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.     Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration...

Read more ››

‘Tis the season for data privacy...

PII

Jan 24 2012 by
  It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all. OK, perhaps it isn’t exactly Christmas, but Data Privacy Day - observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be...

Read more ››

Resources for managing your enterprise security and privacy ...

PII

Jan 03 2012 by
Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of Security Constructs LLC, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System. I've been actively involved in InfraGard for many years. InfraGard is a public/FBI partnership with a primary mission of protecting critical infrastructure.  Because of this partnership, I began to...

Read more ››

Year of the breach: 2011 in review...

PII

Dec 20 2011 by
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by...

Read more ››

Holiday travel without data leaks...

PII

Dec 13 2011 by
The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and mobile devices in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus...

Read more ››

Avoiding holiday scams...

PII

Dec 06 2011 by
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers. Here, according to McAfee, are 12 common holiday scams to beware of: 1. iPad scams.  Watch out for bogus offers for free iPads on...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets