Posts Tagged ‘ PII ’
As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly. While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data [...][ READ MORE ]
Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.[ READ MORE ]
As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. [ READ MORE ]
Here’s a look at some of the resources I find useful in testing and training for a data breach.[ READ MORE ]
Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.[ READ MORE ]
The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. [ READ MORE ]
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.[ READ MORE ]
Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal information?[ READ MORE ]
All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. [ READ MORE ]
A recent study by Trend Micro indicates data loss is a growing concern for small businesses. The 2010 Corporate End User Study found that close to 60% of business respondents feared that data loss would be the result of data-stealing malware or by intentional or unintentional data leaks outside the company network. Even though data [...][ READ MORE ]
The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.
Have you had a data breach? Call us on our Rapid Response Hotline: 1-866-751-1323 or Email: databreachinfo@experian.com
Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!