Tag: Security Breaches

Loading...

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach:...

June 9, 2014 by Michael Bruemmer

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth –...

May 28, 2014 by ofonseca

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised....

May 6, 2014 by ofonseca

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four...

April 8, 2014 by Michael Bruemmer

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to...

March 12, 2014 by ofonseca

Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches...

June 25, 2013 by Michael Bruemmer

With over 870,000 medical records exposed in data breaches in just the first quarter of 2013, medical data breaches have become a source of...

May 1, 2013 by bkrenek

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach...

April 15, 2013 by bkrenek

Bank employees have recently usurped their customers as the preferred target of cybercriminals in the financial industry according to the FBI and other finance...

March 19, 2013 by Michael Bruemmer

The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame...

January 8, 2013 by bkrenek

Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches...

December 27, 2012 by ofonseca

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center...

May 7, 2012 by ofonseca