Tag: Security Breaches

Loading...
Views on Consumer Reactions

to Data Breaches...

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions...

Read More Views on Consumer Reactions

to Data Breaches

3 Steps To Ease Your Cyber Security Spring Cleaning Ef...

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of...

Read More 3 Steps To Ease Your Cyber Security Spring Cleaning Efforts
The Worst Things You can Say or Do in a Breach Notific...

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the...

Read More The Worst Things You can Say or Do in a Breach Notification Letter
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Must-do Resolutions to Improve Your Small Business’ Cy...

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that...

Read More Must-do Resolutions to Improve Your Small Business’ Cyber Security
Cyber Security Requires a Three-stage Approach to Data...

Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource Center (ITRC). Perpetrated against companies large and small, these breaches compromised more than 4.6 million records....

Read More Cyber Security Requires a Three-stage Approach to Data Breach Prevention
Medical Data Breaches: A Source of Chronic Pain...

With over 870,000 medical records exposed in data breaches in just the first quarter of 2013, medical data breaches have become a source of chronic pain for healthcare organizations   Adding to this complexity is the HIPAA Omnibus Final Rule.  For additional resources to help you accelerate your healthcare data breach resolution,...

Read More Medical Data Breaches: A Source of Chronic Pain
Secure your outsourcing practices to prevent data brea...

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once.  Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also...

Read More Secure your outsourcing practices to prevent data breaches
Cybercriminals Aim For A New Target...

Bank employees have recently usurped their customers as the preferred target of cybercriminals in the financial industry according to the FBI and other finance member organizations who last month issued fraud alert warnings to banking institutions.  The latest data breach trend by cyberthieves is to use hacking methods such...

Read More Cybercriminals Aim For A New Target
Cyber Security Act of 2012 dies as an executive order ...

The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department...

Read More Cyber Security Act of 2012 dies as an executive order is born
When it comes to data breach, hackers are not the bigg...

Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches...

Read More When it comes to data breach, hackers are not the biggest threat
ITRC report identifies top three data breach triggers...

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing...

Read More ITRC report identifies top three data breach triggers