Three data protection strategies to catch a “phish”...

smishing

Jul 31 2012 by
Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s a comprehensive data loss protection plan: 1)...

Read more ››

Five top trends in security threats...

smishing

Jan 31 2012 by
Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. Download Your Free Data Breach Response Guide! According to Symantec, here...

Read more ››

Year of the breach: 2011 in review...

smishing

Dec 20 2011 by
Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by...

Read more ››

Avoiding holiday scams...

smishing

Dec 06 2011 by
With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers. Here, according to McAfee, are 12 common holiday scams to beware of: 1. iPad scams.  Watch out for bogus offers for free iPads on...

Read more ››

Mobile smishing attacks are on the rise...

smishing

Dec 21 2010 by
Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from being used to defraud a company.  However, a recent warning issued by the FBI’s Internet Crime...

Read more ››

About The Experian Data Breach Resolution Blog

The goal of this blog is to raise awareness about data breaches and data breach resolution considerations, issues and challenges.

Have you had a data breach? Contact us on our Rapid Response Hotline: 1-866-751-1323 or databreachinfo@experian.com

Like what you’re reading?

Subscribe to our Data Breach Perspectives Newsletter for in-depth quarterly updates!



.

Latest Tweets