<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Social media policy</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/social-media-policy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>The compliance risks of social media</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/#comments</comments>
		<pubDate>Tue, 29 May 2012 15:49:04 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1274</guid>
		<description><![CDATA[Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Cyber+Security,Data+Breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg"><img class="aligncenter size-full wp-image-1277" title="social_media" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/social_media.jpg" alt="" width="381" height="315" /></a></p>
<p>Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory obligations using social media platforms. </p>
<p>According to the report, critical reliance on third parties for information collection and capture, rapidly rising social media content volume and fast-changing applications, and the difficulty of ensuring authentication all make it difficult for security professionals to keep up with the<a title="Create a social media policy to protect you and your employees" href="http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/"> legal and regulatory compliance </a>associated with social media.</p>
<p>The report suggested that security pros should look to financial services for guidance on social media risks, keeping in mind that retention obligations clearly apply to social media, retention obligations also apply to both corporate- and employee-owned mobile devices, and firms should monitor and provide ongoing training to employees.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_052912_article ">Download this free checklist</a> to learn what steps to take when it&#8217;s go-time for data breach response. </div></div>
<p>Above all, critical steps that security professionals must take in order to respond to the risks that social media poses include the following:</p>
<p>1.  Build effective policies governing social media usage in your enterprise.<br />
Your <a title="Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/">social media policy </a>should cover what your organization will and will not do online, what your employees can and cannot do, and what members of the public can and cannot do on your social media sites.</p>
<p>2.  Determine how tools that control social media fit into broader information governance.<br />
Look before you leap when it comes to adopting tools that help enforce social media controls and make sure they’ll integrate with your company’s existing systems.</p>
<p>3.  Incorporate flexibility and continuous monitoring in social media.<br />
Social media is constantly innovating end evolving &#8211; your organization will need to do so as well.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/&via=Experian_DBR&text=The compliance risks of social media&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F29%2Fthe-compliance-risks-of-social-media%2F&amp;title=The%20compliance%20risks%20of%20social%20media" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/29/the-compliance-risks-of-social-media/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Holiday travel without data leaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/#comments</comments>
		<pubDate>Tue, 13 Dec 2011 01:03:07 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=879</guid>
		<description><![CDATA[The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F13%2Fholiday-travel-without-data-leaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Consumer+fraud,cyber+crime,data+privacy,Data+Security,Fraud,healthcare+data+breach,Identity+Theft,Identity+Theft+Prevention,PII,Ponemon+Institute,Security+Breaches,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/ipad_beach.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg"><img class="aligncenter size-full wp-image-882" title="5733459-santa-s-christmas-travel" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/5733459-santa-s-christmas-travel.jpg" alt="" width="432" height="305" /></a></p>
<p>The winter holidays are upon us and that means the travel season is pivoting into high gear.  Employees everywhere are preparing to trot off hither and yon, likely with their laptops and <a href="../2010/12/21/mobile-smishing-attacks-are-on-the-rise/">mobile devices</a> in tow – and, accordingly, with your company’s data, as enticing to prowling cyber-thieves as overstuffed Christmas stockings.  While holiday travelers unwind and turn their focus to hearth and family, fraudsters focus on snatching precious data from unwary targets at airports, wi-fi hotspots, hotels and beyond.</p>
<p><a rel="nofollow" href="http://www.thetechherald.com/article.php/200950/4916/Protecting-the-company-as-employees-travel-during-the-holidays" target="_blank" class="broken_link">What can companies do</a> to mitigate the risk to their holiday-traveling data?</p>
<p>First, remind employees about the importance of protecting their laptops and other data-carrying devices<strong>. </strong>According to the <a title="Ponemon Reputation Impact Study" href="http://www.experian.com/data-breach/reputation-impact-study.html" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>, close to 637,000 laptops are lost each year, most commonly at security checkpoints.  Ponemon notes that 10,278 laptops are reported lost every week at 36 of the largest U.S. airports, and 65 percent of those laptops are not reclaimed.  The airports with the highest number of lost, missing or stolen laptops include (in this order) Los Angeles International, Miami International, Kennedy International, and Chicago O’Hare.  While Atlanta’s Hartsfield-Jackson International is the busiest airport in the U.S., it is tied for eighth place (with Washington’s Reagan National) for lost, stolen or missing laptop computers.</p>
<p>The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, <a href="../2011/08/16/the-dollars-of-a-data-breach/">data breach</a>, lost intellectual property costs, lost productivity and legal, consulting and <a href="../2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/">regulatory expenses</a>.  Given the damage associated with laptops that go MIA, it might be wise to restrict access to corporate information while employees are traveling.  If full access to server information isn’t needed, consider using other systems such as read-only export files.  Suggest that employees transfer sensitive data from laptops to your company’s secure central server, or move it to a disk that may be stored safely until they return.  And don’t forget that <a href="../2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> can serve as an endpoint protection, which allows employees to perform a remote data erase if a device is lost.</p>
<p>A few other tips:</p>
<ul>
<li><strong>Encourage the use of      privacy filters</strong>, which block the ability to view computer screens from      an angle.</li>
<li><strong>Guard      against open wi-fi prowlers</strong> by setting computer defaults to require owners’ authority before      connecting to a new network.</li>
<li><strong>Discourage      the use of public computers</strong>.  Many of them contain “keylogger spyware”      that can monitor every keystroke. <strong> </strong></li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/&via=Experian_DBR&text=Holiday travel without data leaks&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/13/holiday-travel-without-data-leaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tips to implement an effective social media policy</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/#comments</comments>
		<pubDate>Tue, 05 Jul 2011 15:41:25 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=662</guid>
		<description><![CDATA[A well-crafted social media policy with clear guidelines addressing these and other risks can substantially reduce the number of data breach incidents related to social media use. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F05%2Ftips-to-implement-an-effective-social-media-policy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/Social-Media.jpg"><img class="aligncenter size-full wp-image-663" title="Social-Media" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/Social-Media.jpg" alt="" width="336" height="363" /></a></p>
<p>From Facebook to LinkedIn — and all chat venues in between — social media is both good news and bad news for businesses. Many companies take advantage of the low-to-no cost method of promoting their business, but social media also presents an opportunity for large-scale data breaches.</p>
<p>During the course of a seemingly harmless IM chat an employee can instigate a data breach through a file transfer or other means of inadvertently leaking personally identifiable, health, or other sensitive information. A business social networking site can also pose a monumental threat to businesses through phishing attacks disguised as invitations. Although they look legitimate, the messages actually take the targeted victims to a third-party website in an attempt to download malware onto their computers.</p>
<p>A well-crafted social media policy with clear guidelines addressing these and other risks can substantially reduce the number of data breach incidents related to social media use. An all-inclusive social media policy can also help prevent diminished customer trust, lost revenue resulting from a data breach, and the subsequent costs of resolving a data breach.</p>
<p>Although some companies cover social media use in a confidentiality agreement or in an employee handbook, creating a separate detailed social media policy will more effectively reduce the potential for misuse. Your company’s legal or compliance team will have insight on how to customize a best practices policy for your particular business. Also include employees, such as those most active in social media, who will be internal advocates for the policy.</p>
<p>Vital components of an effective social media policy include:</p>
<ul>
<li>Strict guidelines for disclosures.</li>
<li>Content filtering to restrict or limit access to social media websites.</li>
<li>Procedures ensuring that anti-virus and anti-malware controls are updated daily.</li>
<li>Standardized training to inform employees of the risks associated with social media use.</li>
<li>A wireless data policy for mobile device use of social media.</li>
<li>Corrective actions resulting from noncompliance.</li>
<li>Policy review schedule to ensure that the policy is revised to reflect new social network or technology developments.</li>
</ul>
<p>&nbsp;</p>
<p>By taking a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">proactive stance</a> regarding employee use of social media your business will remain a positive presence both online and offline.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/&via=Experian_DBR&text=Tips to implement an effective social media policy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber liability insurance: 5 fast facts</title>
		<link>http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/#comments</comments>
		<pubDate>Tue, 14 Jun 2011 21:08:29 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber liability insurance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data restoration]]></category>
		<category><![CDATA[service provider breach]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=634</guid>
		<description><![CDATA[In this daunting time of high-wire cyber attacks, when even the most trusted brands are falling prey to tireless hackers, there’s no such thing as being too prepared.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F06%2F14%2Fcyber-liability-insurance-5-fast-facts%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=crisis+management,cyber+liability+insurance,Data+Breach,Data+Breach+Notification,data+restoration,service+provider+breach,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/Cyber-Attack1.jpg"><img class="aligncenter size-full wp-image-637" title="Cyber Attack" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/Cyber-Attack1.jpg" alt="" width="448" height="336" /></a></p>
<p>In this daunting time of high-wire cyber attacks, when even the most trusted brands are falling prey to tireless hackers, there’s no such thing as being <a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">too prepared</a>.  Enter <a href="http://smallbusiness.foxbusiness.com/legal-hr/2011/05/23/hacker-liability-risk-company/#ixzz1NF497p3B" rel="”nofollow” nofollow" target="_blank" class="broken_link">cyber liability insurance</a>, a relatively new area of the insurance industry that provides coverage where general commercial liability (CGL) insurance typically does not.  Unless a cyber insurance endorsement is a part of your CGL insurance, don’t count on your policy to cover the wide-ranging costs associated with a breach – attorney fees, forensic expenses, mailings, call center, credit monitoring, secondary liability expenses, cleanup costs, and so on.  While major companies that service large organizations have been in the game for awhile, more companies are now tailoring coverage for small and medium-sized businesses, which incidentally have become the <a href="http://www.securityweek.com/verizon-2011-data-breach-investigations-report-breaches-spike-data-loss-hits-low-and-hacking-rise" rel="”nofollow” nofollow" target="_blank" class="broken_link">prime targets</a> for hackers.</p>
<p>Here’s the 411 on insurance that can serve as your company’s 911 for cyber costs and liability:</p>
<p>1.            Breach Costs.  Cyber liability insurance can cover direct and indirect costs associated with a breach, ranging from breach notice costs (including costs associated with providing free <a href="http://www.protectmyid.com/" target="_blank" class="broken_link" rel="nofollow">credit monitoring</a> to individuals) to damages and defense costs (prompted from lawsuits or <a href="http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/" target="_blank">regulatory investigations or actions</a>).</p>
<p>2.            Service Provider Breach.  If the breach happens not to your company but to a service provider that handles your company’s data, cyber liability insurance can cover all associated expenses except for internal man-hours squandered on addressing the breach.</p>
<p>3.            Social Media.  If your CGL insurance doesn’t cover <a href="http://www.socialmedialawupdate.com/tags/cyber-liability-coverage/" rel="”nofollow” nofollow" target="_blank" class="broken_link">social media activities</a>, make sure you obtain cyber liability insurance that does.  With social media becoming an increasing part of any company’s online footprint, it’s critical that your business is covered in this area.  Start by making sure your company has a <a href="http://www.socialmedialawupdate.com/2010/09/articles/social-media/why-every-business-should-have-a-social-media-policy/" rel="”nofollow” nofollow" target="_blank" class="broken_link">social media policy</a> in place.</p>
<p>4.            Crisis Management, Business Interruption and Data Restoration.  Cyber liability insurance can help get your systems back up and running and assist with the PR costs needed to get your company’s reputation restored as well.</p>
<p>5.            Denial of Service Attack.  What happens when your company or service provider is shut down by an attack and your company is thus shut down for business?  Cyber liability insurance can cover lost income and repair costs.</p>
<p>Data is a prized asset that warrants its own specific protections.  Make sure ahead of time that your data is properly insured so that when a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">breach</a> strikes your company isn’t burdened with exorbitant costs along with inconvenience.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_061411_article ">White Paper Download: Cyber Insurance and Your Data Breach Response Plan</a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/&via=Experian_DBR&text=Cyber liability insurance: 5 fast facts&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Create a social media policy to protect your company and employees</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/#comments</comments>
		<pubDate>Tue, 02 Nov 2010 22:45:40 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Social media policy]]></category>
		<category><![CDATA[social networking]]></category>
		<category><![CDATA[Twitter]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=191</guid>
		<description><![CDATA[Facebook and other social networks have generated a lot of buzz recently due to their data privacy settings and policies.  Unfortunately, many consumers are not aware of these settings and openly share their personally identifiable information. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F02%2Fcreate-a-social-media-policy-to-protect-your-company-and-employees%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=data+privacy,Facebook,Social+media+policy,social+networking,Twitter&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/cyberpadlocklg.jpg"><img class="alignnone size-full wp-image-202" title="cyberpadlocklg" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/11/cyberpadlocklg.jpg" alt="" width="563" height="375" /></a></p>
<p>Facebook and other social networks have generated a lot of buzz recently due to their data privacy settings and policies.  Unfortunately, many consumers are not aware of these settings and openly share their personally identifiable information.  This reckless sharing has resulted in damages including identity theft and hacked bank accounts.  A recent Ponemon Institute <span style="text-decoration: underline;"><a href="http://finance.yahoo.com/family-home/article/110674/6-things-you-should-never-reveal-on-facebook" class="broken_link" rel="nofollow">study</a></span> found that social media users are at greater risk of physical and identity theft due to the information shared online.</p>
<p>Your company may not be active on Facebook or Twitter, but undoubtedly your employees are.  How could what your employees say affect your company or their employment relationship with your firm?  One prime example is the “<span style="text-decoration: underline;"><a href="http://www.msnbc.msn.com/id/29901380/" class="broken_link" rel="nofollow">Cisco Fatty</a></span>” tweet that cost a recent graduate an internship at Cisco. This example, and many others, illustrates the importance for companies to create a social media policy for their employees.  The policy serves as a tool to help a company monitor and manage what is said online and may help employees think twice before tweeting what’s on their mind.</p>
<p>Some companies simply cover social media use guidelines through a confidentiality agreement or include a few sentences in the employee handbook.  However, some human resource experts recommend creating a separate policy that is discrete and accessible by employees at all times.  Now <span style="text-decoration: underline;"><a href="http://www.inc.com/guides/2010/05/writing-a-social-media-policy.html" class="broken_link" rel="nofollow">what is covered</a></span> in these policies can vary greatly and is contingent on how active the company is involved in social media.</p>
<p><a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Consult</a> your legal and/or compliance team to define the guidelines that best fit with your company <span style="text-decoration: underline;"><a href="../../../data-breach/cyber-security.html">cyber security</a></span> policies.  The process will be time well spent.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/&via=Experian_DBR&text=Create a social media policy to protect your company and employees&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/02/create-a-social-media-policy-to-protect-your-company-and-employees/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>