<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Verizon</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/verizon/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Cyber thieves target retailers during the shop ‘til you drop season</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/#comments</comments>
		<pubDate>Tue, 20 Nov 2012 18:58:17 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1813</guid>
		<description><![CDATA[As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest Verizon’s Data Breach Investigations Report (DBIR), an annual data breach information study conducted by the Verizon RISK Team (VERIS) with participation from the U.S. Secret Service and international national cyber security agencies in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F20%2Fcyber-thieves-target-retailers-during-the-shop-til-you-drop-season%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Security,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/cyber-thieves-target-retailers2.jpg"><img class="aligncenter size-full wp-image-1820" title="cyber-thieves-target-retailers" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/cyber-thieves-target-retailers2.jpg" alt="" width="380" height="250" /></a></p>
<p style="text-align: left;">As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf" class="broken_link" rel="nofollow">Verizon’s Data Breach Investigations Report</a> (DBIR), an annual <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breach information</a> study conducted by the Verizon RISK Team (VERIS) with participation from the U.S. Secret Service and international <a href="http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/">national cyber security</a> agencies in Australia, Holland, Ireland, and Britain. The study analyzed forensic evidence to examine how <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">data breaches</a> occurred in organizations, who caused the breaches, why they did it, how the victims responded, and how the breaches could have been prevented. </p>
<p> The 2012 DBIR focused on the retail industry which for the past two years has ranked only second behind hotel and food services as the business most plagued with data breaches.  The main reason for the high rankings of these two trades is that they use point of sale (POS) systems to conduct daily business activities, making them prime targets for criminals that exploit POS systems with weak security.  Point of sale generally refers to when money is transacted in exchange for goods or services. Retailers are especially easy targets for cyber criminals who can hijack credit card information from long distances and these kinds of attacks are low risk for the criminals who often disappear long before a data security breach is discovered.  In addition, fraudsters prefer to target small to medium businesses such as franchise owners that lack the resources and/or expertise to manage their own cyber security. </p>
<p> VERIS defines threat agents as the cause of data breach incidents and categorizes them as either external (originating outside the victim organization), internal (originating inside the victim organization) and partner (any third parties who share a business relationship with the victim.)  The report found that external threat agents were the most prolific with the majority of attacks originating fromEastern Europe, a hot bed of organized cyber crime.  Internal threats made up a smaller percentage of incidents and often involved criminals coercing retail staff to help them by either using a remote skimming device or swapping legitimate PIN entry devices and POS terminals with identical, counterfeit replacements that are rigged to capture payment card data. </p>
<p> Even though these cyber thieves can be insidious, especially during a busy holiday season, retailers can protect themselves by following a few simple data breach protection practices:</p>
<p>1)      Change passwords consistently on all POS systems since hackers constantly scan the web for passwords that are easy to guess.</p>
<p>2)      Implement a firewall on remote access/administration services.  </p>
<p>3)      Do not use POS systems to access the internet.</p>
<p>4)      Make sure your POS system is compliant with the Payment Card Industry Data Security Standard (PCI DSS) an information security standard for businesses that handles credit card information.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/&via=Experian_DBR&text=Cyber thieves target retailers during the shop ‘til you drop season&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F20%2Fcyber-thieves-target-retailers-during-the-shop-til-you-drop-season%2F&amp;title=Cyber%20thieves%20target%20retailers%20during%20the%20shop%20%E2%80%98til%20you%20drop%20season" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/20/cyber-thieves-target-retailers-during-the-shop-til-you-drop-season/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyberdefense without coffee breaks</title>
		<link>http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/#comments</comments>
		<pubDate>Tue, 11 Oct 2011 15:36:27 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Cyberdefense]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=823</guid>
		<description><![CDATA[Strong cyberdefense means strong planning to mitigate the risks of a breach and strong support to help your organization fight against hackers. The solution, experts say, is to shift from the goal of perfect security to active monitoring.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F10%2F11%2Fcyberdefense-without-coffee-breaks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyberdefense,Data+Breach,Ponemon+Institute,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/Cyber-Security.jpg"><img class="aligncenter size-full wp-image-824" title="Binary Matrix Security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/Cyber-Security.jpg" alt="" width="424" height="283" /></a></p>
<p>It’s easy for organizations to get discouraged by the proliferation of high-wire data breaches these days.  After all, if global companies can fall prey to damaging cyber attacks, what hope is there for businesses that <em>aren’t</em> brand name organizations?</p>
<p>The sense of vulnerability against hackers isn’t without merit.  A recent <a href="http://www.esecurityplanet.com/network-security/Is-IT-Security-Just-an-Illusion-3938846.htm" rel="”nofollow” nofollow" target="_blank" class="broken_link">Ponemon Institute study</a> concluded that cyber attacks are as reliable as rain; 90 percent of surveyed businesses were attacked at least once in the previous year, with almost half stating that there was a notable increase in cyber attacks, and 77 percent claiming that attacks had become more severe or difficult to contain.  Even the chairman of Ponemon concedes that the dream of complete security is somewhat futile, and other experts echo that there’s no solid protection against determined hackers.</p>
<p>The solution, experts say, is to shift from the goal of perfect security to <a href="http://www.technewsworld.com/story/73162.html?wlc=1314827770" rel="”nofollow” nofollow" target="_blank" class="broken_link">active monitoring</a>.</p>
<p>This security mindset is the opposite of the “can’t happen to me” mentality common amongst security professionals, according to a <a href="http://www.marketwatch.com/story/90-percent-of-security-pros-take-note-of-high-profile-breaches-but-majority-do-nothing-2011-08-30" rel="”nofollow” nofollow" target="_blank" class="broken_link">recent Tenable Network Security study</a>.  The report noted that more than 90 percent of attendees surveyed at the 2011 Gartner Security &amp; Risk Management Summit discussed large-scale, high-profile breaches with senior management, yet only 23 percent did anything beyond that.</p>
<p>One of the study’s conclusions was that security professionals had been getting by with “good enough” security measures that were adequate for auditing purposes, while being far from sufficient to truly bolster businesses against attacks, including insider threats.  Indeed, while a recent <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" rel="”nofollow” nofollow" target="_blank" class="broken_link">Verizon Business Data Breach Investigations Report</a> revealed that insider threats are one of the leading sources of data leakage and theft, and nearly half of Tenable’s surveyed businesses stated that they had experienced some type of insider threat, “preventing insider threats” ranked second to last as a security priority.</p>
<p>What has become clear is that regulatory compliance isn’t the same thing as security.  Careless employees, which are amongst a company’s biggest security risk, can upend the best technologies and practices.  Moving data to the cloud sounds like a secure measure, until the hosting company itself gets hacked.  Think you’re safe because your organization is small?  Wrong.  Criminals are now targeting small businesses because their security measures are often weak.</p>
<p>Some experts advise companies to recognize their vulnerability and the fruitlessness of trying to plug every hole (although certainly endeavoring to do as much as they can in this regard).  Instead, a company’s efforts are best spent monitoring every aspect of its web traffic and reacting when new threats are identified.</p>
<p>Constant monitoring and always-on security can be enabled by the following <a href="http://www.esecurityplanet.com/network-security/Is-IT-Security-Just-an-Illusion-3938846.htm" rel="”nofollow” nofollow" target="_blank" class="broken_link">steps</a>:</p>
<ol>
<li>Deploy preventative network and endpoint protection.</li>
<li>Evaluate your assets and protect them accordingly.</li>
<li>Enforce encryption and data copying policy (so, for example, if a laptop gets lost, no one can break in and pull out that data).</li>
<li>Deploy proactive data loss prevention technology.</li>
<li>Focus on best practices and impact scenarios so that your staff knows what to look for in the event of a breach.</li>
<li>Train users on sensitive information handling.</li>
<li>Think like a criminal in order to catch one.</li>
<li>Try to penetrate your own organization to see if your security defenses are up to par.</li>
</ol>
<p>Strong cyberdefense means <a href="http://www.experian.com/blogs/data-breach/2010/11/09/learn-how-to-minimize-the-risk-of-a-data-breach/" target="_blank">strong planning</a> to mitigate the risks of a breach, strong <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">support</a> to help your organization fight against hackers, and a strong cup of coffee to keep your security vigilant around the clock.  After all, hackers never rest, so neither can your organization’s cyberdefense.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_101111_article ">White Paper Download: Cyber Insurance and Your Data Breach Response Plan </a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/&via=Experian_DBR&text=Cyberdefense without coffee breaks &related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are we suffering from breach notification fatigue?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/#comments</comments>
		<pubDate>Tue, 03 May 2011 15:25:22 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[2011 Data Breaches Investigations Report]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Sony PlayStation breach]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=546</guid>
		<description><![CDATA[With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F03%2Fare-we-suffering-from-breach-notification-fatigue%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=2011+Data+Breaches+Investigations+Report,breach+notification+fatigue,Data+Breach+Notification,Phishing,Sony+PlayStation+breach,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing1.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg"><img class="aligncenter size-full wp-image-559" title="Phishing" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg" alt="" width="480" height="399" /></a></p>
<p>It seems as though every day the news headlines trumpet another high-profile data breach.  The most recent marquee breach is courtesy of a Sony PlayStation Network hacker, whose <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426" target="_blank" class="broken_link">attack</a> on the Sony and Qriocity servers between April 17th and 19th have compromised the personal data and, possibly, stored credit card information of 77 million players.  (Yes, you read that right; 77 million.)  Combine that with other recent cyber-heists affecting millions of unsuspecting consumers or residents, and many organizations have been forced to send out a dizzying array of <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">email notifications</a> to their customer base, many – if not all – of whom are now vulnerable to spear-phishing attacks.</p>
<p>With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them…like the one they’re reading now.</p>
<p>Got that?</p>
<p>This begs the question of whether customers are starting to tune out to the onslaught of breach alerts flooding their email in-boxes.</p>
<p>Some security gurus believe that notifications aren’t effective and customers become numb to these alerts.  Others are convinced that breach information overload is a good thing, educating people to the dangers lurking in the cybershadows and their vulnerability to <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">identity thieves</a>.  After all, how do you know to watch out for email “bait” if you’re not aware there’s a phishing hook with your name on it?</p>
<p>Furthermore, the flip side of over-notification is under-notification.  This is something that Sony is now being accused of in a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/article/226478/sony_sued_over_psn_data_breach_failure_to_disclose.html" target="_blank" class="broken_link">lawsuit</a> that claims the company waited too long to notify its PlayStation customers of the recent breach, which only exacerbated customer vulnerability to credit card fraud.</p>
<p>The irony is that while the dramatic breaches of late have been stealing headlines (as well as data), a <a rel="”nofollow” nofollow" href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" target="_blank" class="broken_link">2011 Data Breaches Investigations Report by Verizon</a> indicates that total thefts from data breaches have in fact declined significantly over the past few years.  The total number of records actually compromised from these breaches was a “mere” 4 million in 2010, quite a drop from the 144 million records compromised in 2009, and the 361 million compromised records in 2008.  The bad news?  If you look at actual data breaches versus compromised records, the <a rel="”nofollow” nofollow" href="http://blogs.smartmoney.com/paydirt/2011/04/20/cyber-crime-break-ins-are-up-but-theft-is-down/?mod=SMBlog" target="_blank" class="broken_link">numbers this year are up</a>; 760 breaches last year, an increase from 141 in 2009.</p>
<p>The bottom line: while fraudsters haven’t been able to recently score as much cyber-loot as in times past, this is <a rel="”nofollow” nofollow" href="http://www.esecurityplanet.com/news/article.php/3931496/article.htm" target="_blank" class="broken_link">no time to relax</a>.  Just be aware that with the steep increase in breaches comes an equally steep increase in breach notifications, and the associated risk that breach notification fatigue will put your customers to sleep.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/&via=Experian_DBR&text=Are we suffering from breach notification fatigue?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do you know the real threat to your customer data?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:03:11 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=30</guid>
		<description><![CDATA[A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee. However, the 2010 Verizon Data Breach Investigations report points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-you-know-the-real-threat-to-your-customer-data%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Cyber+Security,Data+Breach,Data+Security,PII,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iStock_000011690232Small.jpg" target="_blank"><img class="size-full wp-image-23 alignnone" title="iStock_000011690232Small" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iStock_000011690232Small.jpg" alt="" width="540" height="270" /></a></p>
<p>A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee.</p>
<p>However, the 2010 Verizon Data Breach Investigations <a href="http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">report</span> </a>points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.  The report indicates that organized crime is responsible for 85% of all stolen data in 2009. Cyber-criminals were able to take advantage of login credentials on nearly 40% of the data stolen to potentially inflict credit or financial damages on individuals. However, the study points to 98% of the ensuing data breaches being avoidable through simple controls that were not in place. <span style="text-decoration: underline;"><a href="http://news.cnet.com/8301-27080_3-20011871-245.html" target="_blank" class="broken_link" rel="nofollow">Read more</a></span> about this report on CNET.</p>
<p>Does this study indicate that companies are not doing enough to protect their customer data?  According to a <span style="text-decoration: underline;"><a href="http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Electronic%20Health%20Information%20at%20Risk%20FINAL%201.pdf" target="_blank" class="broken_link" rel="nofollow">2009 Ponemon study</a></span>, 70% of IT professionals in the healthcare field, for example, believe that senior management does not view privacy and <a href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">data security </a>as a top priority. The study also shows that over 60% of IT professionals surveyed believe they do not have enough resources to ensure data security requirements are met.</p>
<p>All too often security is not discussed until a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a> takes place. A breach may result in reduced customer trust, lost revenue and substantial costs associated with resolving the crisis.  It may be time to start the internal conversation to ensure the right systems are in place to protect customer data…before it’s too late.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/&via=Experian_DBR&text=Do you know the real threat to your customer data?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>