Tag: Data Breach

Loading...

What is elder abuse fraud? Financial abuse is reportedly the fastest-growing form of elder abuse, leaving many Americans vulnerable to theft scams, and putting...

September 15, 2022 by Alison Hillendahl

In the first six months of 2021, there was $590 million in ransomware-related activity, which exceeds the value of $416 million reported for the...

June 6, 2022 by Alison Hillendahl

The ongoing COVID-19 pandemic has facilitated an increase in information collection among consumers and organizations, creating a prosperous climate for cybercriminals. As businesses and...

March 11, 2021 by Laura Burrows

Preventing account takeover (ATO) fraud is paramount in today’s increasingly digital world. In this two-part series, we’ll explore the benefits and considerations of a...

December 22, 2020 by Stacey Wishowsky

Enterprise Security Magazine recently named Experian a Top 10 Fraud and Breach Protection Solutions Provider for 2020. Accelerating trends in the digital economy–stemming from...

November 13, 2020 by Alison Hillendahl

Be warned. I’m a Philadelphia sports fan, and even after 13 months, I still relish in the only Super Bowl victory I’ve ever known...

March 28, 2019 by Chris Ryan

From malware and phishing to expansive distributed denial-of-service attacks, the sophistication, scale and impact of cyberattacks have evolved significantly in recent years. Mitigate risk...

March 30, 2018 by Guest Contributor

Cybersecurity has become one of the most significant issues impacting international security and political and economic stability. Our new report, Data Breach Industry Forecast...

January 2, 2018 by Guest Contributor

Cybersecurity cannot be successful if siloed. The entire organization must be part of the effort. Take these steps to ensure a more engaged relationship...

September 7, 2017 by Guest Contributor

There’s a consensus that too many C-suite executives are disengaged with their organization’s cybersecurity efforts. That indifference can seriously hamper an organization’s ability to...

August 31, 2017 by Guest Contributor

Leadership and Cybersecurity Multiple studies suggest many executives aren’t as engaged as they should be when ensuring their organizations are prepared to mitigate and...

August 24, 2017 by Guest Contributor

With the recent switch to EMV and more than 4.2 billion records exposed by data breaches last year*, attackers are migrating their fraud attempts...

April 13, 2017 by Guest Contributor

Internet-connected devices provide endless possibilities, but they rely on technology and collected data to deliver on their promises. This can compromise your network security....

January 6, 2017 by Guest Contributor

Happy holidays! It’s the holiday season and a festive time of year. Colorful lights, comfort food and holiday songs – all of these things...

December 2, 2016 by Debbie Sutherland

Every day, millions of new things get connected online, such as toasters, heart monitors and cars. Many of these things have weak security controls...

June 23, 2016 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe