|
doc
|
12/12/2012 |
Fifth Annual HIMSS Security Survey |
|
This survey reports the opinions of information technology (IT) and security professionals from healthcare provider
organizations across the U.S. regarding the tools and policies they have in place to secure electronic patient data. |
|
|
|
doc
|
12/06/2012 |
Issue Brief: Beyond Traditional Eligibility Verification |
|
How Data and Analytics Can Reduce Fraud and Deliver Better Program Compliance |
|
|
|
|
11/05/2012 |
Data Breach Case Study of Lessons Learned from the Field |
|
Data breaches just don't quit, and, for the most part, that's bad news for consumers and businesses. But there's good news too, in the lessons learned from recent events. The business community now has multiple points of reference about what works and what doesn't in breach preparedness and response. |
|
|
|
|
10/11/2012 |
Cyber Insurance and Your Data Breach Response Plan |
|
In recent months, several entities have publicly announced being affected by cyber incidents. Almost daily, online accounts are hacked, external hard drives are stolen and thumb drives are lost. |
|
|
|
webinarid
|
08/14/2012 |
Webinar: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond |
|
Today, more than ever, healthcare companies are at risk for the potential loss of medical records for reasons that vary from employee negligence to the ill-intent of a hacker who stands to gain a premium for medical information on the black market. So how will your organization conquer the hurdles and consequences of a data breach especially in the most important first 24 hours? |
|
|
|
doc
|
07/27/2012 |
White Paper: Fraud Detection in Newly Opened Accounts--Connecting Data Helps Predict Identity Theft |
|
This paper explores how this new weapon helps detect identity theft and other fraud, how data velocity can prove the key to predicting identity theft, and how to still deliver a strong and quick return on investment.
|
|
|
|
|
06/25/2012 |
Ponemon Institute: Third Annual Study on Medical Identity Theft |
|
This annual study on medical identity theft is designed to determine how pervasive this crime is in the United States and how it has affected consumers. |
|
|
|
webinarid
|
05/10/2012 |
Webinar: The State of Healthcare Information Security Today |
|
HealthcareInfoSecurity conducted the Healthcare Information Security Today survey to provide an in-depth assessment of the effectiveness of data protection efforts. |
|
|
|
doc
|
03/05/2012 |
September 2011 Business Benchmark Report |
|
The report shows that all U.S. businesses have demonstrated an increase in slow payment compared with September 2010, with large businesses showing the greatest increase. |
|
|
|
doc
|
08/09/2011 |
Best Practices in case of a Healthcare Data Breach |
|
Customer turnover in response to a data breach continues to be a dominant factor in data breach costs. Learn what steps to take during the first 72 hours of a breach incident.
|
|
|
|
doc
|
06/19/2011 |
Understanding Changes in Credit Supply and Demand |
|
The U.S. economy has experienced a record drop in consumer borrowing. Experian tracked a sample of credit-active consumers to show consumer deleveraging has occurred & demand for credit has declined. |
|
|
|
webinarid
|
06/19/2011 |
Medical Identity Theft Trends: The Importance of Securing Healthcare Data |
|
Learn about the findings from the Second Annual Survey on Medical Identity Theft and how it affects American consumers. |
|
|
|
doc
|
05/25/2011 |
Insight Report: Fighting Fraud in the Government's Age of Austerity |
|
Over $1 billion paid out in fraudulent benefit claims & social housing provision could be eradicated if simple fraud-prevention techniques were implemented more widely across the public sector. |
|
|
|
doc
|
05/15/2011 |
First Party Fraud - trends, challenges and outlook |
|
Businesses have many opportunities to uncover bottom-line savings with a focus on applying analytics and decisioning strategies at key process points to detect first-party fraud and minimize losses.. |
|
|
|
webinarid
|
04/11/2011 |
State Legislation Effects on Data Breach Resolution |
|
This webinar discusses State data breach bills being considered in 2011, data breach incident response, and trends in data security legislation and regulation. |
|
|
|
webinarid
|
04/07/2011 |
Personal Health Information at Risk: Issues and Answers |
|
This webinar discusses consumers' privacy expectations, best practices for protecting data in compliance with HIPAA and HITECH, and what steps to take in the event of a data breach. |
|
|
|
doc
|
04/01/2011 |
2011 a Year for Action |
|
In the Nation's consumer credit markets, 2011 should prove to be the year of expanded recovery that 2010 was suppose to be. |
|
|
|
doc
|
03/02/2011 |
Data Security Law in 2011: Responding to a Breach and Security Considerations for Engaging Vendors |
|
Eventually, almost every company may need to respond to a threat or actual data breach. There are steps to prepare and to get through an incident. This paper provides some helpful considerations to responding to a data breach and vendor relationship practices regarding data breach risk. |
|
|
|
doc
|
03/01/2011 |
Second Annual Survey on Medical Identity Theft |
|
This survey reveals the lack of awareness many Americans have about medical identity theft and
the devastating consequences it can have. These include financial loss, incorrect medical records
and harm to their credit scores. Moreover, medical identity theft appears to be an easy crime to
commit. |
|
|
|
webinarid
|
01/01/2011 |
How Policy Will Shape Data Privacy in 2011 |
|
This webinar offer a brief overview of the changing landscape in data privacy and a look at how policymakers view the regulatory environment. |
|
|
|
webinarid
|
01/01/2011 |
How to Decrease Fraud Losses while Creating Customer Loyalty |
|
Breaches are about more than identity fraud. They are about placing brand equity and customer loyalty at serious risk. |
|
|
|
webinarid
|
12/07/2010 |
A 360 View of a Data Breach |
|
Find out what to do when there is a data breach, from investigation to notification. |
|
|
|
doc
|
12/07/2010 |
Data Security Law in 2011: States Remain the Center of Attention |
|
State laws requiring "reasonable" data security have had a positive impact, but data breach notification laws have had the most profound effect on the improvement of data security. |
|
|
|
doc
|
12/01/2010 |
Data Breach Case Studies: From Incident to Resolution |
|
An investigative approach to data breaches. Learn important lessons learned from data breach case studies where some key tactics were applied. |
|
|
|
doc
|
11/19/2010 |
Legislative Update 2010: What's on the Horizon in DC & the States |
|
The new law, called the Dodd-Frank Act, will change the way many large and small financial institutions operate,
likely placing downward pressure on the availability of consumer credit. |
|
|
|
webinarid
|
09/23/2010 |
How to Conduct a HITECH Risk Assessment |
|
View this webinar to learn new insights into what you can do to proactively address HITECH compliance. |
|
|
|
doc
|
09/01/2010 |
Risk Assessment in a HITECH World - Healthcare Privacy and Security |
|
Learn the why and how of conducting a risk assessment for compliance with HITECH. Find out what approaches you should take and who should be involved to minimize vulnerability in healthcare privacy and security issues. |
|
|
|
webinarid
|
08/15/2010 |
Data Breaches in 2010: Causes Consequences, and How to Prepare Your Organization |
|
This webinar discusses do's and don'ts about how to react in the face of sudden data loss and gain key insights into developing a proactive data breach preparedness plan. |
|
|
|
doc
|
06/01/2010 |
Solutions & Best Practices for Addressing a Healthcare Data Breach |
|
Healthcare data breaches are an increasing issue & this paper addresses reasons for that. Find out what you need to know about data breach best practices in healthcare data breach resolution. |
|
|
|
doc
|
04/15/2010 |
Consequences of Medical Identity Theft & Healthcare Data Breaches |
|
An estimated 1.4M Americans were victims of medical identity theft in '09. This white paper addresses the impact of a breach to consumers and the business and provides data to support the conclusions. |
|
|
|
doc
|
04/01/2010 |
The Future of Credit Card Underwriting |
|
The card lending community is facing increasingly tighter regulations, restrictive lending criteria and continued economic challenges which will continue to impact how the industry does business going forward. |
|
|
|
doc
|
04/01/2010 |
The Changing Mortgage Landscape |
|
Supply and demand across the credit risk spectrum
Experian? analyzed the levels of supply and demand of consumer mortgage credit prior to and after the market meltdown. The increasing rift in consumer behavior between those in the highest credit-quality brackets and those in the lower brackets necessitates a new perspective on the credit-active population that takes into account two or more distinct consumer groups. |
|
|
|
doc
|
03/31/2010 |
About Medical Identity Theft and Healthcare Data Breaches |
|
The frequency of medical identity theft is on the rise. Explore what that means to your company's and your client's risks of a medical data breach and potential loss of customer and brand loyalty. |
|
|
|
doc
|
01/01/2010 |
Enhance Your Decision-Making Capabilities |
|
A guide for improved business performance -- The purpose of this guide is to help you identify, prioritize and implement enhanced decision-making capabilities for improved business performance. It is organized in three sections: Identity, Prioritization, Implementation. |
|
|
|
doc
|
01/01/2010 |
Portrait of a Fraud Victim: Affluent Suburbans Most at Risk |
|
Experian has produced a powerful and descriptive portrait of identity fraud victims. This analysis makes it clear that affluent suburbans top the list as the most at-risk consumers. |
|
|
|
doc
|
10/01/2009 |
Combating the Rising Tide of Medical Identity Theft |
|
A data breach can be a gold mine for medical identity thieves. Learn about medical identity theft and how fraud resolution experience can help resolve the damaging consequences. |
|
|
|
doc
|
05/01/2009 |
Data Breach Response Best Practices Prepared for Experian |
|
Data Breaches have become commonplace ? 26% of U.S. consumers have received data breach notifications. This report lists best practices for organizations before, during, and after a data breach. |
|
|
|
doc
|
11/21/0201 |
Data Breaches - 2010 |
|
This paper discusses how data breaches happen and what your organization can do to prepare. |
|
|