Experian Business Resources Directory

Business & Marketing Resources: Search Results

doc 12/12/2012 Fifth Annual HIMSS Security Survey
This survey reports the opinions of information technology (IT) and security professionals from healthcare provider organizations across the U.S. regarding the tools and policies they have in place to secure electronic patient data.
doc 12/06/2012 Issue Brief: Beyond Traditional Eligibility Verification
How Data and Analytics Can Reduce Fraud and Deliver Better Program Compliance
11/05/2012 Data Breach Case Study of Lessons Learned from the Field
Data breaches just don't quit, and, for the most part, that's bad news for consumers and businesses. But there's good news too, in the lessons learned from recent events. The business community now has multiple points of reference about what works and what doesn't in breach preparedness and response.
10/11/2012 Cyber Insurance and Your Data Breach Response Plan
In recent months, several entities have publicly announced being affected by cyber incidents. Almost daily, online accounts are hacked, external hard drives are stolen and thumb drives are lost.
webinarid 08/14/2012 Webinar: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond
Today, more than ever, healthcare companies are at risk for the potential loss of medical records for reasons that vary from employee negligence to the ill-intent of a hacker who stands to gain a premium for medical information on the black market. So how will your organization conquer the hurdles and consequences of a data breach especially in the most important first 24 hours?
doc 07/27/2012 White Paper: Fraud Detection in Newly Opened Accounts--Connecting Data Helps Predict Identity Theft
This paper explores how this new weapon helps detect identity theft and other fraud, how data velocity can prove the key to predicting identity theft, and how to still deliver a strong and quick return on investment.
06/25/2012 Ponemon Institute: Third Annual Study on Medical Identity Theft
This annual study on medical identity theft is designed to determine how pervasive this crime is in the United States and how it has affected consumers.
webinarid 05/10/2012 Webinar: The State of Healthcare Information Security Today
HealthcareInfoSecurity conducted the Healthcare Information Security Today survey to provide an in-depth assessment of the effectiveness of data protection efforts.
doc 03/05/2012 September 2011 Business Benchmark Report
The report shows that all U.S. businesses have demonstrated an increase in slow payment compared with September 2010, with large businesses showing the greatest increase.
doc 08/09/2011 Best Practices in case of a Healthcare Data Breach
Customer turnover in response to a data breach continues to be a dominant factor in data breach costs. Learn what steps to take during the first 72 hours of a breach incident.
doc 06/19/2011 Understanding Changes in Credit Supply and Demand
The U.S. economy has experienced a record drop in consumer borrowing. Experian tracked a sample of credit-active consumers to show consumer deleveraging has occurred & demand for credit has declined.
webinarid 06/19/2011 Medical Identity Theft Trends: The Importance of Securing Healthcare Data
Learn about the findings from the Second Annual Survey on Medical Identity Theft and how it affects American consumers.
doc 05/25/2011 Insight Report: Fighting Fraud in the Government's Age of Austerity
Over $1 billion paid out in fraudulent benefit claims & social housing provision could be eradicated if simple fraud-prevention techniques were implemented more widely across the public sector.
doc 05/15/2011 First Party Fraud - trends, challenges and outlook
Businesses have many opportunities to uncover bottom-line savings with a focus on applying analytics and decisioning strategies at key process points to detect first-party fraud and minimize losses..
webinarid 04/11/2011 State Legislation Effects on Data Breach Resolution
This webinar discusses State data breach bills being considered in 2011, data breach incident response, and trends in data security legislation and regulation.
webinarid 04/07/2011 Personal Health Information at Risk: Issues and Answers
This webinar discusses consumers' privacy expectations, best practices for protecting data in compliance with HIPAA and HITECH, and what steps to take in the event of a data breach.
doc 04/01/2011 2011 a Year for Action
In the Nation's consumer credit markets, 2011 should prove to be the year of expanded recovery that 2010 was suppose to be.
doc 03/02/2011 Data Security Law in 2011: Responding to a Breach and Security Considerations for Engaging Vendors
Eventually, almost every company may need to respond to a threat or actual data breach. There are steps to prepare and to get through an incident. This paper provides some helpful considerations to responding to a data breach and vendor relationship practices regarding data breach risk.
doc 03/01/2011 Second Annual Survey on Medical Identity Theft
This survey reveals the lack of awareness many Americans have about medical identity theft and the devastating consequences it can have. These include financial loss, incorrect medical records and harm to their credit scores. Moreover, medical identity theft appears to be an easy crime to commit.
webinarid 01/01/2011 How Policy Will Shape Data Privacy in 2011
This webinar offer a brief overview of the changing landscape in data privacy and a look at how policymakers view the regulatory environment.
webinarid 01/01/2011 How to Decrease Fraud Losses while Creating Customer Loyalty
Breaches are about more than identity fraud. They are about placing brand equity and customer loyalty at serious risk.
webinarid 12/07/2010 A 360 View of a Data Breach
Find out what to do when there is a data breach, from investigation to notification.
doc 12/07/2010 Data Security Law in 2011: States Remain the Center of Attention
State laws requiring "reasonable" data security have had a positive impact, but data breach notification laws have had the most profound effect on the improvement of data security.
doc 12/01/2010 Data Breach Case Studies: From Incident to Resolution
An investigative approach to data breaches. Learn important lessons learned from data breach case studies where some key tactics were applied.
doc 11/19/2010 Legislative Update 2010: What's on the Horizon in DC & the States
The new law, called the Dodd-Frank Act, will change the way many large and small financial institutions operate, likely placing downward pressure on the availability of consumer credit.
webinarid 09/23/2010 How to Conduct a HITECH Risk Assessment
View this webinar to learn new insights into what you can do to proactively address HITECH compliance.
doc 09/01/2010 Risk Assessment in a HITECH World - Healthcare Privacy and Security
Learn the why and how of conducting a risk assessment for compliance with HITECH. Find out what approaches you should take and who should be involved to minimize vulnerability in healthcare privacy and security issues.
webinarid 08/15/2010 Data Breaches in 2010: Causes Consequences, and How to Prepare Your Organization
This webinar discusses do's and don'ts about how to react in the face of sudden data loss and gain key insights into developing a proactive data breach preparedness plan.
doc 06/01/2010 Solutions & Best Practices for Addressing a Healthcare Data Breach
Healthcare data breaches are an increasing issue & this paper addresses reasons for that. Find out what you need to know about data breach best practices in healthcare data breach resolution.
doc 04/15/2010 Consequences of Medical Identity Theft & Healthcare Data Breaches
An estimated 1.4M Americans were victims of medical identity theft in '09. This white paper addresses the impact of a breach to consumers and the business and provides data to support the conclusions.
doc 04/01/2010 The Future of Credit Card Underwriting
The card lending community is facing increasingly tighter regulations, restrictive lending criteria and continued economic challenges which will continue to impact how the industry does business going forward.
doc 04/01/2010 The Changing Mortgage Landscape
Supply and demand across the credit risk spectrum Experian? analyzed the levels of supply and demand of consumer mortgage credit prior to and after the market meltdown. The increasing rift in consumer behavior between those in the highest credit-quality brackets and those in the lower brackets necessitates a new perspective on the credit-active population that takes into account two or more distinct consumer groups.
doc 03/31/2010 About Medical Identity Theft and Healthcare Data Breaches
The frequency of medical identity theft is on the rise. Explore what that means to your company's and your client's risks of a medical data breach and potential loss of customer and brand loyalty.
doc 01/01/2010 Enhance Your Decision-Making Capabilities
A guide for improved business performance -- The purpose of this guide is to help you identify, prioritize and implement enhanced decision-making capabilities for improved business performance. It is organized in three sections: Identity, Prioritization, Implementation.
doc 01/01/2010 Portrait of a Fraud Victim: Affluent Suburbans Most at Risk
Experian has produced a powerful and descriptive portrait of identity fraud victims. This analysis makes it clear that affluent suburbans top the list as the most at-risk consumers.
doc 10/01/2009 Combating the Rising Tide of Medical Identity Theft
A data breach can be a gold mine for medical identity thieves. Learn about medical identity theft and how fraud resolution experience can help resolve the damaging consequences.
doc 05/01/2009 Data Breach Response Best Practices Prepared for Experian
Data Breaches have become commonplace ? 26% of U.S. consumers have received data breach notifications. This report lists best practices for organizations before, during, and after a data breach.
doc 11/21/0201 Data Breaches - 2010
This paper discusses how data breaches happen and what your organization can do to prepare.
  • © 2012 Experian Information Solutions, Inc. All rights reserved.