Identity Theft

Loading...
3 Steps To Ease Your Cyber Security Spring Cleaning Ef...

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of...

Read More 3 Steps To Ease Your Cyber Security Spring Cleaning Efforts
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Must-do Resolutions to Improve Your Small Business’ Cy...

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that...

Read More Must-do Resolutions to Improve Your Small Business’ Cyber Security
Infographic: Security Concerns Cause Pain for Consumer...

This latest study from the Ponemon Institute examines consumer’s sentiment towards security of eHealth Resources. The study finds that attitudes and behaviors towards online activities change, based on consumer’s perceptions and privacy security concerns. Download the study here...

Read More Infographic: Security Concerns Cause Pain for Consumers using eHealth Resources
Identity Protection Tips to Share with Employees Trave...

Online shopping during coffee breaks, an extra buzz of excitement in the air, gift exchanges and parties in the break room – many companies are understanding and even relaxed about their employees’ holiday distractions. Nurturing that holiday atmosphere can be morale-boosting for everyone, but while you’re enjoying the holidays...

Read More Identity Protection Tips to Share with Employees Traveling for the Holidays
Is Your Data Secure for Small Business Saturday?...

Small Business Saturday – the Saturday immediately following Black Friday – is meant to encourage consumers to patronize small businesses across the country during a season that is make or break for many of them. Like many small businesses, you probably hope the day will be an opportunity to...

Read More Is Your Data Secure for Small Business Saturday?
Cyber Security Month: Are You Helping Raise Awareness?...

2013 marks the 10th anniversary of the Department of Homeland Security’s October Cyber Security Awareness Month, aiming to raise consumer awareness of cyber risks and safety measures. Whether you’re a small business owner, health care provider, financial services commpany or technology executive, your own awareness of cyber security and...

Read More Cyber Security Month: Are You Helping Raise Awareness?
National Protect Your Identity Week Arrives: Are You H...

National Protect Your Identity Week, Oct. 20 to 26, provides a prime opportunity to talk to your staff about identity protection. We know from multiple studies that workplace identity theft is a growing concern. Are you doing enough to help your employees protect themselves? While businesses routinely train employees...

Read More National Protect Your Identity Week Arrives: Are You Helping Your Employees?
Infographic: Winning the Identity Protection Race...

Only one data breach resolution company has the distinction of being part of the world’s largest credit bureau. That’s Experian® Data Breach Resolution, steeped in a history of swift incident response and consumer fraud protection.  We have thousands of incidents under our belt. Healthcare organizations, government agencies, universities and...

Read More Infographic: Winning the Identity Protection Race
How Many Data Breach Resolution Providers Does it Take...

In today’s data driven world, most security experts agree that when it comes to data breaches, most businesses need to recognize it’s not a matter of what to do “if “ they experience a breach but what to do WHEN they experience a breach. After an incident is first...

Read More How Many Data Breach Resolution Providers Does it Take?
Cyber Security Requires a Three-stage Approach to Data...

Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource Center (ITRC). Perpetrated against companies large and small, these breaches compromised more than 4.6 million records....

Read More Cyber Security Requires a Three-stage Approach to Data Breach Prevention
Reborn CISPA cyber security bill experiences déjà vu...

Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection Act (CISPA) was reintroduced to the House by its authors Reps. Mike Rogers and Dutch Ruppersberger, heads of the House...

Read More Reborn CISPA cyber security bill experiences déjà vu