Latest Post

Loading...
Connecticut gets serious about breach reporting...

Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report...

Read More Connecticut gets serious about breach reporting
IAPP Privacy Academy: Will you be there?...

Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an...

Read More IAPP Privacy Academy: Will you be there?
What does increased enforcement mean to you?...

Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid...

Read More What does increased enforcement mean to you?
Infographic: Our clients speak out...

Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our...

Read More Infographic: Our clients speak out
When are small businesses too small for data breach? N...

Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further from the truth. In fact, the latest Verizon data breach study “Verizon 2012 Data Breach Investigations Report” found that nearly 75 percent of the data...

Read More When are small businesses too small for data breach? Never
Congress fails to reach agreement on cybersecurity leg...

  Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the Administration and leadership in Congress for much of the past year, the Senate failed to reach agreement on a comprehensive cybersecurity bill before adjourning...

Read More Congress fails to reach agreement on cybersecurity legislation
U.S. beats Germany, U.K. and France when it comes to d...

The U.S. tops Germany, the U.K. and France when it comes to data breach notification costs. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen. The Ponemon Institute, which recently conducted a global data breach...

Read More U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?
Three things you should never do to identity theft vic...

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition...

Read More Three things you should never do to identity theft victims
Report gives readers the latest inside(r) scoop...

Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out...

Read More Report gives readers the latest inside(r) scoop
World-class scammers vie for Olympic gold...

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more...

Read More World-class scammers vie for Olympic gold
Three data protection strategies to catch a “phish”...

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from...

Read More Three data protection strategies to catch a “phish”
The top 5 cyber security threats to future of mobile b...

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful...

Read More The top 5 cyber security threats to future of mobile banking