Fraud Prevention, Cybersecurity and Identity Proofing

114 Fraud Prevention assets found.

  • How to modernize fraud prevention in five steps
    Document Published Date: Nov 21, 2017

    Fraudsters are determined and relentless. With constantly evolving schemes and alternative methods, fraud prevention has become more difficult than ever. Factor in economic conditions, regulatory requirements and resource limitations and you might feel like it’s impossible to keep pace. So, how can you stay a step ahead?

    These five strategies can help you outmaneuver fraudsters— decreasing risk while ensuring the positive experience your customers deserve.

  • You asked… We answered.

    We’re answering you’re your questions around synthetic identity fraud. During the QA session of our Synthetic identity fraud: Fake customers presenting real risk webinar, we had a number of questions we simply couldn’t answer within the allotted time.

    Our Experian experts, as well as those from Aite, provide responses that we want to share with you now.

    We’re committed to helping you mitigate fraud risk. Get your answers now.

  • Shining a Light on Synthetic Identity Fraud
    Document Published Date: Nov 20, 2017

    Keir Breitenfeld, Senior Business Consultant, recently sat down with host, Cameron D’Ambrosi on the State of Identity Podcast to discuss the emergence of synthetic identity fraud, its true financial impact and how organizations can begin to fight back.

  • The impact of Synthetic ID fraud on your organization
    Infographics Uploaded Date: Nov 16, 2017

    It’s not easy to gauge exactly how much is being lost to synthetic ID fraud industry-wide. View our Infographic to see the impact of Synthetic ID.

  • The risk of synthetic identity fraud is growing at an alarming rate. Associated losses with this this type of fraud are estimated to be in the billions, and increasing exponentially. But it can be stopped — we'll to tell you how.

    Experian and guest presenter from Aite Research, dive into how businesses and customers are being affected, look at how a synthetic identities are created and best practices to mitigate the risk.

    Watch the webinar on demand, here. Download the slides, click below.

    Experian is committed to helping you mitigate synthetic identity fraud. Learn more about our capabilities here.
  • Modernizing Identity Proofing in Government
    Document Published Date: Oct 1, 2017

    To detect and fight fraud, government relies on identity proofing. The National Institute of Standards and Technology (NIST) defines identity proofing as a means “to establish the uniqueness and validity of an individual’s identity to facilitate the provision of an entitlement or service.”

    We partnered with GovLoop to share how to implement a modern, effective identity proofing strategy at your government agency.

  • Hardly a week goes by without the media reporting a large scale hack of sensitive personal or account information. Increasingly, the public seems resigned to believe that such compromises are the new normal, producing a kind of breach fatigue that may be lowering the expectations consumers have for identity and online security. Still, businesses must continue to apply comprehensive, data driven intelligence that helps thwart both breaches and the malicious use of breached information and protect all parties’ interests.

  • Protecting the Customer Experience
    Document Published Date: Jul 14, 2017

    Fraud continues to grow and evolve, affecting consumers, businesses and agencies alike. As technologies evolve and information security tightens, the savvy nature of fraudsters becomes more sophisticated. Fraudsters are continually striving to be one step ahead of the next fraud-prevention strategy. As consumers move from face-to-face interaction to online and mobile transactions, there is a pressing need for more elaborate and accurate fraud prevention.

  • The three pillars of identity relationship management
    Document Published Date: Jul 13, 2017

    Identity relationship management is the next generation of identity management. Identity relationship
    management isn’t just knowing who a person is (or is not) or may (or may not) be at a particular point in time.
    Rather, it links people, places and things and enables a dynamic, context-based strategy that organizations
    can apply confidently throughout the User or Customer Life Cycle.

  • Video | The latest insights on e-commerce fraud
    Video Uploaded Date: May 10, 2017

    Our recent analysis shows that e-commerce fraud attack rates have spiked more than 30 percent over the last year. With the recent switch to EMV, data breaches and automation are driving online fraud more than ever.

    Experian® analyzes e-commerce fraud attack rates biannually by both shipping and billing locations. Fraud attack rates show the attempted fraudulent e-commerce transactions against the population of overall e-commerce orders. Download the listing of Top 100 ZIP codes in the United States for 2016.

    Watch this video and click here to check out our latest e-commerce fraud heat map.

  • The Very Real Consequences of Synthetic Identities
    Document Published Date: Apr 26, 2017

    First-party fraud is resurging. This is why we recently partnered with CEB TowerGroup to create a co-branded insight brief, entitled The Very Real Consequences of Synthetic Identities, to provide you an overview of synthetic fraud and some strategies that can help prevent this fraud. Some key points from the brief include:

    • Defining synthetic identity
    • Methods by which criminals hide among us
    • Combatting SID
    • Checklist for a progressive approach for the discovery and resolution of the SID epidemic

  • With the recent switch to EMV and more than 4.2 billion records being exposed by data breaches last year, attackers are migrating their fraud attempts to the card-not-present channel.

    Join Experian and our guest presenter Julie Conroy from Aite Research Group to learn how businesses and customers are being affected by e-commerce fraud. Gain valuable insight and deeper understanding into:

    • Where fraud attacks are increasing across the U.S. and fraud trends from 2016
    • How attackers are exploiting EMV and the challenges it may be creating
    • What are the most common instances of e-commerce fraud and how it happens Strategies to react to the ever-changing fraud landscape
  • Has fraud met its match?
    Document Published Date: Feb 24, 2017

    Many companies use a traditional form of authentication that uses identity elements -- such as Social Security number, date of birth, name and address -- provided by and applicant and then compares these data points to data from trusted sources, such as credit bureaus. Problematically, most of this data has already been stolen, making this form of authentication unreliable.

    In this CSO Magazine article, Keir Breitenfeld, senior business consultant at Experian, discusses new and dynamic authentication factors that help prevent identity theft while devaluing data for fraudsters. Download the full resource to learn more.

  • Identity proofing insights and best practices
    Document Published Date: Feb 1, 2017

    It’s time to start thinking of yourself as an identity-proofing expert. You’ll be grateful when you are confidently authenticating individuals while delivering a great user experience.

    This paper provides our perspective on identity proofing and risk-based authentication — and more specifically — how those activities may be leveraged for remote access to information systems. Content provided is intended to highlight current industry conditions, risk-based authentication concepts and best practices, and lastly how our expertise with comprehensive identity proofing and risk-based authentication can help you mitigate risk while delivering a great user experience.

  • One year later: Do you know where criminals are concentrating their attention, and how to protect yourself against emerging fraud trends since the rollout of the EMV chip? We have the details on these new vulnerabilities to help you stay at the top of your game.

    In our latest white paper, you will learn where criminals are actively probing the credit card industry for new vulnerabilities; how e-commerce fraud and address manipulation fraud are being impacted the most, and discover how to protect yourself from these fraud schemes.

  • Last year, mobile made up a third of all U.S. commerce. And in banking, the mobile channel is quickly becoming the customer’s preferred channel. The mobile channel offers many opportunities for your business and your customers — and unfortunately for fraudsters too.

    Go beyond understanding fraud protection and the customer experience in your offline and online channels. Give your customers the freedom they need to do anything in any channel, without taking on more risk.

    Gain valuable insight and deeper understanding of the complex world of mobile fraud management, effective mobile fraud strategies in practice, and tips for evaluating your mobile fraud strategy.

  • The Evolution of Identity Management
    Document Published Date: Mar 28, 2016

    Don't get blind sided - Gain insight in establishing an identity management strategy that will adapt to new challenges, authenticating users, mitigating risk, adhering to regulatory constraints without impeding the user experience, and more.

  • Business Case for Fraud Prevention Compliance Requirements
    Document Published Date: Mar 22, 2016

    Justifying financial investment for compliance and fraud prevention technology is challenging. Understanding the benefits of such a robust program that supports both risk mitigation and the customer experience is essential to building the business case for fraud prevention.

  • Webinar: Chipping away at EMV myths
    Document Published Date: Oct 30, 2015

    As a growing number of businesses and consumers across the U.S. are learning and adjusting to new EMV credit cards, many still question the impact EMV will have on protecting consumers and businesses from increasingly savvy and sophisticated criminal fraud rings. Join Experian and our panel of experts as we look at how businesses are faring one month into the EMV liability shift.

  • Interactive eBook: Protecting the Customer Experience
    Document Published Date: Aug 13, 2015
    Fraud continues to grow and evolve, affecting consumers, businesses and agencies alike. As technologies evolve and information security tightens, the savvy nature of fraudsters becomes more sophisticated. Fraudsters are continually striving to be one step ahead of the next fraud-prevention strategy. As consumers move from face-to-face interaction to online and mobile transactions, there is a pressing need for more elaborate and accurate fraud prevention.
  • Data Breach Response Guide 2014-2015 Edition
    Document Published Date: Jul 8, 2015
    According to a recent data breach preparedness study by the Ponemon Institute, much has changed in the world of data breaches in the past year; some are positive, others a bit more challenging. It's no secret that, according to the study, more companies suffered a data breach in 2013 versus the year before. To date, nearly half of organizations have experienced at least one breach incident that impacted personal records; an increase of 10% from 2013, and 17% were unsure if they had been victimized. Fortunately, more companies are taking basic steps to prepare themselves for the increasing likelihood of a breach. A majority of them (73%) now have a data breach response plan in place and nearly half have increased their investment in security technologies in the past 12 months. Vigilance is key. The more organizations can do to prepare themselves, by developing and maintaining a comprehensive data breach response plan, the better off they will be in the months and years to come.
  • With 2014 holiday sales in the United States topping $616 billion, many merchants may find it necessary to make adjustments to their fraud-prevention rules to accommodate this increased volume. Our data shows that using this information in more insightful ways helps our merchant apply the right fraud-prevention strategies at the right time.

  • Highlights of how a customer-centric fraud prevention strategy can help drive revenue. Fraudnet eCommerce results compared to industry averages
  • With a mix of consumer vigilance and the right protections in place, organizations can protect themselves from attacks, while keeping access available to customers. Learn about the implications data breaches can have on your business.
  • Experian and Moody's Analytics team up to review key findings from the latest Experian/Moody's Small Business Credit Index Q2 2014 report. Learn more about what the small business credit trends could mean for you and your business.
  • Role of Balanced Fraud Management
    Video Uploaded Date: Aug 18, 2014
    Learn to identify, authenticate and prevent fraud Join our panel of experts and learn how to navigate complex and evolving cyber risks within your organization, without sacrificing the customer experience or increasing security vulnerabilities. Our panel will explore: Trends in identity and online fraud, Strategies and tactics to fine-tune fraud risk practices, How to apply intelligence to identify risks before they occur
  • Knowing who you are doing business with isn¿t just a sound business practice to protect your bottom line; in many cases, it also is a legal requirement. Identity verification techniques have been evolving over the past few years to meet business priorities beyond fraud prevention, including customer experience, operational costs and regulatory compliance.
  • Technology is allowing clients to utilize a number of new and different emerging channels to conduct business, with mobile seeing the greatest increase in usage. Learn more about the challenges of protecting customers in a mobile environment.
  • Customers have a legitimate expectation that the institutions with which they do business will safeguard their identities, accounts and sensitive data. When fraud or a data breach occurs, that trust can be broken. All the work an institution has done to build its brand image can be damaged suddenly. With the right controls in place, even when customer information is compromised organizations can easily tell the difference between good customers and fraudsters.
  • Cybercriminals have become more proficient at stealing data and account credentials. Criminals have learned that they can achieve bigger monetary gains over longer periods of time through undetected access and maintaining a persistent, long-term presence in critical business environments. Our panel of experts will help you learn how to navigate complex and evolving cyber risks without sacrificing the customer experience or increasing security vulnerabilities.

  • Following a full year of steady improvement, small-business credit conditions stumbled during the first quarter of 2014. Credit balances receded slightly from the end of 2013 and the delinquency rate ticked higher to 9.8 percent from 9.6 percent. The setback was fueled in part by harsh winter conditions which may have also slowed employment gains. Weaker GDP growth and a decelerated retail sales growth rate of only 0.3 percent also contributed to the Q1 shortcoming.
  • The availability and opportunities for customers to conduct business through mobile devices continues to multiply, challenging organizations to protect customers without impacting their experience. Understand five challenges of customer authentication in an increasingly mobile world.
  • Institutions can have difficulties identifying fraud risks at the point of origination, and this challenge has expanded as mobile and online channels have become widely used by consumers. At the same time, fraudsters' techniques are becoming increasingly sophisticated. To compensate, organizations have had the choice of either implementing very tough identity-proofing standards ¿ risking turning away legitimate customers ¿ or lessening their criteria and opening themselves to increased risk.
  • Experian and Moody's Analytics team up to review key findings from the latest Experian/Moody's Small Business Credit Index Q4 2013 report. Learn more about what the small business credit trends could mean for you and your business.
  • Our study, Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes Explored, examines consumers¿ perceptions about sharing their personal information when using online health services and mobile apps. It also reveals the practices believed to be important to protecting personal health information from a possible data breach.
  • Small-business credit conditions improved for the fourth consecutive quarter in the final three months of 2013. The Experian/Moody's Analytics Small Business Credit Index advanced 1.2 points to 117 from a revised 115.8 (previously 118.5*) in the third quarter. The fourth quarter reading is the highest since data tracking for the index began and is a solid indication that small businesses are finally reaping some of the benefits of the nearly five-year-old U.S. recovery.
  • Experts from Experian and Moody's Analytics join forces to discuss key findings from the 2013 Q3 Small Business Credit Index and provide insight into what's driving small business credit.
  • 2014 Data Breach Industry Forecast
    Document Published Date: Nov 21, 2013
    The number of data breaches both experienced and reported is expected to continue to rise, with new security threats and regulations pushing for more transparency on the horizon. All signs are pointing to 2014 being a critical year for companies to better prepare to respond to security incidents and data breaches.
  • Small-business credit quality improved markedly in the third quarter, lifting the Experian/Moody's Analytics Small Business Credit Index 2.3 points higher to 118.5 from an upwardly revised 116.2 (previously 111.7*) in the second quarter. The most recent index value is the highest since its inception and is an encouraging sign that small firms' financial houses are finally starting to fall into order. The index measures credit quality for firms with fewer than 100 workers and has trended upward for the past year. Credit balances expanded at their fastest pace in at least two years, and the delinquency rate has fallen consistently. Ten percent of outstanding small-business credit balances were past due in the third quarter, down 0.7 percentage point from a year ago and the smallest share since the recovery began. *Recalibration of the index led to the larger-than-average revision.
  • Experian and Moody's representatives discuss key findings in the most recent Experian/Moody's Small Business Credit Index report for Q2 2013 and explore regional small business credit trends.
  • The Rekindling Success white paper uncovers your portfolio's hidden potential using advanced triggers to prevent risk

  • Small-business credit conditions strengthened in Q2, lifting the Experian/Moody's Analytics Small Business Credit Index to the highest level since it began tracking in 2010. Though small-business recovery has been inconsistent regionally, findings from the report indicate that firms have steadily reduced their delinquent debt over the past year. Balance volumes for all business sizes receded measurably from last year, bringing down delinquency rates. Furthermore, credit quality has strengthened for every business size. At an average of 10.2 percent, the total share of delinquent dollars is 2.4 percentage points lower than it was a year ago and is at the lowest point on record. Looking forward, small-business credit quality is expected to continue improving at a modest pace until spending growth accelerates sometime in 2014.
  • Data Breach Response Guide - Recently Updated
    Document Published Date: Aug 23, 2013
    Data breaches are hitting business in nearly every industry. If you aren't prepared, you're already behind - even if you've never experienced a breach. Learn how to develop your response plan and build your response team before you need them. Recent updates include information directed toward entities dealing with healthcare related information regarding the HIPAA Omnibus Rule and the complexities they might encounter in fielding a data breach, as well as an updated section around the current legal landscape and the work being done there.
  • The First 24 Hours Data Breach Resolution Checklist
    Document Published Date: Aug 8, 2013
    Acting quickly following a data breach can help you regain your security, preserve evidence and protect your brand. Make these tips the first steps you take toward data breach resolution.
  • With the increasing cost and volume of data breaches, cyber security is quickly moving from being considered by business leaders as a purely technical issue to a larger business risk. This shift has spurred increased interest in cyber insurance to mitigate the cost of these issues. In a new study sponsored by Experian® Data Breach Resolution, Ponemon Institute surveyed risk management professionals across multiple sectors that have considered or adopted cyber insurance. Based on responses, many understand that security is a clear and present risk. Indeed a majority of companies now rank cyber security risks as greater than natural disasters and other major business risks.
  • Although higher tax burdens on U.S. households were expected to make it more difficult for small companies to pay down debts, small business credit conditions improved in the first quarter of 2013, reversing much of the deterioration seen during Q4 2012. The improvement in credit quality has largely been the result of firms keeping a tight lid on labor costs. And while the overall picture has brightened for small companies over the past year, credit conditions are improving unevenly, both by firm size and geographically. Looking at the future, buyers are expected to continue closely watching their finances through the next quarter, limiting their discretionary spending which will cap revenue gains at small companies. Additionally, small-firm employment is likely to stay flat through the fall in preparation for "Obamacare" taking into effect in 2014.
  • Cyber Insurance 3.0: Risks, Rewards and Future Outlook
    Document Published Date: Jun 6, 2013
    Cyber insurance, the fastest-growing specialty line in the commercial market, is rapidly becoming vital to the financial health of organizations. Although it has been available since the late 1990s, cyber insurance is now gaining momentum among small and mid-sized organizations. In the past, it was primarily purchased by large and high-tech companies. It is no coincidence that the popularity of cyber insurance is escalating along with the number of data breach incidents. Whether caused by a hacker or human error, the frequency and severity of breaches are increasing.
  • In this latest podcast, Answer Man Ozzie Fonseca, Senior Director of Experian® Data Breach Resolution discusses how cyber insurance can help organizations in the event of a data breach. Ozzie interviews Katherine Keefe from Beazley Insurance where she leads the Beazley Breach Response services.
  • CFO eBook: Lending in Limbo
    Document Published Date: May 14, 2013
    The commercial lending landscape has changed. Larger in number but smaller in dollar volume, small-business loans take up more resources and may not be as profitable in the long run to banks, making them less of a focus. Lending in Limbo gives techniques and solutions for the commercial lenders when lending to small businesses. The solution is to be part of ending this crisis, in which other organizations have implemented.
  • Small business credit quality continued to deteriorate in the fourth quarter as the Experian/Moody's Analytics Small Business Credit Index dropped 6.8 points to land at 97.3, its lowest reading during our observation period. The index was driven lower by a slowdown in personal income growth and an increase in delinquent balances, which kept retail sales in check and drove small business revenues lower. Over the next few months, small companies will face setbacks as buyers adjust to smaller paychecks and hiring is quelled by political uncertainty, but credit quality is expected to improve by year's end and going into 2014.
  • Navigating A Healthcare Data Breach eBook
    Document Published Date: May 10, 2013
    The healthcare industry is constantly evolving with new procedures and technology in the operating room. The same is needed in the back office, where data security can either make or break an organization. Given HIPAA¿s stricter new regulations, with which organizations have until September 23, 2013 to comply, the time for making small strides in security, privacy and data breach preparedness is over. This eBook provides 5 takeaways from lessons learned from the field.
  • The latest study from the Ponemon Institute, sponsored by Experian® Data Breach Resolution How prepared is your company for a material data breach involving the loss or theft of more than 1,000 records containing sensitive or confidential business information? How would you grade the incident response plans in place that would reduce such negative consequences as the loss of reputation, customer loyalty and regulatory fines? In a new study sponsored by Experian® Data Breach Resolution, Ponemon Institute surveyed a representative sample of privacy and compliance leaders in various-sized organizations in the United States on the following topics: - Expectations that their organizations will experience a material data breach resulting in loss of customer trust, regulatory fines, loss of customer and negative public opinion - Data security practices in place to avoid a material data breach - The existence of a quality data breach preparedness plan
  • Learn How To Accelerate Your Breach Response
    Podcast Uploaded Date: Mar 12, 2013
    Ozzie Fonseca, Senior Director of Experian® Data Breach Resolution, interviews Miriam Wugmeister, who chairs the global privacy and data security group at the law firm of Morrison Foerster.
  • Answer man Bob Krenek, also known as Experian's Senior Director of Data Breach Resolution, interviews healthcare attorney Paula Stannard about changes coming down the pike. Stannard, an attorney with Alston & Bird, explains why she believes the new regulations will result in an enormous rise in the number of incidents being classified as healthcare breaches.
  • Ponemon Study: Securing Outsourced Customer Data
    Document Published Date: Feb 7, 2013
    The purpose of the study is to understand the frequency of data breaches when consumer data is outsourced, steps taken to ensure vendors' data stewardship and differences in privacy and security practices between companies that outsource and their vendors.
  • Fifth Annual HIMSS Security Survey
    Document Published Date: Dec 12, 2012
    This survey reports the opinions of information technology (IT) and security professionals from healthcare provider organizations across the U.S. regarding the tools and policies they have in place to secure electronic patient data.
  • Issue Brief: Beyond Traditional Eligibility Verification
    Document Published Date: Dec 6, 2012
    How Data and Analytics Can Reduce Fraud and Deliver Better Program Compliance
  • This case study explains how PC Mall was able to manage risk across the Customer Life Cycle with quality data delivered through implementation of BusinessIQ, an offering from Experian Business Information Services.
  • This case study explains how LEAF, an equipment leasing and financial company for dealers, resellers, manufacturers and distributors, is able to stay competitive by refining its business strategies and focusing on development of more profitable account relationships with Experian business credit reports as well as membership in the Small Business Credit Share consortium.
  • This case study details how Interline Brands used automated decisioning tools and centralized their credit management platform online with Business Information Services to identify risky accounts more effectively and improve profitability.
  • Data Breach Case Study of Lessons Learned from the Field
    Document Published Date: Nov 5, 2012
    Data breaches just don't quit, and, for the most part, that's bad news for consumers and businesses. But there's good news too, in the lessons learned from recent events. The business community now has multiple points of reference about what works and what doesn't in breach preparedness and response.
  • This case study details the deployment of a Business Information Services tool that helped a large distributor of foodservice equipment and supplies with account management and continuing their double-digit sales growth.
  • Identity proofing: an Experian Public Sector white paper
    Document Published Date: Nov 1, 2012
    A risk-based approach to agency identity proofing: Experian's lessons learned and best practices for government agencies.
  • Guide to Building Smart Business Credit
    Document Published Date: Oct 17, 2012
    Understanding how to build business credit is important. It can save you money, establish valuable commercial relationships, and grow your company. This guide provides clear, concise advice on how to develop business credit over the long haul.
  • Cyber Insurance and Your Data Breach Response Plan
    Document Published Date: Oct 11, 2012
    In recent months, several entities have publicly announced being affected by cyber incidents. Almost daily, online accounts are hacked, external hard drives are stolen and thumb drives are lost.
  • A Widening Focus: Setting Your Sights on Growth Companies
    Document Published Date: Oct 4, 2012
    Small and mid-sized customers are becoming a steadier source of profits for large companies so risk and credit management strategies at companies should be revised to improve evaluation of these prospects.
  • Today, more than ever, healthcare companies are at risk for the potential loss of medical records for reasons that vary from employee negligence to the ill-intent of a hacker who stands to gain a premium for medical information on the black market. So how will your organization conquer the hurdles and consequences of a data breach especially in the most important first 24 hours?
  • Findings from the Q2 2012 Experian/Moody's Analytics Small Business Credit Index report finds small business credit conditions have improved slightly amid economic concerns.
  • This paper explores how this new weapon helps detect identity theft and other fraud, how data velocity can prove the key to predicting identity theft, and how to still deliver a strong and quick return on investment.
  • This white paper presents some of these latest trends affecting the small-business lending landscape. Specifically, it illuminates how companies are using the new robust data sources and analytic tools--from consortium data to rapid model customization--to maximize their interactions with small-business clients with greater accuracy.
  • This annual study on medical identity theft is designed to determine how pervasive this crime is in the United States and how it has affected consumers.
  • The new 2012 Consumer Study on Data Breach Notification by the Ponemon Institute finds consumers are critical of the notification letters they receive.
  • HealthcareInfoSecurity conducted the Healthcare Information Security Today survey to provide an in-depth assessment of the effectiveness of data protection efforts.
  • Unlocking the Value in Business Information
    Document Published Date: Apr 9, 2012
    As hopes for a robust return to market growth continue to dim, and as companies increasingly find that cost-cutting alone is no longer enough to protect the bottom line, finance executives are being challenged to do even more with even less. For companies striving to find secure paths to business expansion, growing profitably may mean learning much more about their customer base- both their current customers and the customers they haven't yet acquired.
  • Learn how finance executives are gaining valuable intelligence on customers, on operating performance, and on potential risks -- and how they're using that knowledge to help their companies grow securely in an uncertain world.
  • Ponemon Institute: The Reputation Impact of a Data Breach
    Document Published Date: Mar 6, 2012
    According to this study, fifty-four percent of companies believe it can take 10 months to more than two years to restore a company's reputation following a breach of customer data. Find out what else executives are saying about how a data breach can affect the reputation and image of an organization.
  • A Survey on Healthcare Information Security
    Document Published Date: Mar 6, 2012
    This survey reveals that 43 percent of healthcare organizations grade their ability to counter information security threats as poor, failing or in need of improvement. This can lead to an increased risk of a data breach. Learn what preparing for a data breach means and the steps that need to be taken from our industry experts.
  • Ponemon Institute: The Aftermath of a Data Breach
    Document Published Date: Mar 6, 2012
    The Aftermath of a Data Breach study by the Ponemon Institute shares the insights of IT professionals with actual experience dealing with a breach.
  • December 2011 Business Benchmark Report
    Document Published Date: Jan 31, 2012
    The Business Benchmark Report is a quarterly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at four key indicators of business health.
  • September 2011 Business Benchmark Report
    Document Published Date: Oct 18, 2011
    The report shows that all U.S. businesses have demonstrated an increase in slow payment compared with September 2010, with large businesses showing the greatest increase.
  • Security is a business risk which must be accounted for in every organization¿s enterprise risk management plan. Find out how to protect your business.
  • June 2011 Business Benchmark Report
    Document Published Date: Aug 23, 2011
    The Business Benchmark Report is a quarterly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at four key indicators of business health.
  • Best Practices in case of a Healthcare Data Breach
    Document Published Date: Aug 9, 2011
    Customer turnover in response to a data breach continues to be a dominant factor in data breach costs. Learn what steps to take during the first 72 hours of a breach incident.
  • March 2011 Business Benchmark Report
    Document Published Date: Jul 1, 2011
    The Business Benchmark Report is a quarterly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at four key indicators of business health.
  • Learn about the findings from the Second Annual Survey on Medical Identity Theft and how it affects American consumers.
  • Over $1 billion paid out in fraudulent benefit claims & social housing provision could be eradicated if simple fraud-prevention techniques were implemented more widely across the public sector.
  • State Legislation Effects on Data Breach Resolution
    Webinar Published Date: Apr 11, 2011
    This webinar discusses State data breach bills being considered in 2011, data breach incident response, and trends in data security legislation and regulation.
  • Personal Health Information at Risk: Issues and Answers
    Webinar Published Date: Apr 7, 2011
    This webinar discusses consumers' privacy expectations, best practices for protecting data in compliance with HIPAA and HITECH, and what steps to take in the event of a data breach.
  • Eventually, almost every company may need to respond to a threat or actual data breach. There are steps to prepare and to get through an incident. This paper provides some helpful considerations to responding to a data breach and vendor relationship practices regarding data breach risk.
  • Second Annual Survey on Medical Identity Theft
    Document Published Date: Mar 1, 2011
    This survey reveals the lack of awareness many Americans have about medical identity theft and the devastating consequences it can have. These include financial loss, incorrect medical records and harm to their credit scores. Moreover, medical identity theft appears to be an easy crime to commit.
  • December 2010 Business Benchmark Report
    Document Published Date: Jan 31, 2011
    The Business Benchmark Report is a quarterly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at four key indicators of business health.
  • Breaches are about more than identity fraud. They are about placing brand equity and customer loyalty at serious risk.
  • How Policy Will Shape Data Privacy in 2011
    Webinar Published Date: Jan 1, 2011
    This webinar offer a brief overview of the changing landscape in data privacy and a look at how policymakers view the regulatory environment.
  • State laws requiring "reasonable" data security have had a positive impact, but data breach notification laws have had the most profound effect on the improvement of data security.
  • A 360 View of a Data Breach
    Webinar Published Date: Dec 7, 2010
    Find out what to do when there is a data breach, from investigation to notification.
  • Data Breach Case Studies: From Incident to Resolution
    Document Published Date: Dec 1, 2010
    An investigative approach to data breaches. Learn important lessons learned from data breach case studies where some key tactics were applied.
  • Data Breaches - 2010
    Document Published Date: Nov 21, 2010
    This paper discusses how data breaches happen and what your organization can do to prepare.
  • The new law, called the Dodd-Frank Act, will change the way many large and small financial institutions operate, likely placing downward pressure on the availability of consumer credit.
  • November 2010 Business Benchmark Report
    Document Published Date: Nov 1, 2010
    The Business Benchmark Report is a monthly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at 4 key indicators of business health.
  • September 2010 Business Benchmark Report
    Document Published Date: Oct 31, 2010
    The Business Benchmark Report is a quarterly look at how U.S. businesses are faring. Designed to monitor the progress of business recovery, the report looks at four key indicators of business health.
  • October 2010 Business Benchmark Report
    Document Published Date: Oct 1, 2010
    The national avg. days that businesses paid their bills beyond contracted terms remained flat when compared with September, but this metric has seen a 10% increase since the beginning of the year.
  • How to Conduct a HITECH Risk Assessment
    Webinar Published Date: Sep 23, 2010
    View this webinar to learn new insights into what you can do to proactively address HITECH compliance.
  • Learn the why and how of conducting a risk assessment for compliance with HITECH. Find out what approaches you should take and who should be involved to minimize vulnerability in healthcare privacy and security issues.
  • This webinar discusses do's and don'ts about how to react in the face of sudden data loss and gain key insights into developing a proactive data breach preparedness plan.
  • August 2010 Business Benchmark Report
    Document Published Date: Aug 1, 2010
    The percentage of dollars delinquent has increased by 6%. This has been following a consistent trend over the last 6 months, where percentage of dollars delinquent has shown a 14% increase.
  • July 2010 Business Benchmark Report
    Document Published Date: Jul 1, 2010
    The national average number of days that businesses paid their bills beyond contracted terms increased by 2 percent in July compared with June.
  • Healthcare data breaches are an increasing issue & this paper addresses reasons for that. Find out what you need to know about data breach best practices in healthcare data breach resolution.
  • An estimated 1.4M Americans were victims of medical identity theft in '09. This white paper addresses the impact of a breach to consumers and the business and provides data to support the conclusions.
  • About Medical Identity Theft and Healthcare Data Breaches
    Document Published Date: Mar 31, 2010
    The frequency of medical identity theft is on the rise. Explore what that means to your company's and your client's risks of a medical data breach and potential loss of customer and brand loyalty.
  • Combating the Rising Tide of Medical Identity Theft
    Document Published Date: Oct 1, 2009
    A data breach can be a gold mine for medical identity thieves. Learn about medical identity theft and how fraud resolution experience can help resolve the damaging consequences.
  • Data Breach Response Best Practices Prepared for Experian
    Document Published Date: May 1, 2009
    Data Breaches have become commonplace ? 26% of U.S. consumers have received data breach notifications. This report lists best practices for organizations before, during, and after a data breach.