Quantcast
Channel: Breach Prevention – Data Breach Resolution
Browsing all 114 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Want to learn how you can save millions? Tune into our “Answer Men” podcast

Do you want to save millions – or in some cases – tens of millions of dollars? In the first of our new podcast series, Dr. Larry Ponemon, chairman of The Ponemon Institute, explains how.  Experian Data...

View Article



Image may be NSFW.
Clik here to view.

Dramatic changes on horizon for healthcare breach notifications

Healthcare data breaches will be treated much differently under the new HIPAA Omnibus rule. But do you know how? Find out in the latest installment of our “Answer Men” podcast series. Answer man Bob...

View Article

Image may be NSFW.
Clik here to view.

Five Tips to Combat a Denial of Service Cyber Attack

Who’s next? That’s a question probably lingering on the minds of many American banking executives these days. After all, eight U.S. banks were hammered by distributed denial of service (DDoS) cyber...

View Article

Image may be NSFW.
Clik here to view.

Don’t Be a Stranger at IAPP. Stop by the Experian Booth.

Is the IAPP Global Privacy Summit in your future? Well, it’s in ours. Join the Experian Data Breach team on March 6-8, 2013 at booth #18/19 to gain valuable insight on how to accelerate your response...

View Article

Image may be NSFW.
Clik here to view.

Learn how to accelerate your response to a breach

Responding to a data breach quickly and accurately is the key to minimizing damage and steering clear of litigation and hefty fines. In our third “Answer Men” podcast, a global privacy attorney offers...

View Article


Image may be NSFW.
Clik here to view.

Final ruling for HIPAA/HITECH Act protects patients from data breaches

By now you are aware that the much anticipated final ruling from the Department of Health and Human Services (HHS) regarding regulations implementing the security, privacy, and data breach notification...

View Article

Image may be NSFW.
Clik here to view.

Data breach numbers are up worldwide

In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in business and IT practices, cyber...

View Article

Image may be NSFW.
Clik here to view.

Tips to save your reputation following a big data breach

The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in...

View Article


Image may be NSFW.
Clik here to view.

Reborn CISPA cyber security bill experiences déjà vu

Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Requires a Three-stage Approach to Data Breach Prevention

Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource...

View Article

Image may be NSFW.
Clik here to view.

Breach Prevention Planning is Key to Data Security

No matter how popular or successful a brand is, recent data breaches occurring at several well-known consumer and social networking sites have demonstrated that no company is immune from a breach of...

View Article

Image may be NSFW.
Clik here to view.

California Takes a Hard Look at Data Breaches

Recently, California’s Attorney General Kamala Harris released a first-of-its-kind report, detailing the 2012 data breaches from her state. The report has generated strong conversation throughout the...

View Article

Image may be NSFW.
Clik here to view.

Are Employee Errors Elevating Your Data Breach Risk?

People make mistakes and the results can be catastrophic. A new study by the Ponemon Institute and Symantec now tells us employee error is more often to blame for the catastrophe of a data breach than...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Month: Are You Helping Raise Awareness?

2013 marks the 10th anniversary of the Department of Homeland Security’s October Cyber Security Awareness Month, aiming to raise consumer awareness of cyber risks and safety measures. Whether you’re a...

View Article

Image may be NSFW.
Clik here to view.

‘Security 500’ Report: Catching Up on Cyber Crime

Big or small, every American company needs to think about security. Security Magazine’s recently released 2013 “Security 500” report is a good indicator that companies across the country are broadening...

View Article


Image may be NSFW.
Clik here to view.

Is Your Data Secure for Small Business Saturday?

Small Business Saturday – the Saturday immediately following Black Friday – is meant to encourage consumers to patronize small businesses across the country during a season that is make or break for...

View Article

Image may be NSFW.
Clik here to view.

Must-Dos to Improve Your Business’ Cyber Security

As the year begins to ramp up, small business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them.Cyber security risks...

View Article


Image may be NSFW.
Clik here to view.

Auditing Your Data Breach Response Plan: The Never-ending Story

Business is not static; business plans and operating processes evolve to meet market changes and demand fluctuations. Data breach response plans shouldn’t be static either. Threats emerge and risks...

View Article

Image may be NSFW.
Clik here to view.

How Mobile Devices Can Imperil Your Organization’s Cyber Security

How Mobile Devices Can Imperil Your Organization’s Cyber SecurityAn employee who never uses a mobile device – personal or company-supplied – for business purposes is becoming a rare creature, indeed....

View Article

Image may be NSFW.
Clik here to view.

Data Breach News for the First Quarter of 2014

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber...

View Article
Browsing all 114 articles
Browse latest View live




Latest Images