Data Breach

Loading...

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading...

Published: May 11, 2016 by Michael Bruemmer

What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling...

Published: April 19, 2016 by Guest Contributor

Our second annual data breach preparedness study,Is Your Company Ready for a Big Breach?, conducted by the Ponemon Institute, reveals good news and bad...

Published: September 30, 2014 by Michael Bruemmer

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the...

Published: June 26, 2014 by Guest Contributor

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised....

Published: May 6, 2014 by Michael Bruemmer

An employee who never uses a mobile device – personal or company-supplied – for business purposes is becoming a rare creature, indeed. Use of...

Published: January 21, 2014 by Guest Contributor

The purpose of any type of insurance is to protect your most valuable assets. To combat the prevalence of cyber attacks anddata breaches, an...

Published: June 4, 2013 by Guest Contributor

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had adata breachinvolving consumer...

Published: April 15, 2013 by Guest Contributor

In today’s data driven world, information is king. So if you are not armed with the same information as your competitor or worse, experience...

Published: February 14, 2013 by Guest Contributor

While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential formedical data breachesespecially as...

Published: November 1, 2012 by Michael Bruemmer

Within the world of cyber security, a great deal of attention has been focused lately on the escalating hazards and frequency of data breaches,...

Published: January 17, 2012 by Guest Contributor

Our guest blogger this week is Tom Bowers, Managing Director,Security Constructs LLC–a security architecture, data leakage prevention and global enterprise information consulting firm. The...

Published: September 6, 2011 by Michael Bruemmer

It seems as though every day the news headlines trumpet another high-profile data breach. The most recent marquee breach is courtesy of a Sony...

Published: May 3, 2011 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe