News Recap: Financial Institution States There Is No Absolute Cyber Security Protection

By | October 17th, 2014|Uncategorized|

This week, JPMorgan Chase announced its third quarter profit after facing a challenging data breach. CEO Jamie Dimon shared his perspective into the state of cyber security as it stands today.Saabira Chaudhuri and Emily Glazer of the Wall Street Journal followed the major elements of the posting and reported that “the bank’s expenses for regulation [...]

Customer Alert: POODLE Vulnerability

By | October 16th, 2014|Uncategorized|

On October 14, 2014, three Google researchers announced the details of a vulnerability in the design of SSL version 3 named the POODLE (Passing Oracle On Downgraded Legacy Encryption) vulnerability. This vulnerability affects all implementations of SSLv3.0 protocol, but does not affect the newer encryption mechanism known as TLS (Transport Security Layer). Under the right [...]

A Look Inside Electronic Medical Records

By | October 16th, 2014|Uncategorized|

Medical identity theft is not a new topic; however the rise of the amount of cases in the healthcare industry is starting to cast a shadow on the healthcare industry. According to the Identity Theft Resource Center, medical identity theft accounted for 43 percent of all identity theft cases in 2013. Additionally, the FBI recently [...]

Infographic: How to Stay Anonymous Online

By | October 10th, 2014|Uncategorized|

Today’s digital generation has made it nearly impossible to keep your identity hidden online. Social networking and sharing has created a culture of transparency, which can be beneficial when used for good, but extremely dangerous in the hands of cyber criminals. In the spirit of celebrating National Cyber Security Awareness Month (NCSAM), we wanted to [...]

News Recap: An Update on the Shellshock Bug

By | October 9th, 2014|Uncategorized|

On September 24, 2014, the Shellshock bug was discovered, exposing vulnerabilities in Unix and Linux machines. The aftermath of the Shellshock bug has continued to stay in headlines as a wave of new vulnerabilities have emerged.Threatpost’s Michael Mimoso explains that Shellshock has been actively exploited: “Analysis into the vulnerability and Bash behavior once it was [...]

Celebrate National Cyber Security Awareness Month by Protecting Your Health Information

By | October 8th, 2014|Uncategorized|

This guest blog post is a part of our cyberSAFE blog series focusing on medical identity theft and health IT topics. It comes to us from Kara Wright, the Digital Media Coordinator for the National Cyber Security Alliance. She assists the operation and development of the STOP. THINK. CONNECT. and National Cyber Security Awareness Month [...]

#cyberSAFEchat: Let’s Talk Medical ID Theft and Health IT

By | October 3rd, 2014|Uncategorized|

Medical identity theft is a growing risk for patients and the medical industry. Ponemon Research found that in 2012 and 2013, 90 percent of healthcare organizations exposed or lost patient data. The industry has seen more than 200 breach incidents in 2014 alone. And to top it all off, medical identity theft victims estimate the [...]

News Recap: FDA Establishes Cyber Security Guidelines for Medical Devices

By | October 2nd, 2014|Uncategorized|

The U.S. Food and Drug Administration (FDA) released cyber security guidelines for medical devices this week, recommending that manufacturers consider and submit cybersecurity risks associated with the medical device of their making and provide ways to mitigate risk via operating system and software updates.USA Today’s Elizabeth Weise reported that the Director of Emergency Preparedness at [...]

September Recap: Cooling Down While Ramping Up

By | October 1st, 2014|Uncategorized|

September may mean cooler weather, changing seasons and goodbye to summer. But for us at Experian it also meant a ton of hot activities like curating a back-to-school guest blog series and ramping up for our upcoming webinar about medical identity theft. Here’s what we were up to last month:Guest Blog Series: Back-To-School TipsThis August [...]

Customer Alert: ‘Shellshock’ Bug

By | September 26th, 2014|Uncategorized|

On September 24, 2014, Red Hat, Inc., the software company that provides a version of the Linux Operating System, indicated that its security team discovered a vulnerability in the command line interface functionality known as “Bash” (Bourne-Again Shell). This vulnerability, called “Shellshock,” is believed to pose a larger threat than the Heartbleed vulnerability that was [...]

Load More Posts