News Recap: Employees’ Personal Activities at Work Can Lead to Data Breaches & Malware

By | July 18th, 2013|Uncategorized|

Recent surveys from Europe and the United States show that employees spend up to 30% of their working hours on personal matters. According to Infosecurity Magazine, “all of those non-productive hours could translate to not just lost output, but actual negative equity in the form of malware attacks and hacking incidents.”Kaspersky Lab Expert Kirill Kruglov [...]

#IDTheftChat: Exploring Cybersecurity Concerns within Small Businesses

By | June 7th, 2013|Uncategorized|

We were happy to co-host a live Twitter chat (#IDTheftChat ) with the Identity Theft Resource Center this past Thursday. The chat covered cybersecurity in small businesses, exploring how small businesses are currently protecting their businesses, customers and employees from threatening cyber criminals, data breaches, malware and data loss.We had a great turnout, with highly [...]

Industry News Recap: Verizon Publishes 2013 Data Breach Investigations Report

By | April 26th, 2013|Uncategorized|

This week Verizon released their sixth annual Data Breach Investigations Report, analyzing more than 47,000 reported security incidences in 2012. The report found that 75 percent of data breaches were driven by financial motives and 20 percent of attacks fell in the cyber espionage category, targeting intellectual property.“Typically what we see in our data set [...]

Spill the Beans: The Significance of Breach Disclosure Laws Status

By | January 9th, 2013|Uncategorized|

If a company is breached, should the breach be reported to authorities? To customers? To the public? While breach disclosure laws have been debated on and off for the past few years, it looks like they are making it back into the spotlight.Many companies would prefer to keep security breaches to themselves – to avoid [...]

A Year in Review: The Top Identity and Security Stories of 2012

By | December 20th, 2012|Uncategorized|

Another year has come and gone and what a year it was! Experian looks back at the top five identity and security stories of 2012.Number 5: Anonymous claims it hacked PayPal, PayPal denies itOn its Twitter account, Anonymous claimed to have more than 28,000 passwords from PayPal, but the online purchasing store verified that the [...]

Webinar Recap: What to do when a password is no longer secure?

By | October 1st, 2012|Uncategorized|

We recently hosted a webinar featuring Experian VP Marc Ostryniec and Toopher CEO Josh Alexander. Marc and Josh discussed consumer password habits, supplemented by statistics from our  recent consumer survey. The two also revealed how these habits put consumers and businesses at risk for compromise, and what businesses can do to mitigate these risks now [...]

Security Insights: Information Technology Security Part II

By | September 18th, 2012|Uncategorized|

As mentioned in Part I of this post, security breaches are an imminent threat and danger. While there are many types of data that should be secured, finding concise ways to improve technology security can be difficult.Here are some steps and tips to improving your company’s information technology security.Companies can help improve information technology security [...]

UDID’s and Non-Credit Monitoring

By | September 12th, 2012|Uncategorized|

Last week, 12-million Apple UDID’s were exposed in a breach that stemmed from the company BlueToad. Luckily, UDID’s don’t have much relevance to your personal identity. Nevertheless, this news did get us thinking about types of information that you should monitor that may not be as obvious as your social security number, credit report or [...]

Security Insights: Handling Credit Card Data

By | July 16th, 2012|Uncategorized|

According to the Unisys Security Index, credit and debit card fraud is the no. 1 fear of Americans in the midst of the global financial crisis. This concern regarding fraud supersedes that of terrorism, computer and health viruses, and personal safety.Now, that is big deal – especially as data breaches become more apparent and more [...]

Security Insights: Security Breaches

By | June 14th, 2012|Uncategorized|

A security breach is an act from an outside organization that bypasses or contravenes security policies, practices, or procedures. A similar internal act is called a security violation (businessdictionary.com).While a security breach can seem imminent at times, there are ways to avoid IT security breaches within a company. Take a look at 10 simple measures [...]

Load More Posts