The 6 Key Principles of “Privacy by Design”

By | September 23rd, 2021|Customer Loyalty, Data Breaches, Design, Identity Protection|

Data privacy remains a pressing concern for businesses, as 89% of consumers say they care about data privacy1 while breaches are predicted to reach an all-time high by year’s end2.  Additionally, a striking 70% of consumers say they are willing to spend time and money to protect their information1. Privacy has become a differentiator and [...]

The Implications of Sharing Personal Data

By | January 28th, 2015|Uncategorized|

Did you know that privacy policies do not guarantee that your information will be kept private? Most companies use privacy policies to inform customers about how their personal information may be used, i.e. sold, shared, exchanged, not necessarily guaranteeing absolute confidentiality. In today’s increasingly digital world where exchanging personal information – your name, email address, [...]

Worried your debit or credit card information may be compromised? Here’s what to do.

By | August 4th, 2014|Uncategorized|

Have you eaten a P.F. Chang’s lately? If so, you may want to check your email. This morning the restaurant chain sent out emails to customers that dined at 33 of the chain’s 211 locations between October 19, 2013 and June 11, 2014 saying that their credit and debit card information may have been stolen. [...]

News Recap: Identity Obese – What it Means

By | March 28th, 2014|Uncategorized|

It is common practice in today’s digital age to save personal information to online retail, banking and social accounts. However, storing information online makes you a target to identity thieves interested in collecting and selling personal information on the black market. There’s a new term for users who have too much information stored online: “identity [...]

Security Insights: Handling Credit Card Data (PCI-DSS)

By | July 19th, 2013|Uncategorized|

According to the PCI Compliance Guide, PCI applies to ALL organizations or merchants, regardless of size or number of transactions, that accepts, transmits, or stores any cardholder data. Said another way, if any customer of that organization ever pays the merchant directly using a credit card or debit card, then the PCI DSS requirements apply. [...]

News Recap: Ponemon Finds Companies Doing Little to Protect Regulated Data on Mobile Devices

By | June 28th, 2013|Uncategorized|

The Ponemon Institute released this week “The Risk of Regulated Data on Mobile Devices,” a study that focuses on the risks associated with employee access to regulated data, including health and financial information, through a company or personal mobile device. The report revealed nearly half of IT professionals cannot determine whether their companies are yielding [...]

Small Business Webinar Recap: “If You Collect It, You’ve Got to Protect It”

By | June 19th, 2013|Uncategorized|

Yesterday, in honor of National Small Business Week, we hosted this quarter’s cyberSAFE webinar, featuring a panel of experts who dove into why and how small businesses should tackle cyber security. We also published a white paper with findings from our recent survey of small business owners and their feelings toward cyber security, as well [...]

News Recap: Most SMBs Unable to Restore All Data Post-Cyber Attack

By | June 7th, 2013|Uncategorized|

The Ponemon Institute reported that out of the 29 percent of small businesses who experienced a cyber attack, 72 percent were not able to fully restore their company’s computer data. The causes of these cyber attacks included computer viruses, worms and Trojans and malware.In addition to data loss, the small businesses who experienced a computer-based [...]

Upcoming Webinar: Risk Mitigation for Small Businesses

By | June 6th, 2013|Uncategorized|

We’ve made it a practice here at Experian to pick a security topic to focus on each quarter. For each topic we conduct a unique research survey, create a white paper and schedule a webinar with leading security experts to discuss the topic. Our goal with this practice is to create a number of resources [...]

Industry News Recap: Combating IP Theft Through Computer Lockdowns

By | May 30th, 2013|Uncategorized|

The US Commission on the Theft of American Intellectual Property released an 89-page report assessing how international intellectual property theft affects the United States. The report claims that there is more than $300 billion annually in intellectual property theft, and US Cyber Command commander General Keith Alexander calls this theft “the greatest transfer of wealth [...]

Load More Posts