SXSW Interactive: Data Breaches: Taking the Bull by the Horns

By | March 8th, 2012|Uncategorized|

What is the first step your business should take after being breached? How can you minimize impact to your brand after a breach? What should you do to prepare for a breach?These questions will be at the heart of Experian’s panel “Data Breaches: Taking the Bull by the Horns” at this week’s South by Southwest [...]

CSID Takes on SXSW Interactive

By | March 5th, 2012|Uncategorized|

Headed to South by Southwest Interactive (SXSWi) conference in Austin, Texas this month? So is Experian. We’ve been working hard, organizing three SXSW panels that address today’s hottest security concerns: data breach preparedness, cloud security and voice authentication.  The increase in volume, severity, publicity and fallout of recent data breaches and lack of cyber-security has [...]

Protect Your Taxes From Prying & Spying Eyes

By | March 2nd, 2012|Uncategorized|

The IRS admittedly has little control over protecting your tax returns against identity theft. The problem is too big, the data too widely available, prevention too rarely attended to until it's already too late. Your tax returns are the Holy Grail of identity theft because they contain virtually every piece of information a fraudster needs [...]

CSID New Faces: Tim Brown, CTO

By | February 23rd, 2012|Uncategorized|

Experian recently welcomed Tim Brown to the company’s executive team as CTO. Tim brings more than 20 years of experience in the information security industry, having worked at established companies like CA Technologies and Symantec. Amidst his hectic first weeks at Experian (he’s already traveling the world), Tim filled us in on his experience, goals [...]

Lost in Neverland: The Growth of Child Identity Theft

By | February 15th, 2012|Uncategorized|

One out of ten children is targeted for identity theft. Child identity theft is a rising problem. Upon stealing a child’s social security number, a thief can run up a hefty amount of credit card debt, take out loans and establish driver’s licenses—and the crimes often go unnoticed until the victim is of age to [...]

IRS Overwhelmed by Tax Related Identity Theft

By | February 7th, 2012|Uncategorized|

By John Sileo, Experian consumer security expert It’s nerve racking to realize that the IRS increasingly struggles to control taxpayer identity theft. Since 2008, the IRS has identified 470,000 incidents of identity theft affecting more than 390,000 taxpayers. “Victims of tax-related identity theft are the casualties of a system ill-equipped to deal with the growing proficiency [...]

Data Privacy Day: Protect Your Company Data

By | January 31st, 2012|Uncategorized|

In honor of Data Privacy Day on January 28, initiated by the National Cyber Security Alliance, we have compiled a few simple best practices for businesses to protect and secure valuable data. Password Changes Encourage or require employees to regularly change passwords used for company servers, email and programs every 90 days. This will help [...]

Avoiding Social Spam on Facebook and Twitter

By | January 30th, 2012|Uncategorized|

By John Sileo, Experian consumer security expert The post appears like it’s coming from a known friend. It's enticing ("check out what our old high school friend does for a living now!"), feeds on your curiosity and good nature, begs you to click. A quick peek at the video, a chance to win a FREE [...]

Zappos Trust Gets Zapped – The Real Cost of Identity Theft

By | January 20th, 2012|Uncategorized|

By John Sileo, Experian consumer security expert Let’s say you ordered winter boots for your spouse on Zappos.com (now part of Amazon), which has world-class customer service. You don’t really even shop the competition because someplace in your brain you already trust Zappos to deliver as they always have. Your unquestioned confidence in Zappos is [...]

iPad Vampires: 7 Simple Security Settings to Stop Data Suckers

By | January 18th, 2012|Uncategorized|

By John Sileo, Experian consumer security expertInformation is the currency and lifeblood of the modern economy and, unlike the industrial revolution, data doesn’t shut down at dinnertime. As a result, the trend is towards hyper-mobile computing – smartphones and tablets – that connect us to the Internet and a limitless transfusion of information 24-7. It [...]

Load More Posts