Article

Back

Data Breach Response Guide - 2017-2018 Edition

by Experian | Experian Data Breach Resolution | 11/07/2017

As the number of cyber threats facing organizations continues to grow and regulations become increasingly prescriptive, companies need more than just a generic plan that sits on the shelf. Instead, they need a thorough data breach response plan that is regularly updated and practiced, ensuring effectiveness. Whether it is a few thousand or a few million records compromised, the need for a comprehensive plan remains the same.

According to the Identity Theft Resource Center (ITRC), there were 1,091 reported U.S. data breaches in 2016 across all industries, exposing more than 36 million records. A record-high year, 2016 saw a 40 percent increase from the 780 reported breaches in 2015. This year, as of September 13, there have already been 1,002 data breaches, with more than 163 million exposed records.

“Since we started tracking data breaches in 2005, we have witnessed a steady increase in events year after year. Given the current landscape, it’s no longer a question of ‘if’ your company will be attacked but ‘when.’ Therefore, it’s crucial that every company take the necessary steps to not only train its employees on cybersecurity best practices, but to also have a plan of action in place should it become a victim of such an attack.” – Eva Velasquez, ITRC CEO & President.

In this reality, it goes without saying that the data breach response plan has become a critical component of doing business in the modern era. For companies who have yet to create one – or need a refresh – this guide illustrates how to best create, implement and refine a comprehensive data breach response plan for the security challenges that lie ahead.

To read more, please log in

Junto Plus

A Q&A with Wyatt Hoffman of Carnegie Endowment for International Peace

As cyber-attacks continue to mount, private organizations are ramping up their security activities, and many wonder whether “active cyber defense” is the answer. Of course, what constitutes “active cyber defense” is an emerging debate for international lawmakers and policy makers, says Carnegie Endowment for International Peace senior research analyst Wyatt Hoffman. I asked him about this concept and the related issues at hand.

07/12/18 | Junto Plus

HHS Breach Data

Number Reported: 1928

Latest Incident
Capital Nephrology
State:
MD
# of Records:
4000
Type of Breach:
Hacking/IT Incident