Five Important Lessons from Recent Data Breaches

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Important Lessons from Recent Data Breaches-2 Next

Get the word out, pronto

Communicate the problem quickly and clearly. Don’t follow Target’s footsteps. Hackers stole confidential data of up to 110 million customers who shopped at stores from Nov. 27 to Dec. 15, 2013. But instead of proactively announcing the breach, Target got scooped by respected security blogger Brian Krebs, who broke the story on Dec. 18. On the same day, Target CEO Gregg Steinhafel issued the statement that "we are pleased with Target’s holiday performance." The company confirmed the breach only after the U.S. Secret Service and American Express released their own investigations.

Michaels, on the other hand, took the opposite tactic. The art-and-crafts retailer said it wanted to notify customers of a potential breach "in light of the widely reported criminal efforts to penetrate the data systems of U.S. retailers." The company may avoid PR waves by slipping this news in quickly while the Target and Neiman-Marcus breaches are still being digested.

With another security incident making recent headlines, we're looking at five major data loss events in the past month alone. In looking at the responses of Target, Neiman-Marcus, Michaels, Coke and others, companies can learn a lot from how other organizations respond to data breaches - and implement better practices.

This slideshow features five important lessons learned and key takeaways from recent data breaches for businesses that want to protect themselves from similar disasters, as identified by Mark McCurley, senior information security advisor of IDentity Theft 911, a leading provider of personal-touch identity management solutions, identity theft recovery services, breach services and data risk management solutions for businesses. 


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.