Six Data Breach Lessons from the Trenches

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Data Breach Lessons from the Trenches-6 Next

Befriend regulators: In the absence of federal legislation, state regulators and law enforcement are devoting more time toward helping organizations prevent incidents and protect consumers. It's in your best interest to develop relationships with regulators before you suffer a breach. If you've already experienced one, however, contact regulators as soon as possible. Organizations that are more proactive with regulators could have a faster and smoother response - regulators do not appreciate being left out.

As the era of Big Data continues to march forward, so does the number of data breaches. Organizations seem to become more vulnerable every day with breaches rising at an alarming rate. In fact, studies, such as "Quantifying the Data Breach Epidemic" from IBM, indicate that companies are attacked an average of 16,856 times per year, and many of those attacks result in a quantifiable data breach.

And with the average breach costing $5.4 million for businesses in the United States, according to the Ponemon Institute, it's important to be prepared. Multiply that by the hundreds, thousands – even millions – of records that are typically compromised in one breach and you begin to realize just how costly a data breach is both on reputation and a company's bottom line.

With this reality facing us, many security experts are convinced that data breaches are inevitable. So if that is the case, what can your organization do to minimize the damage? Based on experience servicing some of the largest breaches to-date, including three of the four largest breaches in 2013, Experian Data Breach Resolution has compiled six important lessons learned from the data breach trenches.

For more guidance on how to prepare for a data breach, you can also download the Experian Data Breach Response Guide, which is available for free.

Michael Bruemmer is vice president with the Experian Data Breach Resolution group. A veteran with more than 25 years in the industry, Bruemmer brings a wealth of knowledge related to sales and operations.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.