Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Data Breach

It’s a New Day for Payment Card Fraud Liability

Published on January 4, 2016 By | Posted in: Blog, Data Breach, Fraud, Payments

According to the global 2015 Cost of Data Breach Study by the Ponemon Institute, the average total cost of a data breach for the participating companies increased 23 percent over the past two years to $3.79 million. Now breach costs are likely to rise further as banks and payment processors shift more of the liability […]

Experts Predict Security and Privacy Trends for 2016

Published on December 21, 2015 By | Posted in: Cybersecurity, Data, Data Breach, Incident Reponse, Internet of Things (IoT)

Originally posted by ID Experts Blog. Reposted with permission. 2015 was a challenging year for defenders of privacy and security. For the first time, cyber-attacks became the leading cause of data breaches, as indicated by several annual data breach studies, including the Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data. At the […]

Are You at Risk of a Data Breach? This Infographic Will Help You Prepare

Published on December 18, 2015 By | Posted in: Blog, Data, Data Breach, Infograph

Data breaches are a significant business threat across every industry; no one is immune. The impact of a data breach on a financial institution, however, can be particularly grievous, and the threat is only likely to grow in 2016. According to data from the Identity Theft Resource Center, there were 28% more data breaches in […]

Target Reaches Settlement with Banks

Published on December 3, 2015 By | Posted in: Blog, Cybersecurity, Data Breach

Two years after the event the full cost of the Target breach is coming into sharper focus. In addition to a $900 million dollar revenue decline in the 4th quarter of 2013 (versus 2012), the loss of any possible revenue growth in the 2013 holiday season, legal costs, etc., Target will pay MasterCard, Visa, and […]

The Dangers of Forgotten Data

Published on December 1, 2015 By | Posted in: Blog, Dark Data, Data, Data Breach, Incident Reponse

Just about every business works with masses of data every day, much of which is used and then filed away and forgotten. Gartner calls this forgotten data “dark data,” and defines it as “information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes.” Forgotten data poses […]

Starwood Breach Not Isolated

Published on November 23, 2015 By | Posted in: Data Breach, News, PII

Tracy Kitten, Executive Editor for Bank Info Security, today released an article about the recent Starwood breach. In the article, Tracy discusses how this incident may not be isolated and that “fraud patterns indicate that another, perhaps larger, breach is impacting cards across the country” Click here to read the full article.

Bend, But Don’t Break: How to Minimize the Effects of a Privacy Breach

Published on November 12, 2015 By | Posted in: Blog, Data Breach, Privacy

By Elena Ames, Deluxe Corporation Reposted with Permission. Originally posted on Deluxe Blogs. Last week, my colleague Brad Reimer posted a great privacy blog on his recent attendance at the 2015 Privacy. Security. Risk. (P.S.R.) IAPP conference. Protecting sensitive information has been a key topic this year for many organizations across the globe. A few […]

Building Breach Resistance in Your Business Partners

Published on November 10, 2015 By | Posted in: Blog, Cybersecurity, Data Breach, Shared Assessments, Third Party Risk, Third Party Risk Management

According to the Ponemon Institute’s 2014 Global Report on the Cost of Cybercrime, a quarter of organizations worldwide fail to meet their own security requirements. If your organization is one of that 25 percent, given the surging rate of cybercrime, you are probably hurrying to ramp up privacy and information security programs, staff, and budget. […]

Is a New Certification Program the Key to Reducing Third Party Risk?

Published on June 26, 2015 By | Posted in: Certified Third Party Risk Professional (CTPRP) program, Data Breach, Newsletter, Risk, Risk Assessment, Third Party Risk, Third Party Risk Management

Hacker data breaches that exploit vulnerable third party vendors dominate news headlines, boardroom discussions, and C-suite meeting agendas. As a result of the proliferation of such attacks, it has become increasingly imperative for organizations to ensure successful evaluation, monitoring, and management of third party service providers that have access to systems and sensitive data. Such […]

The Cybersecurity Panic Room

Published on April 21, 2015 By | Posted in: Cyber Risk, Cybersecurity, Data Breach

The concept of a panic room is a fortified room in place in a private home or business to provide refuge or hiding from a home or business intrusion. Panic rooms tend to contain technology to contact law enforcement or medical resources, and resources to sustain basic resource needs until help arrives. While panic rooms […]

Shared Assessments Logo Deluxe Corp
Shared Assessments Logo usbank
Shared Assessments Logo first data
Shared Assessments Licensee ZS logo
Shared Assessments Logo radian
Viewpoint Logo
Shared Assessments Logo dtcc
Shared Assessments Licensee Lockpath
Shared Assessments Logo sei
MetricStream logo
Shared Assessments Licensee ControlCase
intralinks-logo
Shared Assessments Licensee TD Ameritrade
Shared Assessments Licensee Bank of the West
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Logo Ernst & Young
Shared Assessments Logo Deloitte
Shared Assessments Licensee Pivot Point Security
Shared Assessments Licensee Rsam
Shared Assessments Licensee Power Advocate
Shared Assessments Logo Iron Mountain
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Licensee Protiviti
Shared Assessments Logo pwc