02:57 PM
Dark Reading
Dark Reading
Products and Releases

Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses

Specifically designed to help manage cyber threats and prepare businesses for data breach

Chantilly, VA-February 27, 2018  Intersections Inc. (NASDAQ: INTX), provider of Identity Guard®, the industry pioneer in identity theft protection services, today launched Data Breach Readiness, the first comprehensive data breach preparedness solution for small and medium sized businesses.

“The most devastating impacts of a data breach can only be avoided by both working to prevent a breach and by planning and preparing a response before an incident occurs,” said Jerry Thompson, Senior Vice President, of Intersections. “Identity Guard has helped companies manage data breaches for more than a decade, and we’ve distilled that experience into a robust package that helps businesses prevent or – in the worst case scenario – manage a breach.”

Businesses of all sizes face challenges in safeguarding their critical information. Small and medium-sized companies often lack the internal resources to dedicate towards preparedness, making them attractive targets for hackers. According to Small Business Trends, 43 percent of cyberattacks are aimed at small businesses.

Smart organizations are increasingly focusing on proactively identifying data breaches and preparing to efficiently react to them in advance of a data breach crisis. Identity Guard’s Data Breach Readiness service includes direct access to Delta Risk LLC, a Chertoff Group organization, which provides ongoing network assessments to identify potential vulnerabilities. Monthly scans help ensure early detection and resolution of developing security concerns.

 “Having an effective cybersecurity strategy is the single best way for organizations to mitigate the worst consequences of a significant data breach, and the Identity Guard Data Breach Readiness program brings such a strategy to small and medium sized businesses.” said Michael Chertoff, Delta Risk board member and executive chairman of The Chertoff Group.  

Identity Guard provides Data Breach Readiness clients with: 

  • All the information and templates needed to formulate a custom Data Breach Readiness Plan.
  • Vulnerability Scanning to identify network vulnerability issues.
  • Proprietary Identity Guard software tools to protect corporate and employee computers and phones from malicious attacks.
  • Dark Net Monitoring that scans for sensitive business information that may indicate a potential threat.
  • Training and Tools to educate employees on proper procedures for handling sensitive information to reduce the risk of a breach, including a dashboard to monitor participation.
  • Identity Guard’s signature Identity Theft Protection, available at a significantly discounted rate, which provides breach victims access to Identity Guard’s industry-leading monitoring and resolution features in the event of a breach. With 24/7 oversight capabilities, Identity Guard monitors more data than any other identity protection service on the market.

For more information about Identity Guard’s Breach Readiness, visit:


About Intersections & IDENTITY GUARD®:

Intersections Inc. (Nasdaq: INTX) provides innovative software and data monitoring solutions that help consumers manage financial and personal risks associated with the proliferation of their personal data in the virtual and financial world. Under its IDENTITY GUARD® brand, the company delivers a premium service that utilizes technology solutions, including artificial intelligence to help individuals and organizations take control over their valuable information. Headquartered in Chantilly, Virginia, the company was founded in 1996. To learn more, visit  and

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.