Attacks/Breaches

3/1/2018
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses

Specifically designed to help manage cyber threats and prepare businesses for data breach

Chantilly, VA-February 27, 2018  Intersections Inc. (NASDAQ: INTX), provider of Identity Guard®, the industry pioneer in identity theft protection services, today launched Data Breach Readiness, the first comprehensive data breach preparedness solution for small and medium sized businesses.

“The most devastating impacts of a data breach can only be avoided by both working to prevent a breach and by planning and preparing a response before an incident occurs,” said Jerry Thompson, Senior Vice President, of Intersections. “Identity Guard has helped companies manage data breaches for more than a decade, and we’ve distilled that experience into a robust package that helps businesses prevent or – in the worst case scenario – manage a breach.”

Businesses of all sizes face challenges in safeguarding their critical information. Small and medium-sized companies often lack the internal resources to dedicate towards preparedness, making them attractive targets for hackers. According to Small Business Trends, 43 percent of cyberattacks are aimed at small businesses.

Smart organizations are increasingly focusing on proactively identifying data breaches and preparing to efficiently react to them in advance of a data breach crisis. Identity Guard’s Data Breach Readiness service includes direct access to Delta Risk LLC, a Chertoff Group organization, which provides ongoing network assessments to identify potential vulnerabilities. Monthly scans help ensure early detection and resolution of developing security concerns.

 “Having an effective cybersecurity strategy is the single best way for organizations to mitigate the worst consequences of a significant data breach, and the Identity Guard Data Breach Readiness program brings such a strategy to small and medium sized businesses.” said Michael Chertoff, Delta Risk board member and executive chairman of The Chertoff Group.  

Identity Guard provides Data Breach Readiness clients with: 

  • All the information and templates needed to formulate a custom Data Breach Readiness Plan.
  • Vulnerability Scanning to identify network vulnerability issues.
  • Proprietary Identity Guard software tools to protect corporate and employee computers and phones from malicious attacks.
  • Dark Net Monitoring that scans for sensitive business information that may indicate a potential threat.
  • Training and Tools to educate employees on proper procedures for handling sensitive information to reduce the risk of a breach, including a dashboard to monitor participation.
  • Identity Guard’s signature Identity Theft Protection, available at a significantly discounted rate, which provides breach victims access to Identity Guard’s industry-leading monitoring and resolution features in the event of a breach. With 24/7 oversight capabilities, Identity Guard monitors more data than any other identity protection service on the market.

For more information about Identity Guard’s Breach Readiness, visit: www.identityguardbusiness.com/breach-services/data-breach-readiness

 

About Intersections & IDENTITY GUARD®:

Intersections Inc. (Nasdaq: INTX) provides innovative software and data monitoring solutions that help consumers manage financial and personal risks associated with the proliferation of their personal data in the virtual and financial world. Under its IDENTITY GUARD® brand, the company delivers a premium service that utilizes technology solutions, including artificial intelligence to help individuals and organizations take control over their valuable information. Headquartered in Chantilly, Virginia, the company was founded in 1996. To learn more, visit www.intersections.comwww.identityguard.com  and www.identityguardbusiness.com

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17229
PUBLISHED: 2018-09-19
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17230
PUBLISHED: 2018-09-19
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17231
PUBLISHED: 2018-09-19
** DISPUTED ** Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third par...
CVE-2018-17228
PUBLISHED: 2018-09-19
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call.
CVE-2018-8889
PUBLISHED: 2018-09-19
A directory traversal vulnerability in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS) 2.8.17.29 and earlier could allow an attacker to retrieve arbitrary files in the context of a BEMS administrator account.