Attacks/Breaches

3/1/2018
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses

Specifically designed to help manage cyber threats and prepare businesses for data breach

Chantilly, VA-February 27, 2018  Intersections Inc. (NASDAQ: INTX), provider of Identity Guard®, the industry pioneer in identity theft protection services, today launched Data Breach Readiness, the first comprehensive data breach preparedness solution for small and medium sized businesses.

“The most devastating impacts of a data breach can only be avoided by both working to prevent a breach and by planning and preparing a response before an incident occurs,” said Jerry Thompson, Senior Vice President, of Intersections. “Identity Guard has helped companies manage data breaches for more than a decade, and we’ve distilled that experience into a robust package that helps businesses prevent or – in the worst case scenario – manage a breach.”

Businesses of all sizes face challenges in safeguarding their critical information. Small and medium-sized companies often lack the internal resources to dedicate towards preparedness, making them attractive targets for hackers. According to Small Business Trends, 43 percent of cyberattacks are aimed at small businesses.

Smart organizations are increasingly focusing on proactively identifying data breaches and preparing to efficiently react to them in advance of a data breach crisis. Identity Guard’s Data Breach Readiness service includes direct access to Delta Risk LLC, a Chertoff Group organization, which provides ongoing network assessments to identify potential vulnerabilities. Monthly scans help ensure early detection and resolution of developing security concerns.

 “Having an effective cybersecurity strategy is the single best way for organizations to mitigate the worst consequences of a significant data breach, and the Identity Guard Data Breach Readiness program brings such a strategy to small and medium sized businesses.” said Michael Chertoff, Delta Risk board member and executive chairman of The Chertoff Group.  

Identity Guard provides Data Breach Readiness clients with: 

  • All the information and templates needed to formulate a custom Data Breach Readiness Plan.
  • Vulnerability Scanning to identify network vulnerability issues.
  • Proprietary Identity Guard software tools to protect corporate and employee computers and phones from malicious attacks.
  • Dark Net Monitoring that scans for sensitive business information that may indicate a potential threat.
  • Training and Tools to educate employees on proper procedures for handling sensitive information to reduce the risk of a breach, including a dashboard to monitor participation.
  • Identity Guard’s signature Identity Theft Protection, available at a significantly discounted rate, which provides breach victims access to Identity Guard’s industry-leading monitoring and resolution features in the event of a breach. With 24/7 oversight capabilities, Identity Guard monitors more data than any other identity protection service on the market.

For more information about Identity Guard’s Breach Readiness, visit: www.identityguardbusiness.com/breach-services/data-breach-readiness

 

About Intersections & IDENTITY GUARD®:

Intersections Inc. (Nasdaq: INTX) provides innovative software and data monitoring solutions that help consumers manage financial and personal risks associated with the proliferation of their personal data in the virtual and financial world. Under its IDENTITY GUARD® brand, the company delivers a premium service that utilizes technology solutions, including artificial intelligence to help individuals and organizations take control over their valuable information. Headquartered in Chantilly, Virginia, the company was founded in 1996. To learn more, visit www.intersections.comwww.identityguard.com  and www.identityguardbusiness.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17282
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
CVE-2018-14592
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
CVE-2018-15832
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
CVE-2018-16282
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.
CVE-2018-16752
PUBLISHED: 2018-09-20
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.