4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

On July 29th, it was discovered that cybercriminals had “exploited a U.S. website application vulnerability to gain access to certain files,” according to the company. In the statement released on August 7th announcing the breach, Equifax reported that those responsible had managed to access information including names, birth dates, addresses, Social Security and Driver's license numbers. 209,000 people also lost their credit card information, and dispute documents with personally identifiable information were accessed affecting another 182,000 people.

The scope of this attack is staggering, especially considering that the total population of the United States is estimated by the Census Bureau to be 324 million adults. A quick calculation tells us that the 143 million potentially affected makes up a full 44 percent of the country’s total adult population.

As if this situation isn’t bad enough for Equifax, the activities of some of the company leadership are also being called into question. Chief Financial Officer John Gamble Jr., U.S. Information Solutions President Joseph Loughran, and Workforce Solutions President Rodolfo Ploder sold almost $2 million in company shares mere days after the breach was uncovered. While it is not yet clear if the breach and these sales are connected, Equifax has released a statement stating that the men had no knowledge of the intrusion when the sales were made.

The company’s stocks fell by more than 12 percent shortly afterward.

Equifax is currently working with state and federal authorities, including the FBI, and is actively alerting those whose information was accessed through the mail. We suggest that you keep an eye on your mailbox in case you have been breached.

There are plenty of websites and services, including one from Equifax, dedicated to determining whether or not your personal information was accessed--all you have to do is give these sites and services access to your personal information. In light of what has happened, we do not recommend taking this route. Instead, you should be careful to monitor your own financial information and to report any oddities to the proper authorities.

You may also be tempted to enroll in an identity protection service. Equifax themselves are offering a free year of monitoring from their service, called TrustedID. However, there have been reports that enrolling in this service will leave you ineligible to participate in a class action lawsuit against Equifax. If you decide to enroll, make sure you understand all of the fine print. Otherwise, you should make sure to go through and change your passwords and watch your credit statements for suspicious activity. This is especially true if you utilized any of Equifax’s business services, as your business could be affected as well.

If you suspect that your information was stolen, the Federal Trade Commission offers a helpful guide to determining if that is the case. If so, you need to report it to the Federal Trade Commission as well as place a fraud alert on your credit report.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Alert Email Microsoft Office Communication Network Save Money Quick Tips communications Small Business Smartphone Smartphones BYOD Going Green Mobile Office Information Technology Social Media Android Apps Health Office Managed IT Services Outsourced IT Browser Application Ransomware Gadgets Operating System Chrome Productivity Disaster Managed IT Tablet WiFi Mobility Holiday Firewall Avoiding Downtime Remote Computing Passwords Unified Threat Management IT Solutions Best Practice Spam Data Management BDR Risk Management Cybercrime Cybersecurity Search Telephone Systems The Internet of Things Facebook Hacking Vendor Management Hard Drives Saving Time History Remote Monitoring Employer-Employee Relationship Budget VPN Automation Apple Money Big Data Office Tips Marketing Content Filtering Proactive IT Phishing Password Data Recovery User Error Hosted Solution Law Enforcement Computers iPhone Customer Relationship Management Collaboration Recovery Phone System Wireless Technology Data Backup Printer Bring Your Own Device USB Antivirus Encryption Analytics Shortcut Gmail Router Social Government Humor Administration Vulnerability Wearable Technology Work/Life Balance Lithium-ion battery Telephony Maintenance PowerPoint Office 365 Virus Current Events Wireless SaaS Unsupported Software Tech Support Audit HaaS Cloud Computing Google Drive Outlook Save Time Business Intelligence Point of Sale IT COnsultant Data Protection App Computer Repair Cost Management Social Engineering Intranet Bandwidth Printer Server Laptop Private Cloud OneNote Users Politics Personal Information Trending Education Windows 8 Net Neutrality Data Security Computer Care Two-factor Authentication Battery Robot Managing Stress Excel Augmented Reality Automobile Paperless Office End of Support Network Congestion Fax Server Travel Internet Exlporer Help Desk Workplace IT Support Customer Service Internet of Things Update Streaming Media Identity Theft Biometrics Windows 10 Solid State Drive Retail Uninterrupted Power Supply Virtual Reality online currency Flexibility Sports Meetings Samsung Instant Messaging Emails Wi-Fi Artificial Intelligence Data Storage HIPAA Social Networking Emergency Efficency Entertainment Benefits Applications Computer Accessories DDoS hacker Mouse Compliance Transportation Display Amazon Tablets Regulations Hard Disk Drive Root Cause Analysis Music hack Co-managed IT Wiring HBO Value Hiring/Firing Information NFL Cameras Data storage best practices CrashOverride Lifestyle Books Cortana User Science Ebay Video Games IT Management Debate Smart Technology Virtual Desktop Computing Document Management Word Presentation data breach Settings Bluetooth Data Breach Legislation Best Available Advertising Legal WIndows Server 2008 IT Technicians Mobile Device Windows Ink Touchpad risk management SharePoint Managed Security Scam Patch Management Nokia Google Maps Commerce Teamwork Employer Employee Relationship Regulation Busines Continuity Twitter Networking Worker Commute Software as a Service Near Field Communication Operating Sysytem PDF Surge Protector Scalability Sync Television Files Human Resources 3D Printing Data Loss IT consulting iOS Text Messaging Managed IT Service Running Cable Safety How To Adobe Chromecast Managed IT Services Upgrades Google Docs Reliable Computing Computer Fan ISP Training Hard Drive Bloatware Licensing Administrator Consultant Microsoft Excel Colocation Dark Web Blogging Screen Mirroring Programming The Blindside Of Uograde Company Culture Images Black Market Access Touchscreen Branding File Sharing Website Cast Distributed Denial of Service IT Security Cleaning Windows 10s Nanotechnology Experience systems WIndows 7 Storage Avoid Downtime Inbound Marketing eWaste OneDrive Keyboard IT service Domains Comparison Tutorial Taxes Buisness Specifications Supercomputer Electronic Medical Records IT Budget Reputation Gift Giving Webinar Microblogging Youtube Mobile IT solutions Sales Shadow IT Professional Services Managed Service Provder Relocation Webinar