4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

On July 29th, it was discovered that cybercriminals had “exploited a U.S. website application vulnerability to gain access to certain files,” according to the company. In the statement released on August 7th announcing the breach, Equifax reported that those responsible had managed to access information including names, birth dates, addresses, Social Security and Driver's license numbers. 209,000 people also lost their credit card information, and dispute documents with personally identifiable information were accessed affecting another 182,000 people.

The scope of this attack is staggering, especially considering that the total population of the United States is estimated by the Census Bureau to be 324 million adults. A quick calculation tells us that the 143 million potentially affected makes up a full 44 percent of the country’s total adult population.

As if this situation isn’t bad enough for Equifax, the activities of some of the company leadership are also being called into question. Chief Financial Officer John Gamble Jr., U.S. Information Solutions President Joseph Loughran, and Workforce Solutions President Rodolfo Ploder sold almost $2 million in company shares mere days after the breach was uncovered. While it is not yet clear if the breach and these sales are connected, Equifax has released a statement stating that the men had no knowledge of the intrusion when the sales were made.

The company’s stocks fell by more than 12 percent shortly afterward.

Equifax is currently working with state and federal authorities, including the FBI, and is actively alerting those whose information was accessed through the mail. We suggest that you keep an eye on your mailbox in case you have been breached.

There are plenty of websites and services, including one from Equifax, dedicated to determining whether or not your personal information was accessed--all you have to do is give these sites and services access to your personal information. In light of what has happened, we do not recommend taking this route. Instead, you should be careful to monitor your own financial information and to report any oddities to the proper authorities.

You may also be tempted to enroll in an identity protection service. Equifax themselves are offering a free year of monitoring from their service, called TrustedID. However, there have been reports that enrolling in this service will leave you ineligible to participate in a class action lawsuit against Equifax. If you decide to enroll, make sure you understand all of the fine print. Otherwise, you should make sure to go through and change your passwords and watch your credit statements for suspicious activity. This is especially true if you utilized any of Equifax’s business services, as your business could be affected as well.

If you suspect that your information was stolen, the Federal Trade Commission offers a helpful guide to determining if that is the case. If so, you need to report it to the Federal Trade Commission as well as place a fraud alert on your credit report.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices Computer User Tips Saving Money Miscellaneous Virtualization Windows 10 Upgrade Mobile Device Management Network Security Data Server Email Mobile Computing communications Alert Communication Network Save Money Microsoft Office Social Media Quick Tips Smartphone Small Business Smartphones BYOD Going Green Mobile Office Information Technology Android Managed IT Services Outsourced IT Office Health Apps Application Ransomware Operating System Chrome Browser Gadgets Productivity Managed IT Disaster Cybersecurity Tablet Holiday Mobility Firewall The Internet of Things Avoiding Downtime WiFi Unified Threat Management IT Solutions Cybercrime Spam Data Recovery Passwords Telephone Systems BDR Search Data Backup Risk Management History Best Practice Data Management Remote Computing Apple Hard Drives Saving Time Employer-Employee Relationship Budget Vendor Management Marketing Automation VPN Hacking Remote Monitoring Facebook Big Data Phishing Money Password Content Filtering Hosted Solution Computers Proactive IT Recovery Phone System User Error Law Enforcement Collaboration Office Tips Wireless Technology iPhone Customer Relationship Management Printer USB Analytics Encryption Vulnerability Router Telephony Gmail Bring Your Own Device Government Lithium-ion battery Work/Life Balance Humor Administration Office 365 Wearable Technology Current Events Antivirus Maintenance PowerPoint Shortcut Virus Social Users Tech Support Wireless Windows 8 Unsupported Software Social Engineering Outlook Google Drive Cloud Computing Save Time App Private Cloud Data Protection Cost Management Intranet Point of Sale IT COnsultant Bandwidth Printer Server Laptop Computer Repair SaaS OneNote Data Security Audit HaaS Trending Education Politics Net Neutrality Personal Information Business Intelligence Robot Augmented Reality Computer Care Battery Biometrics Retail IT Support Virtual Reality Paperless Office Automobile Meetings End of Support Windows 10 Fax Server Workplace Instant Messaging Emails Internet Exlporer Streaming Media HIPAA Uninterrupted Power Supply Entertainment Internet of Things online currency Network Congestion Benefits Identity Theft DDoS Computer Accessories Solid State Drive Redundancy Data Storage Flexibility Sports Help Desk Mouse Compliance Samsung Two-factor Authentication Wi-Fi Managing Stress Efficency Emergency Excel Artificial Intelligence Applications hacker Travel Social Networking Transportation Display Update Customer Service Uograde WIndows Server 2008 Images Music Windows Ink risk management Teamwork Lifestyle Hiring/Firing Busines Continuity Data storage Ebay Patch Management Networking Near Field Communication Books Computing Google Maps Commerce Smart Technology Video Games IT consulting Regulation Human Resources Document Management Running Cable Data Breach Advertising Software as a Service Wiring Legal Reliable Computing Touchpad Information Sync Mobile Device iOS Managed Security Data Loss Debate Managed IT Service Scam Bloatware Adobe Twitter Managed IT Services Computer Fan Google Docs Surge Protector Employer Employee Relationship Operating Sysytem Licensing Television Branding Worker Commute Dark Web Distributed Denial of Service PDF 3D Printing Microsoft Excel Screen Mirroring Scalability Files WIndows 7 Nokia eWaste Safety Storage Text Messaging Inbound Marketing File Sharing Cast How To Regulations ISP Chromecast Upgrades Windows 10s Nanotechnology Value systems Administrator Blogging Training Cameras Programming User Colocation Tablets Consultant Hard Disk Drive Root Cause Analysis The Blindside Of Science hack Access Website HBO Company Culture Virtual Desktop Black Market Presentation Best Available NFL Touchscreen best practices Bluetooth CrashOverride IT Technicians IT Security Cortana IT Management Hard Drive Cleaning OneDrive Experience Amazon Word data breach SharePoint Settings Keyboard Avoid Downtime Legislation Co-managed IT Evernote Buisness Comparison Sales Workers Managed Service Provder Specifications Webinar Updates Conferencing Microsoft Word Tutorial Gifts Device Security Taxes Devices Supercomputer Webinar Electronic Medical Records Credit Cards Spyware Mobile IT Budget IT solutions FAQ Gift Giving Reputation Professional Services IT service Charger Domains Wireless Charging WannaCry Shadow IT Relocation Youtube Microblogging