4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

On July 29th, it was discovered that cybercriminals had “exploited a U.S. website application vulnerability to gain access to certain files,” according to the company. In the statement released on August 7th announcing the breach, Equifax reported that those responsible had managed to access information including names, birth dates, addresses, Social Security and Driver's license numbers. 209,000 people also lost their credit card information, and dispute documents with personally identifiable information were accessed affecting another 182,000 people.

The scope of this attack is staggering, especially considering that the total population of the United States is estimated by the Census Bureau to be 324 million adults. A quick calculation tells us that the 143 million potentially affected makes up a full 44 percent of the country’s total adult population.

As if this situation isn’t bad enough for Equifax, the activities of some of the company leadership are also being called into question. Chief Financial Officer John Gamble Jr., U.S. Information Solutions President Joseph Loughran, and Workforce Solutions President Rodolfo Ploder sold almost $2 million in company shares mere days after the breach was uncovered. While it is not yet clear if the breach and these sales are connected, Equifax has released a statement stating that the men had no knowledge of the intrusion when the sales were made.

The company’s stocks fell by more than 12 percent shortly afterward.

Equifax is currently working with state and federal authorities, including the FBI, and is actively alerting those whose information was accessed through the mail. We suggest that you keep an eye on your mailbox in case you have been breached.

There are plenty of websites and services, including one from Equifax, dedicated to determining whether or not your personal information was accessed--all you have to do is give these sites and services access to your personal information. In light of what has happened, we do not recommend taking this route. Instead, you should be careful to monitor your own financial information and to report any oddities to the proper authorities.

You may also be tempted to enroll in an identity protection service. Equifax themselves are offering a free year of monitoring from their service, called TrustedID. However, there have been reports that enrolling in this service will leave you ineligible to participate in a class action lawsuit against Equifax. If you decide to enroll, make sure you understand all of the fine print. Otherwise, you should make sure to go through and change your passwords and watch your credit statements for suspicious activity. This is especially true if you utilized any of Equifax’s business services, as your business could be affected as well.

If you suspect that your information was stolen, the Federal Trade Commission offers a helpful guide to determining if that is the case. If so, you need to report it to the Federal Trade Commission as well as place a fraud alert on your credit report.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Google Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity VoIP Saving Money Computer Miscellaneous Windows 10 Virtualization User Tips Upgrade Mobile Devices Mobile Device Management Data Server Mobile Computing Network Security Email Save Money Microsoft Office Alert Communication Network Quick Tips communications Social Media Smartphones BYOD Going Green Mobile Office Information Technology Office Smartphone Apps Health Small Business Android Outsourced IT Application Chrome Ransomware Browser Operating System Gadgets Managed IT Services Firewall Avoiding Downtime Disaster Tablet Productivity Managed IT The Internet of Things Telephone Systems Remote Computing Unified Threat Management IT Solutions Passwords Spam Mobility BDR Risk Management Search Cybercrime Holiday WiFi Employer-Employee Relationship Budget Facebook Cybersecurity Automation Hard Drives Vendor Management Saving Time Hacking Best Practice Data Management History Remote Monitoring VPN Wireless Technology Computers Apple Recovery Big Data Law Enforcement Phone System Marketing Proactive IT Office Tips Collaboration Phishing Password Customer Relationship Management Hosted Solution Virus Current Events Telephony Printer USB Content Filtering Bring Your Own Device Office 365 Analytics Gmail Router Antivirus Humor User Error Administration Shortcut Money Social Lithium-ion battery Wearable Technology iPhone Maintenance PowerPoint Trending Education Users Net Neutrality Windows 8 Private Cloud Data Recovery Work/Life Balance Tech Support Outlook Encryption Data Backup Point of Sale IT COnsultant HaaS Government App Cost Management Computer Repair Business Intelligence Intranet Wireless Unsupported Software Bandwidth Printer Server Cloud Computing Google Drive Laptop Social Engineering OneNote Save Time IT Support Internet of Things Identity Theft Instant Messaging Emails Solid State Drive Data Protection Flexibility HIPAA Vulnerability Entertainment Display Benefits DDoS Computer Accessories Augmented Reality Samsung Mouse Compliance Paperless Office Wi-Fi Data Storage Emergency Fax Server Network Congestion Applications Two-factor Authentication Managing Stress Workplace SaaS Excel Help Desk Streaming Media hacker Personal Information Audit Uninterrupted Power Supply Transportation online currency Computer Care Battery Robot Travel Update Automobile Customer Service Biometrics End of Support Retail Virtual Reality Efficency Meetings Internet Exlporer Social Networking IT consulting Managed Security Human Resources Scam Running Cable Patch Management Windows 10 Uograde Images Website Reliable Computing Commerce Employer Employee Relationship Sports Regulation Worker Commute Bloatware OneDrive Operating Sysytem PDF Amazon Scalability Files Co-managed IT Sync iOS Text Messaging Managed IT Service Safety Branding Distributed Denial of Service How To Wiring Chromecast Adobe Managed IT Services Computer Fan Upgrades Information Ebay Artificial Intelligence WIndows 7 Computing Training Debate eWaste Administrator Inbound Marketing Licensing Dark Web Consultant Colocation Regulations Screen Mirroring The Blindside Of Company Culture Black Market Access Value Touchscreen Politics Cameras User Cast IT Security Windows 10s Cleaning Science Presentation Twitter Nanotechnology Nokia Experience Virtual Desktop Bluetooth Avoid Downtime Best Available Data Security Keyboard Surge Protector Hard Disk Drive IT Technicians Tablets Television Root Cause Analysis Music SharePoint 3D Printing HBO Hiring/Firing best practices Data storage NFL CrashOverride Books Teamwork Video Games IT Management Smart Technology data breach Document Management ISP Busines Continuity Word Near Field Communication Settings Data Breach Networking Advertising Legal WIndows Server 2008 risk management Mobile Device Hard Drive Programming Touchpad Blogging Microblogging Youtube Taxes Sales Supercomputer Managed Service Provder Electronic Medical Records Webinar IT Budget Lifestyle Reputation Storage Webinar IT service IT solutions Mobile Tutorial Domains Shadow IT Professional Services Relocation Buisness Gift Giving Windows Ink