MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Equifax Saga Continues as More Victims are Discovered

The Equifax Saga Continues as More Victims are Discovered

As though the initial news of Equifax’s 2017 data exposure wasn’t bad enough, it has been discovered that there are even more victims than previously thought. While news like this is never good, it can bring a silver lining if the opportunities that such news presents are seized.

A Refresher
Many will likely remember when it was discovered last year that Equifax, one of the three major credit reporting bureaus, had been breached. As a result of this breach, approximately 143 million people were potentially affected, with various forms of personally identifiable information made available for cybercriminals to use. Doing the math, this meant that 44 percent of the United States’ total population could have their information out and available to those who would misuse it.

Then, in October 2017, it was announced that an investigation revealed that 2.5 million more people were exposed than first thought. This brought the total number of potential victims up to 145.5 million.

Unfortunately, it would seem this is a running total.

Equifax has since discovered 2.4 million more victims, whose names and partial driver's license numbers were accessed and stolen. Fortunately, this data - while not worthless - is of limited value to a cybercriminal, especially when compared to the data that other victims lost, like Social Security numbers. Regardless, it is still important to view reminders of events like the Equifax breach as what they are: reminders. As such, they serve as an opportunity to reflect on what is to be learned from events like these.

Lessons from the Breach
There are a few takeaways to be had from a data breach event, the first of which being: there’s always going to be another data breach.

The unfortunate reality is, with valuable information stored by so many entities, data is always at risk of being stolen. So much information is shared, in fact, that it is not only possible for one’s data to be breached, it is now probable. As a user in such a world, there are steps you need to take to prepare for this paradigm.

First and foremost, you need to prepare yourself on a personal level. Regardless of how cautious you are about your personal data, you need to accept that, yes, it will probably be stolen one day - and not necessarily from you. As the Equifax breach and countless others have proven, the companies that collect your data aren’t always storing it in the most secure way. So, even if you shred your bank statements and follow all the rules when it comes to your passwords, there’s still a chance that your data could find its way into the wrong hands thanks to someone else’s negligence or bad luck.

This is why you also need to be prepared to both prevent and detect attempts of crimes like identity theft. This can be accomplished through the use of credit freezes, locks, and alerts.

You also need to be sure that you are prepared to share this information with your clients and customers, should you find that your records were breached. Taking ownership of the event and doing everything possible to help those involved through it will help reduce the ill will that is felt toward your company.

Unfortunately, data breaches aren’t going to stop happening. As a company, it is up to your organization to best prepare for them, and should one strike, handle it as best you can. MERIT Solutions can help. Call us today at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 April 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Malware Internet Software Hosted Solutions Backup Business Management google Productivity Managed IT Services Computer Disaster Recovery Mobile Devices VoIP Microsoft IT Support Outsourced IT communications Business Continuity Business Email User Tips Windows 10 Productivity IT Services Hardware Innovation Efficiency Cybercrime Apps Windows Managed IT Server Cybersecurity Ransomware Mobile Device Management Mobility Data Backup Small Business Smartphone Data Operating System browser Data Recovery Android Virtualization Saving Money Law Enforcement Internet of Things Save Money Telephone Systems Hosted Solution Quick Tips Phishing Passwords Data Security Microsoft Office Chrome BYOD Communication Cloud Computing BDR Money VPN Information Technology Office 365 Password Smartphones Recovery Holiday Wireless upgrade Social Risk Management Tech Term Unsupported Software Google Drive Hacking Vulnerability App Avoiding Downtime Automation Alert Health Miscellaneous Managed Service Provider Work/Life Balance Computers Facebook Wi-Fi Government Social Media Best Practice Update Gadgets Budget Data Management Collaboration IT Support Two-factor Authentication Network Social Engineering Cleaning USB Save Time Windows 10 Wireless Technology search Identity Theft Spam Telephony Flexibility Shortcut Managed IT Services User Error Office tips Data Breach Applications Private Cloud History Firewall Application Proactive IT Antivirus Current Events Audit The Internet of Things Personal Information Workplace Tips Data Protection Politics Redundancy Television Sports Saving Time Commerce Tech Support Office Streaming Media Apple Computer Care Hacker Phone System Solid State Drive Internet Exlporer Cortana Patch Management Fraud WiFi Legal Users Going Green Encryption Bandwidth iPhone eWaste Artificial Intelligence Excel Mobile Computing Big Data Transportation Data Storage Project Management Robot Cost Management OneNote End of Support Remote Computing SaaS Samsung Gmail Content Filtering Data Loss Marketing Battery HaaS Google Docs Compliance IT solutions Humor Disaster Blockchain DDoS Employer-Employee Relationship Automobile Mobile Security IT Management Windows 10s Document Management Devices IoT SBS Travel Nanotechnology Colocation Experience Hard Drives Identity compaq Storage Credit Cards WIndows Server 2008 Hard Disk Drive Spyware Files Language Wearable Technology Administrator Video Games Lithium-ion battery Tablets Root Cause Analysis Data Privacy Virtual Reality hp FAQ Scam Music Access domain NFL Augmented Reality Relocation Business Intelligence Touchscreen Lifestyle Charger Outlook Employer Employee Relationship Edge Analytics Virus remote Word Managed IT Service PDF Keyboard Instant Messaging Yahoo Legislation Wireless Charging Computer Accessories iOS Worker Commute Ciminal Proactive Running Cable Server 2008 Windows Ink Mobile Device Text Messaging Managing Stress Ali Rowghani Comparison Evernote Regulation Computer Fan Trending Books Websites Scalability Google Maps Screen Mirroring Hiring/Firing Education Specifications Router Networking Sync Vendor Management Dark Web MSP Data Theft How To server installation dvd "cannot install required files" Software as a Service Meetings Cast Benefits Emails Laptop stock Uninterrupted Power Supply Sales Workers Adobe intranet Computing Unified Threat Management Settings Touchpad tweet Retail Updates Licensing Training WannaCry Reputation Entertainment IT budget Advertising Electronic Medical Records Analysis calculator Upgrades HBO Webinar Point of Sale Maintenance Twitter Conferencing control Microsoft Word Mobile Company Culture HIPAA Safety App store Data storage Black Market Microsoft Excel Consultant Gifts Smart Technology IT solutions Device Security WSJ Chromecast Avoid Downtime Exchange Professional Services Value Administration Identities Distributed Denial of Service Shadow IT altivista File Sharing Worker Hard Drive CrashOverride Thank You Congratulations Cache Monitors Remote Monitoring Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...