MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Equifax Saga Continues as More Victims are Discovered

The Equifax Saga Continues as More Victims are Discovered

As though the initial news of Equifax’s 2017 data exposure wasn’t bad enough, it has been discovered that there are even more victims than previously thought. While news like this is never good, it can bring a silver lining if the opportunities that such news presents are seized.

A Refresher
Many will likely remember when it was discovered last year that Equifax, one of the three major credit reporting bureaus, had been breached. As a result of this breach, approximately 143 million people were potentially affected, with various forms of personally identifiable information made available for cybercriminals to use. Doing the math, this meant that 44 percent of the United States’ total population could have their information out and available to those who would misuse it.

Then, in October 2017, it was announced that an investigation revealed that 2.5 million more people were exposed than first thought. This brought the total number of potential victims up to 145.5 million.

Unfortunately, it would seem this is a running total.

Equifax has since discovered 2.4 million more victims, whose names and partial driver's license numbers were accessed and stolen. Fortunately, this data - while not worthless - is of limited value to a cybercriminal, especially when compared to the data that other victims lost, like Social Security numbers. Regardless, it is still important to view reminders of events like the Equifax breach as what they are: reminders. As such, they serve as an opportunity to reflect on what is to be learned from events like these.

Lessons from the Breach
There are a few takeaways to be had from a data breach event, the first of which being: there’s always going to be another data breach.

The unfortunate reality is, with valuable information stored by so many entities, data is always at risk of being stolen. So much information is shared, in fact, that it is not only possible for one’s data to be breached, it is now probable. As a user in such a world, there are steps you need to take to prepare for this paradigm.

First and foremost, you need to prepare yourself on a personal level. Regardless of how cautious you are about your personal data, you need to accept that, yes, it will probably be stolen one day - and not necessarily from you. As the Equifax breach and countless others have proven, the companies that collect your data aren’t always storing it in the most secure way. So, even if you shred your bank statements and follow all the rules when it comes to your passwords, there’s still a chance that your data could find its way into the wrong hands thanks to someone else’s negligence or bad luck.

This is why you also need to be prepared to both prevent and detect attempts of crimes like identity theft. This can be accomplished through the use of credit freezes, locks, and alerts.

You also need to be sure that you are prepared to share this information with your clients and customers, should you find that your records were breached. Taking ownership of the event and doing everything possible to help those involved through it will help reduce the ill will that is felt toward your company.

Unfortunately, data breaches aren’t going to stop happening. As a company, it is up to your organization to best prepare for them, and should one strike, handle it as best you can. MERIT Solutions can help. Call us today at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Business Management Backup Mobile Devices google Computer Business Microsoft Disaster Recovery Outsourced IT Hardware communications Business Continuity VoIP IT Support Windows 10 Innovation Email User Tips Cybersecurity IT Services Efficiency Data Backup Tech Term Windows Cybercrime Mobile Device Management Internet of Things Small Business Data Recovery Apps Managed IT Server Ransomware Mobility Saving Money Law Enforcement browser Productivity Smartphone Data Operating System Office 365 Save Money Telephone Systems Android Virtualization BDR Money Data Security Passwords Smartphones Hosted Solution Quick Tips Cloud Computing Phishing VPN Information Technology Recovery IT Support Password Network Holiday Microsoft Office BYOD Automation Chrome Communication Managed Service Provider Facebook Social Media Government Best Practice Budget Update Collaboration Two-factor Authentication Data Management Gadgets Workplace Tips Wireless Risk Management Unsupported Software Vulnerability Social Google Drive Hacking upgrade Avoiding Downtime Alert App Work/Life Balance Health Cost Management Miscellaneous Data Breach Wi-Fi Computers Application User Error Current Events Proactive IT Audit Compliance Gmail The Internet of Things Personal Information Data Protection Politics Employer-Employee Relationship Cleaning USB Save Time Tech Support Social Engineering Users Wireless Technology Identity Theft Streaming Media Spam Artificial Intelligence Flexibility Telephony Managed IT Services Shortcut search Router Office tips Firewall Applications Private Cloud History Antivirus Remote Computing Blockchain Data Loss Content Filtering Battery Marketing HaaS Google Docs Mobile Security Devices Humor Disaster Automobile Google Assistant Value Fraud Redundancy IT solutions Saving Time Travel DDoS Commerce Sports Office Computer Care Phone System Cortana Patch Management Windows 10 Hacker Television Solid State Drive Legal Internet Exlporer Encryption Apple Project Management Excel WiFi MSP Wireless Charging iPhone Big Data Going Green Data Storage Mobile Computing Transportation Bandwidth OneNote eWaste Education Robot Networking Vendor Management SaaS Management Samsung End of Support Unified Threat Management Laptop App store Settings Uninterrupted Power Supply Device Security Retail Financial Technology Training Bring Your Own Device Licensing Entertainment Identities WannaCry Updates Upgrades Electronic Medical Records Touchpad server installation dvd "cannot install required files" Point of Sale stock Webinar Conferencing Reputation Printing HBO Company Culture Advertising Hybrid Cloud Mobile HIPAA IoT Microsoft Word Consultant Microsoft Excel Safety Identity Remote Monitoring Black Market tweet Spyware IT solutions Gifts Smart Technology Business Technology Professional Services Data storage Language Avoid Downtime File Sharing Data Privacy Shadow IT calculator Document Management Chromecast Twitter Windows 10s Administration Computer Forensics IT Management Wasting Money Experience Nanotechnology control Storage Hard Drive PowerPoint WIndows Server 2008 WSJ Edge Hard Disk Drive Credit Cards Colocation Hard Drives Amazon Tablets Virus Root Cause Analysis Video Games Exchange Distributed Denial of Service Chromebook Virtual Reality Files altivista Wireless Internet Administrator Ciminal Lithium-ion battery FAQ Scam Virtual Assistant NFL Music Proactive Augmented Reality SBS Touchscreen Lifestyle Smart Tech Business Intelligence compaq Gamification Outlook Access Charger Employer Employee Relationship Relocation Alexa for Business Word Analytics Wearable Technology Websites Legislation Keyboard Connectivity Managed IT Service Instant Messaging hp Memory Worker Commute iOS Computer Accessories Mobile Device PDF Windows Ink Data Theft domain Comparison Content Filter Managing Stress Students Regulation intranet Computer Fan Evernote Text Messaging Google Maps Books Computing Scalability remote Yahoo Specifications Hiring/Firing Monitoring Screen Mirroring Unified Communications Sync IT budget Dark Web Software as a Service Running Cable Analysis Meetings How To Server 2008 Ali Rowghani Maintenance Emails Sales Benefits Cast Trending Financial Adobe Workers Cache Thank You Monitors Congratulations Emergency Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...