facebook linkedin twitter

Computerware Blog

Remember the Equifax Breach? Here’s an Update

Remember the Equifax Breach? Here’s an Update

Spoiler alert: it isn’t good news.

On September 7th, 2017, it was made public that Equifax had suffered one of the largest cybersecurity breaches in history, and as a result, had left 145.5 million consumers in the United States vulnerable to identity theft. Due to a website application vulnerability, the personally identifiable information of these people was exposed from May until July of that year.

As a result, Equifax was ordered to pick up the $700 million tab to help those affected. Everyone who was eligible to apply was promised their choice of free credit monitoring services, or a cash payment of up to $125.

Now, with almost a year between us and the ruling, there have been no payments made. This is due to a few appeals to the settlement’s approval that have pushed the delivery of these payments out further. Claims are being reviewed by a neutral settlement administrator.

Worse, according to the Federal Trade Commission and Consumer Reports, when any of these payments are distributed, they will likely equal much less than the $125 initially promised.

The reason why boils down to simple math: with a set budget dictating how much money is up for grabs out of the total settlement—$31 million out of the $700 million—the more people who stake a claim results in a smaller amount available to distribute to each person.

What this Has to Do With Your Business

Regardless, it still isn’t good news for Equifax, and gives an oh-too-clear example of why data security is positively essential for every business.

Consider your own business for a moment: how much personally identifiable information do you have collected and stored for your own purposes? While your total is guaranteed to be dwarfed by the sheer amount of data that Equifax holds, it certainly isn’t insignificant, which means that the fines you could be subjected to wouldn’t be, either.

Fortunately, your business has a means of protecting itself by working with a managed service provider. With an MSP’s assistance, you can better insulate your data against theft via improved and continuously monitored security solutions. As a result, you can focus on your tasks without the added stress of fretting about your security, confident that a team of professionals is attending to any concerns and preventing you from experiencing your own, scaled Equifax breach.

To find out more about what Computerware has to offer your operations and security, reach out to us at (703) 821-8200.

Tip of the Week: Monitoring Hardware to Keep Busin...
The Value Social Media Has for Your Business Today
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Data Business Management Hackers Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Innovation Small Business IT Support Smartphones VoIP Collaboration Data Backup IT Support Network Mobile Devices Quick Tips communications Business Continuity Gadgets Microsoft Office Android Social Media Data Recovery Disaster Recovery Upgrade Cybersecurity Mobile Office Server Communication Virtualization Smartphone Mobile Device Management Phishing Miscellaneous Vendor Management Holiday Ransomware Operating System Windows 10 Windows Outsourced IT Tech Term Passwords Managed IT Services Remote Monitoring Facebook Unified Threat Management Users Mobile Device Internet of Things Apps BDR Automation Managed IT services BYOD Mobile Computing Remote Computing Apple Data Management Analytics Windows 10 WiFi History Marketing Cloud Computing The Internet of Things Artificial Intelligence Save Money Training Firewall Browser Encryption Big data App Help Desk Alert Spam Information Technology Office 365 Health IT Consultant Two-factor Authentication Bandwidth Business Technology Office Cybercrime Maintenance Printer Content Filtering Going Green Hard Drives Budget Access Control Gmail Bring Your Own Device Windows 7 Government Managed IT Antivirus Windows 8 Search Outlook Employer-Employee Relationship Retail Cost Management Tech Support Information Virus Best Practice Lithium-ion Battery Hiring/Firing Healthcare Saving Time Computers VPN Wireless Technology Recovery Managed Service Data Loss Update Networking Humor Hacking Project Management iPhone Money Document Management Computing IBM Augmented Reality Phone System Customer Service Travel It Management Education Blockchain Conferencing Flexibility Risk Management Value Data Breach Password Avoiding Downtime Legal Save Time Hacker Downtime Regulations Proactive IT SaaS Computer Repair Running Cable Customer Relationship Management Law Enforcement Current Events PowerPoint Covid-19 File Sharing Wireless Hard Drive Data Security Twitter Applications Intranet Compliance Storage Website Solid State Drive Data storage Mobility Patch Management Administration Social Engineering Black Market Word Scam Fax Server Cryptocurrency Laptop Net Neutrality Voice over Internet Protocol Monitoring Business Intelligence Meetings Cortana Business Growth Digital Payment Private Cloud Wi-Fi Digital Router Management Telephony Websites Comparison Tablet Paperless Office Machine Learning Sports Vulnerabilities Telephone Systems Excel Company Culture User Cooperation Software as a Service Disaster Vendor Virtual Desktop Remote Work End of Support Social Networking Hosted Solution Robot Social Securty DDoS Google Maps Automobile Emails Integration Chromebook Lifestyle Smart Devices Google Docs Computing Infrastructure Hack Memory eWaste Redundancy Chrome How To Inbound Marketing Experience Monitors Download Managed Services Provider Evernote Cleaning Virtual Assistant Office Tips Computer Accessories Multi-factor Authentication Processors Pain Points USB Employee/Employer Relationship Start Menu Tech Terms YouTube Microchip Taxes Managed Services Telephone Trending Distributed Denial of Service Presentation Managed IT Service Mobile Technology Unified Communications Settings Mouse Public Cloud Licensing Uninterrupted Power Supply Specifications Safety Vulnerability Statistics Processor Programming Identity Theft IT service Network Congestion Documents Bitcoin Gaming Console Co-managed IT Teamwork Heating/Cooling Data Protection User Error Entertainment Text Messaging Webcam Distribution Virtual Reality Downloads Bluetooth Streaming Media Politics Professional Services Telephone System Best Available Keyboard SQL Server Corporate Profile Virtual Private Network Mobile Security Product Reviews GDPR Managing Risk Time Management Freedom of Information 3D Ebay Development Deep Learning Software License Trends Motion Sickness Tech Domains Hypervisor Assessment SharePoint Thin CLient Work/Life Balance Multi-Factor Security Read Cost Scalability Fraud Tactics Fileless Malware Public Speaking Hybrid Cloud Google Calendar Smart Phones Visible Light Communication Devices Messenger Tracking Holidays Tip of the week Proxy Server Shortcut Azure VoIP IT consulting Procurement UTM Content Rental Service Best Practives Modem Strategy Touchscreen News Device Management Electronic Medical Records Entrepreneur Transportation Knowledge Adminstration Pirating Information Video Conferencing IT Plan Business Managemenet Enterprise Resource Planning Web Server Troubleshooting Term Consultation Leadership Content Management Legislation Error Cabling CIO Communitications email scam Addiction Administrator Microserver HIPAA Directions Display Technology Tips Advertising Flash Accountants A.I. Books Workers Environment Recording Optimization online Currency Dark Web Competition Free Resource Audit Windows XP Supply Chain Management Supercomputer Electronic Payment SSID How To Fake News Staffing Google Wallet Health IT Internet Service Provider Displays Migration Connected Devices Get More Done Business Owner Processing Data Warehousing Society Wireless Headphones Worker Emergency Hard Drive Disposal IT Assessment Micrsooft LinkedIn Network Management Turn Key IP Address Wasting Time Access Equifax Fleet Tracking Reading Samsung Printer Server Logistics Virtual Machines Drones G Suite Bookmark Application Computer Care Remote Working Device security MSP Employer Employee Relationship Trojan Human Resources Cyber security Microsoft Excel Upselling Organize Employer/Employee Relationships Video Surveillance Desktop Skype Finance Hacks Physical Security Google Play Telephone Service Google Drive Windows Server 2008 Archive Nanotechnology Social Network Microsoft 365 Electronic Health Records Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Saving ZTime Permissions Language Startup Asset Tracking Relocation Tablets Memes Unified Threat Management Backup and Disaster Recovery Sync Digital Signature Browsers Electricity Printing Point of Contact Username Medical IT Trend Micro User Tip Proactive Maintenance Debate switches Managing IT Services Writing Gamification Notifications CCTV Security Cameras Threats Harddrive Music Screen Reader Customer Resource management Solutions GPS Surveillance Upgrades Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Television Smart Tech Reliable Computing Webinar IT Recycling Fiber-Optic Database In Internet of Things Data Analysis Employees WannaCry External Harddrive LiFi Remote Workers HTML Analytic PDF eCommerce Printers Managing Stress CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial

toner1