facebook linkedin twitter

Computerware Blog

Remember the Equifax Breach? Here’s an Update

Remember the Equifax Breach? Here’s an Update

Spoiler alert: it isn’t good news.

On September 7th, 2017, it was made public that Equifax had suffered one of the largest cybersecurity breaches in history, and as a result, had left 145.5 million consumers in the United States vulnerable to identity theft. Due to a website application vulnerability, the personally identifiable information of these people was exposed from May until July of that year.

As a result, Equifax was ordered to pick up the $700 million tab to help those affected. Everyone who was eligible to apply was promised their choice of free credit monitoring services, or a cash payment of up to $125.

Now, with almost a year between us and the ruling, there have been no payments made. This is due to a few appeals to the settlement’s approval that have pushed the delivery of these payments out further. Claims are being reviewed by a neutral settlement administrator.

Worse, according to the Federal Trade Commission and Consumer Reports, when any of these payments are distributed, they will likely equal much less than the $125 initially promised.

The reason why boils down to simple math: with a set budget dictating how much money is up for grabs out of the total settlement—$31 million out of the $700 million—the more people who stake a claim results in a smaller amount available to distribute to each person.

What this Has to Do With Your Business

Regardless, it still isn’t good news for Equifax, and gives an oh-too-clear example of why data security is positively essential for every business.

Consider your own business for a moment: how much personally identifiable information do you have collected and stored for your own purposes? While your total is guaranteed to be dwarfed by the sheer amount of data that Equifax holds, it certainly isn’t insignificant, which means that the fines you could be subjected to wouldn’t be, either.

Fortunately, your business has a means of protecting itself by working with a managed service provider. With an MSP’s assistance, you can better insulate your data against theft via improved and continuously monitored security solutions. As a result, you can focus on your tasks without the added stress of fretting about your security, confident that a team of professionals is attending to any concerns and preventing you from experiencing your own, scaled Equifax breach.

To find out more about what Computerware has to offer your operations and security, reach out to us at (703) 821-8200.

Tip of the Week: Monitoring Hardware to Keep Busin...
The Value Social Media Has for Your Business Today


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, September 28, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Productivity Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Efficiency Saving Money Google Innovation Small Business Computer User Tips Collaboration Data Backup VoIP Quick Tips IT Support IT Support Network Smartphones Business Continuity Mobile Devices communications Gadgets Disaster Recovery Data Recovery Android Microsoft Office Social Media Cybersecurity Smartphone Upgrade Mobile Office Server Communication Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Mobile Device Passwords Windows Holiday Users Operating System Vendor Management Managed IT Services Outsourced IT Apps Windows 10 BDR Tech Term Internet of Things Facebook Remote Monitoring Unified Threat Management BYOD Automation Analytics Managed IT services Mobile Computing Data Management Remote Computing Apple Windows 10 WiFi Cloud Computing Browser Marketing Artificial Intelligence History Training The Internet of Things Firewall Save Money Business Technology Alert Help Desk Big data Encryption Spam Health App Covid-19 Bandwidth Managed Service Office Office 365 Budget IT Consultant Two-factor Authentication Information Technology Going Green VPN Government Cybercrime Managed IT Bring Your Own Device Maintenance Antivirus Printer Access Control Windows 7 Hard Drives Blockchain Content Filtering Gmail Computers Saving Time Outlook Recovery Windows 8 Employer-Employee Relationship Retail Wi-Fi Wireless Technology Cost Management Virus Tech Support Search Information Networking Hiring/Firing Healthcare Remote Work Lithium-ion Battery Best Practice IBM Travel Education Augmented Reality Conferencing Project Management Update Humor Hacking Money Data Security Document Management It Management iPhone Phone System Customer Service Computing Data Loss Applications Storage Website Customer Relationship Management Data Breach Intranet Law Enforcement Twitter PowerPoint Solid State Drive Compliance Data storage Value Voice over Internet Protocol Password Risk Management Flexibility Administration Hacker Laptop Save Time Downtime Legal Avoiding Downtime Regulations File Sharing Hard Drive Computer Repair Running Cable Vendor Proactive IT Current Events Patch Management SaaS Mobility Wireless Excel Scam Hosted Solution Social Engineering DDoS End of Support Robot Securty Meetings Fax Server Digital Private Cloud Word Websites Black Market Telephony Cortana Monitoring Cryptocurrency Net Neutrality Machine Learning Business Intelligence Telephone Systems Chrome Software as a Service Business Growth Digital Payment Management Router Vulnerabilities Employee/Employer Relationship User Comparison Tablet Company Culture Paperless Office Virtual Desktop Cooperation Sports Google Maps Social Disaster Social Networking Heating/Cooling Programming Emails Entertainment Statistics Automobile Teamwork Redundancy Network Congestion Chromebook Distribution Computing Infrastructure IT service Hack Solutions How To Professional Services Employees Evernote Lifestyle Virtual Assistant Streaming Media Download Gaming Console Cost Bluetooth Integration eWaste Webcam Start Menu Tech Terms Text Messaging Smart Devices Microchip Taxes Mobile Technology Video Conferencing Memory Distributed Denial of Service Google Docs Managed Services Provider Uninterrupted Power Supply Multi-factor Authentication Experience Processors Vulnerability Cleaning Telephone Monitors Public Cloud USB Licensing How To Presentation Computer Accessories Office Tips Managed Services Inbound Marketing Bitcoin Identity Theft Data Protection Managed IT Service Notifications Specifications Safety Trending YouTube Unified Communications Settings Pain Points Downloads Mouse Virtual Reality Co-managed IT Politics Documents Processor User Error Medical IT Trend Micro Gamification Webinar Browsers Assessment SharePoint Memes Screen Reader Customer Resource management Tip of the week Piracy Point of Contact Managing IT Services Upload Permissions Language Motion Sickness User Tip Proactive Maintenance Upselling Google Calendar Smart Tech Scalability Security Cameras Threats Database VoIP HTML Telework Messenger Tracking PDF Navigation Virtual Machine Touchscreen Video Surveillance News Fiber-Optic Surveillance Best Available Keyboard eCommerce Saving ZTime Knowledge Mobile Security Remote Workers Music Rental Service Data Analysis Consultation IT Telephone System switches Writing Software License Virtual Private Network Trends Analytic Web Server Printers Domains SQL Server Technology Tips Recycling Multi-Factor Security Upgrades Cabling GDPR Managing Risk Fraud Development Tactics Product Reviews Best Practives LiFi Administrator Public Speaking Harddrive Audit Devices FinTech Books Workers Tech Hypervisor Debate Fake News Shortcut Holidays UTM Data Storage Content Read Supercomputer Fileless Malware Hybrid Cloud GPS Data Warehousing External Harddrive Emergency Hard Drive Disposal IT Plan Procurement Enterprise Resource Planning Work/Life Balance Troubleshooting Proxy Server Azure Access Legislation Error Microserver Deep Learning Worker Entrepreneur Modem Strategy email scam Addiction Visible Light Communication HIPAA Electronic Medical Records Transportation Computer Care Device Management Accountants Organization A.I. Reading Samsung Environment Term Microsoft Excel IT consulting G Suite Competition Recording Optimization Thin CLient Content Management PCI DSS Employer Employee Relationship Electronic Payment Directions Display 3D Google Drive Ebay Windows Server 2008 Communitications Business Managemenet Get More Done Smart Phones Migration Supply Chain Management Connected Devices Printer Server Hacks Physical Security Business Owner Dark Web Free Resource Spyware Mobile Payment Wireless Headphones Turn Key SSID Internet Service Provider Network Management Trojan Advertising Banking Flash Botnet Health IT IP Address Electricity Printing Equifax online Currency AI Fleet Tracking CIO Relocation Tablets Processing Windows XP Sync Application Logistics Virtual Machines Leadership Device security Regulations Compliance MSP Organize Staffing Google Wallet Human Resources Wasting Time Adminstration Pirating Information IT Assessment Cyber security Desktop Remote Working Finance Society CCTV Bookmark cache Television Nanotechnology LinkedIn Social Network Displays Business Cards Service Level Agreement Business Metrics Computer Malfunction Employer/Employee Relationships WannaCry Startup Supply Chains Asset Tracking Micrsooft Reliable Computing Google Play Telephone Service In Internet of Things Digital Signature Microsoft 365 Corporate Profile Archive Financial Data Username Drones Managing Costs Time Management Freedom of Information Unified Threat Management Electronic Health Records Backup and Disaster Recovery Skype Financial CrashOverride Managing Stress Capital Regulation Productuvuty 3D Printing Personal Information