By accepting you will be accessing a service provided by a third-party external to

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

On July 29th, it was discovered that cybercriminals had “exploited a U.S. website application vulnerability to gain access to certain files,” according to the company. In the statement released on August 7th announcing the breach, Equifax reported that those responsible had managed to access information including names, birth dates, addresses, Social Security and Driver's license numbers. 209,000 people also lost their credit card information, and dispute documents with personally identifiable information were accessed affecting another 182,000 people.

The scope of this attack is staggering, especially considering that the total population of the United States is estimated by the Census Bureau to be 324 million adults. A quick calculation tells us that the 143 million potentially affected makes up a full 44 percent of the country’s total adult population.

As if this situation isn’t bad enough for Equifax, the activities of some of the company leadership are also being called into question. Chief Financial Officer John Gamble Jr., U.S. Information Solutions President Joseph Loughran, and Workforce Solutions President Rodolfo Ploder sold almost $2 million in company shares mere days after the breach was uncovered. While it is not yet clear if the breach and these sales are connected, Equifax has released a statement stating that the men had no knowledge of the intrusion when the sales were made.

The company’s stocks fell by more than 12 percent shortly afterward.

Equifax is currently working with state and federal authorities, including the FBI, and is actively alerting those whose information was accessed through the mail. We suggest that you keep an eye on your mailbox in case you have been breached.

There are plenty of websites and services, including one from Equifax, dedicated to determining whether or not your personal information was accessed--all you have to do is give these sites and services access to your personal information. In light of what has happened, we do not recommend taking this route. Instead, you should be careful to monitor your own financial information and to report any oddities to the proper authorities.

You may also be tempted to enroll in an identity protection service. Equifax themselves are offering a free year of monitoring from their service, called TrustedID. However, there have been reports that enrolling in this service will leave you ineligible to participate in a class action lawsuit against Equifax. If you decide to enroll, make sure you understand all of the fine print. Otherwise, you should make sure to go through and change your passwords and watch your credit statements for suspicious activity. This is especially true if you utilized any of Equifax’s business services, as your business could be affected as well.

If you suspect that your information was stolen, the Federal Trade Commission offers a helpful guide to determining if that is the case. If so, you need to report it to the Federal Trade Commission as well as place a fraud alert on your credit report.


Comments 1

Moana Mcdonald on Thursday, 13 December 2018 03:02

The all information that I gather was not enough so I visit this and get more data that was useful for me. After collecting all the data I send this to it was belong to me that have many more articles on it.

The all information that I gather was not enough so I visit this and get more data that was useful for me. After collecting all the data I send this to it was belong to me that have many more articles on it.
Already Registered? Login Here
Friday, May 29 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Hosted Solutions Microsoft Hackers Computer Software Efficiency Business Malware Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Hardware Tech Term Cloud Computing Managed IT Services Internet Data Recovery Backup Ransomware Innovation Users Smartphone Outsourced IT Android Mobile Device Upgrade Saving Money Windows Smartphones Miscellaneous Data Backup Facebook Server Phishing Business Continuity communications Microsoft Office Business Management Information Windows 10 Disaster Recovery VoIP Cybersecurity Office 365 Managed IT Services Social Media Network Browser Productivity Internet of Things Data Management Windows 10 Passwords Vulnerability Remote Monitoring Gadgets App Gmail Word Chrome Mobile Office Apps Managed Service Quick Tips Infrastructure Artificial Intelligence Encryption Router Settings Managed Service Provider Employer-Employee Relationship Networking Virtual Reality VPN Access Control Company Culture Analytics Website Remote Workers BYOD Tip of the week IT Support Money Save Money Applications WiFi Automation Information Technology Google Drive Bandwidth IT Management Data Security Paperless Office Content Filtering YouTube Employee-Employer Relationship Government Virtual Private Network Risk Management Education Computers Apple Storage Unified Threat Management Development Office Tips Display Hacker Data storage Collaboration Firewall HIPAA Maintenance BDR Avoiding Downtime Big Data Robot Antivirus Operating System Break Fix Wireless Marketing Solid State Drive Bring Your Own Device Business Intelligence iOS Social End of Support LiFi Search Humor Hosted Solution Best Practice Administration Remote Computing Hard Disk Drive Conferencing Mouse Managed Services Business Technology SaaS Server Management Wi-Fi MSP Touchscreen Going Green Augmented Reality Managing Stress Virtualization Managed IT Holiday Data loss OneNote Tablet Telephone Systems Data Breach Printing Retail Alert Windows 7 Password IT desktop Software as a Service Social Network Laptop The Internet of Things Two-factor Authentication Vendor Management Monitors Managed IT Service Document Management Customer Relationship Management Scam Chromebook Mobile Security Outlook Spam Computing Downtime Websites Voice over Internet Protocol Employee-Employer Relationships Time Management Printer Payment Card Cooperation Service Level Agreement Streaming Processor Identity Theft Hybrid Cloud Logistics Hotspot Internet Exlporer Troubleshooting Business Analysis Budget Black Friday Compliance Security Cameras Profiles Typing Emergency Connectivity Spying National Security Servers Google Calendar Safety IT Technicians Optimization Training Corporate Profile Dark Web Modem FinTech Automobile Analysis Students Network Management Current Events Inventory Staff Leominster G Suite Human Error Memory Regulations Scalability Network Congestion Asset Management Language Value Halloween Dell Virus Cyber Monday WannaCry Utility Computing Cryptocurrency IoT Cabling Updates Legislation Mirgation Recycling Google Docs Microsoft Excel Cookies Google Maps Mixed Reality IT solutions SharePoint Writing Shadow IT K-12 Schools Device Reducing Cost Social Networking Migration Consulting Hacks Techology Memes Computing Infrastructure Professional Services Scary Stories LED Threats Smart Technology Laptops How To Bitcoin Lenovo Dark Data Update Star Wars Running Cable PowerPoint Statistics Google Wallet Chatbots eWaste Business Growth Mail Merge Blockchain Nanotechnology Downloads Gamification Wearable Technology Network upgrade Buisness Mobility Batteries Politics Motherboard Cables Digital Payment Virtual Desktop VoIP Unified Threat Management Alerts USB Sports Co-Managed IT Shortcut Legal Distributed Denial of Service Digital Managed Services Provider Firefox Windows 8 Superfish Customer Service Fraud Cost Management Disaster Onboarding GDPR Unified Communications Bluetooth Drones Comparison Work/Life Balance Identity Continuity Myths Address Permissions Health Private Cloud Screen Reader Charging Slack Hard Disk Drives Office Samsung COVID-19 Smart Office Print Toner Tech Support Wires Messaging Mobile Device Management User Error Holidays Licensing Dongle Content Huawei Deep Learning Patch Management Spyware Entertainment Vendor Distribution Assessment Uninterrupted Power Supply Digital Signage Data Warehouse Specifications Solar Shortcuts Mobile Management Alt Codes Smart Tech File Sharing Cybercrime Monitoring Solid State Drives Heating/Cooling Multi-Factor Security Social Engineering Remote Work Work Computer Care IBM Physical Security Error Mobile Computing Twitter Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Supercomputer CrashOverride Cortana Printers 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation IT Consultant Cameras Financial Mobile Data Tracking Recovery Meetings How To Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Regulation Notifications

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3