Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Remember the Equifax Breach? Here’s an Update

Remember the Equifax Breach? Here’s an Update

Spoiler alert: it isn’t good news.

On September 7th, 2017, it was made public that Equifax had suffered one of the largest cybersecurity breaches in history, and as a result, had left 145.5 million consumers in the United States vulnerable to identity theft. Due to a website application vulnerability, the personally identifiable information of these people was exposed from May until July of that year.

As a result, Equifax was ordered to pick up the $700 million tab to help those affected. Everyone who was eligible to apply was promised their choice of free credit monitoring services, or a cash payment of up to $125.

Now, with almost a year between us and the ruling, there have been no payments made. This is due to a few appeals to the settlement’s approval that have pushed the delivery of these payments out further. Claims are being reviewed by a neutral settlement administrator.

Worse, according to the Federal Trade Commission and Consumer Reports, when any of these payments are distributed, they will likely equal much less than the $125 initially promised.

The reason why boils down to simple math: with a set budget dictating how much money is up for grabs out of the total settlement—$31 million out of the $700 million—the more people who stake a claim results in a smaller amount available to distribute to each person.

What this Has to Do With Your Business

Regardless, it still isn’t good news for Equifax, and gives an oh-too-clear example of why data security is positively essential for every business.

Consider your own business for a moment: how much personally identifiable information do you have collected and stored for your own purposes? While your total is guaranteed to be dwarfed by the sheer amount of data that Equifax holds, it certainly isn’t insignificant, which means that the fines you could be subjected to wouldn’t be, either.

Fortunately, your business has a means of protecting itself by working with a managed service provider. With an MSP’s assistance, you can better insulate your data against theft via improved and continuously monitored security solutions. As a result, you can focus on your tasks without the added stress of fretting about your security, confident that a team of professionals is attending to any concerns and preventing you from experiencing your own, scaled Equifax breach.

To find out more about what Voyage Technology has to offer your operations and security, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Email Privacy Phishing Workplace Tips Google Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Workplace Strategy Small Business Microsoft Data Backup Communication Smartphone Android Business Management Smartphones VoIP Saving Money Mobile Devices communications Data Recovery Passwords Backup Managed Service Managed IT Services Browser Social Media Microsoft Office Upgrade Disaster Recovery Tech Term Network Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Remote Work Miscellaneous Windows Gadgets Server Managed Service Provider Productivity Outsourced IT Current Events Information Employee/Employer Relationship Spam Encryption Holiday Windows 10 AI Business Continuity Office Compliance Government Data Management Virtualization Training Business Technology Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Bandwidth Mobile Office Data Security Vendor Employer-Employee Relationship Chrome Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management Gmail Information Technology Applications WiFi Office 365 Access Control Tip of the week Conferencing Hacker Avoiding Downtime How To BDR Computing BYOD Router Risk Management Virtual Private Network Big Data Health Analytics Office Tips Help Desk Augmented Reality Storage Password Retail Computers Bring Your Own Device Healthcare Managed IT Services Website Marketing Operating System HIPAA The Internet of Things Display Printer Social Paperless Office Windows 11 Infrastructure Monitoring 2FA IT Support Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Going Green Windows 7 Patch Management Save Money Microsoft 365 Firewall Remote Monitoring Vulnerability Cybercrime End of Support Vendor Management Solutions VPN Employees Cryptocurrency Meetings Safety Physical Security Integration User Tip Modem Processor Virtual Desktop Computer Repair Mobile Security LiFi Data storage Holidays Data Storage Outlook Smart Technology Supply Chain Money Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Humor Saving Time Virtual Machines Professional Services Hacking Sports Managed IT Service Presentation Mouse Maintenance Antivirus Downloads iPhone Licensing Wireless Technology Administration Entertainment Vulnerabilities Data Privacy Images 101 Word Telephone System Multi-Factor Authentication Settings Robot Mobility Printing Cost Management Wireless Content Filtering YouTube IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies 5G Undo User Error Microchip Internet Exlporer Software as a Service Fraud Meta Unified Communications Managing Costs Amazon Experience Google Docs Username Bitcoin Point of Sale eCommerce Running Cable Black Friday SSID Google Wallet Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Network Management Application Proxy Server Reviews Windows 8 Cookies Laptop Monitors Cyber Monday Medical IT Drones Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays IBM Shopping Nanotechnology Optimization Halloween PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Hacks Screen Reader Scary Stories Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Fun Competition Service Level Agreement Internet Service Provider Server Management Regulations Compliance Deep Learning Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Download Net Neutrality Education Financial Data Error History Business Communications User Browsers Smartwatch Mobile Computing Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Search Upload Procurement Social Network Telework Best Practice Cyber security Multi-Factor Security Tech Human Resources IP Address CES Tablet IoT Communitications Buisness Dark Web Cables Alert Legal Trends Supply Chain Management IT solutions Managed IT Customer Resource management FinTech Business Growth File Sharing Regulations Dark Data Google Calendar Term Google Apps Recovery Hard Drives Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Cortana Domains Gamification Flexibility Organization Alt Codes Travel Social Networking Legislation Shortcuts Refrigeration Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Downtime Ransmoware Wearable Technology Memory Vendors Public Speaking Content Remote Working Hosted Solution Health IT Typing Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Lithium-ion battery Unified Threat Management Directions Videos Entrepreneur Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Knowledge Google Drive

Blog Archive