Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

5 Things You Can Do To Guard Against the Equifax Breach

You are here:
  1. Home
  2. Blog
  3. 5 Things You Can Do…
Oct172017
BlogCyberSecurityCyber Risk Management

Equifax, one the Nation’s largest credit reporting agencies, was breached and over 143 million Americans personal information were exposed to criminals intent on stealing identities.

 

The best advice that can be given is, take precautions:

 

For Companies with hosted web services, the breach was achieved through a vulnerability in  Apache Struts, a commonly deployed web service.  Many believe this could have been avoided by simply keeping up with the latest patches.  However, another view points the finger at the lack of systems testing.  Many corporations get lulled into “system patch and go” routines where the updates are sent immediately back into production.  Many times, even with a quick check, the systems engineers are trying to get their systems back online rapidly, and take shortcuts. We recommend a third party evaluation (from within the company) with a thorough security check prior to redeployment.

 

For All Consumers that want to maintain good credit standing and safeguard your own money:

 

First, become aware of the latest exploits being reported on the news.  Using information gained from the Equifax breach bad actors will use this information to conduct phone scams, email phishing attempts, and other tactics. Read blogs reporting on Cyber News. The money you save could be your own…

 

Second, assume anyone who calls on the phone and asks you for sensitive personal information, even to validate your account information, are trying to extract information from you over the phone in order to exploit that information for their gain. They have all the required details about your credit accounts and Personal Identifiable Information.  They may only need a small piece of information to complete their profile of you that will allow them access to your financial accounts. Politely tell them you will call the organization back using a preprinted number on the back of your credit or membership card. Explain to the customer service representative that you received a call and you are calling back over a known phone number to be safe. They will understand and appreciate your effort, and will go out of their way to help you.

 

Third, Do not click on links embedded in emails. Period. Unless you are an advanced internet user who knows what URLs look like and understand the Domain naming conventions, don’t use the link embedded in messages to go to vendor or charity websites. Instead, type in the web address to that organization from your browser. There is no need to type out the lengthy string that you see in the email or text, usually. Just go to the Home page, then navigate to the area that you wish to visit for offering a donating or other form of support.

 

Fourth, assume your information is compromised and act now to purchase Identity Theft Protection from one of the known offerors. They work! Just search for “Identity Theft Protection” on the internet and select a known company. Be sure the address in your browser address bar clearly is the company that you were trying to reach before you start to fill out any forms with sensitive personal information.

 

Fifth, start to review your bank statements regularly. Any unclear transactions should be addressed immediately!

Categories: Blog, CyberSecurityBy Scott JohnstonOctober 17, 2017
Tags: Cyber Risk ManagementCybersecurityequifaxequifax breachIdentity ProtectionPersonal Identity Theft

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Near Reality Crisis SimulationNextNext post:JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer