ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Equifax Freeze PINs Aren’t As Secure As They Could Be

Equifax Freeze PINs Aren’t As Secure As They Could Be

The Equifax data breach has been a considerable issue for countless individuals, exposing sensitive information that could lead to identity theft and so much more. In response to this breach, some experts are recommending that consumers go as far as freezing their credit lines because of the potential for breaches. Well, it all comes down to a PIN--something that can be easily guessed by a hacker under the right circumstances.

Personal identification numbers--contrary to popular belief--are the exact same thing as passwords. They are codes designed to keep someone from accessing sensitive information. However, access control devices like this need to follow the same guidelines, regardless of what they are called. They need to be complex and secure so as to keep hackers from guessing them. You should include both upper and lower-case letters, numbers, and symbols, and include them in a seemingly random order.

You’re probably thinking, “Great. Now I know enough to make my Equifax PIN as strong as possible.” Except… that’s not how this works.

Due to the way that Equifax generates your PIN, your credit lines could be placed at risk. The PINs used by Equifax are ten digits long, stemming from the date that the credit line was frozen, as well as the specific time which it was frozen. The order of these variables is the following: DdMmYyHhMm. This significantly cuts down on the amount of possible combinations available for a PIN. Furthermore, there are only a certain number of reasonable times within a day where you could apply for a credit line freeze, further limiting the amount of potential variables including the access code.

If Equifax had kept it a simple ten-digit randomized string of numbers, this wouldn’t be an issue. But that’s just not how the cookie crumbled.

As of September 11th, 2017, Equifax has addressed that this PIN generation process needs to be changed. Hopefully, the change will be enough to secure people’s sensitive information properly.

What are your thoughts about this development? Are you certain that your passwords and PINs are secure enough to protect your organization (and your identity) from being compromised? For assistance securing your personal and organizational information, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Disaster Recovery Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Remote Work Internet of Things Government Operating System Saving Money Gadgets Networking Artificial Intelligence Windows Workplace Strategy Managed IT services Bandwidth Information Encryption Server App Virtualization Spam Blockchain Remote Business Technology Mobile Device Management WiFi Apple Information Technology Gmail Office History Two-factor Authentication Office 365 Budget Employee/Employer Relationship Cybercrime Access Control Data Security Big Data Health Wi-Fi BDR Analytics Conferencing Cost Management Compliance Voice over Internet Protocol Vendor Document Management Help Desk Patch Management Hacking Employer-Employee Relationship Save Money Remote Monitoring Hacker Remote Computing IT Management Training Augmented Reality Word IBM Mobile Office Legal Website Applications Search... Managed Services Best Practice Data storage Vulnerabilities Retail Alert Project Management Hiring/Firing Outlook BYOD Money Password Data loss Computing Customer Service Unified Threat Management Vendor Management Firewall Hard Drive iPhone Education Twitter Cortana VPN Mobile Computing Content Filtering Data Breach Law Enforcement Update Remote Workers Marketing End of Support Printer Windows 7 Running Cable Router Free Resource Storage Paperless Office The Internet of Things YouTube Monitoring Antivirus How To Travel Healthcare Maintenance Virtual Reality Social Engineering Windows 11 Cryptocurrency Laptop Black Market Cleaning User Websites Robot Meetings Mobility Social Sports SaaS DDoS Chrome Google Maps Scam Virtual Machines Chromebook Drones PowerPoint Virtual Assistant Computer Repair Disaster Administration Automobile Professional Services Presentation Tech Terms Specifications Lithium-ion battery How To Microchip Managed IT IT Consultant Digital Flexibility Processor Managed Services Provider Processors Customer Relationship Management Taxes Co-Managed IT Virtual Private Network Identity Theft Entertainment Hack Notifications Unified Communications Current Events Multi-factor Authentication Solutions Google Docs Bluetooth Physical Security Distributed Denial of Service Integration Wireless Technology Saving Time Office Tips Images 101 Memory eWaste Display Private Cloud Bitcoin Computers Start Menu HIPAA Computer Care Downtime Downloads Safety Telephone Employees Avoiding Downtime Politics Vulnerability Settings Machine Learning Holidays Virtual Desktop Software as a Service Excel Experience Data Protection Solid State Drive Cooperation Video Conferencing Medical IT Telephone System Regulations Shopping Corporate Profile Paperless Visible Light Communication SQL Server Reading Directions Knowledge Monitors Point of Sale Backup and Disaster Recovery Television Content Telephony Windows 8 Desktop Employer Employee Relationship PCI DSS Licensing Humor Electronic Medical Records Electronic Payment Shortcuts Accountants Cabling Gig Economy Database Tablet Business Communications Advertising G Suite Internet Service Provider Azure Relocation Recovery Displays Competition Mouse Work/Life Balance VoIP Tech Support Tracking Regulations Compliance Managed IT Service Memes LiFi Health IT Entrepreneur Be Proactive Equifax Phone System Tactics Human Resources Hard Drive Disposal Web Server Net Neutrality Documents Application SharePoint Username Business Intelligence Digital Payment Financial Data In Internet of Things Freedom of Information IT Hacks Network Congestion Workplace Strategies Startup Worker Risk Management Addiction Access Google Apps email scam Reliable Computing Securty Navigation Writing Domains Time Management Mobile Security Public Cloud Computer Accessories Telework News Communitications Microsoft 365 User Tip Legislation Smartwatch Network Management Spyware Procurement Scalability Evernote Audit Administrator Text Messaging Proactive IT File Sharing FinTech Fake News IT Assessment Bring Your Own Device Proxy Server Redundancy Smart Technology Emails CES Public Speaking Service Level Agreement Cache Computing Infrastructure Supply Chain Management Value Streaming Media Management Unified Threat Management Music Device security Workers Organization Cyber security Microsoft Excel Smart Devices Keyboard Wireless Headphones Hard Drives Going Green Troubleshooting Business Cards CCTV Remote Working Tech Printing Botnet Error Touchscreen intranet AI Trend Micro Computer Malfunction Electronic Health Records Transportation Rental Service Wireless Bookmark Emergency Micrsooft Shortcut Supply Chain Digital Security Cameras Flash Heating/Cooling Download Vendor Mangement Environment Piracy Wasting Time Term Windows XP Modem Telephone Systems Business Growth Social Networking HTML Samsung eCommerce Videos Webcam Surveillance Browsers Workplace Nanotechnology Uninterrupted Power Supply Upload Business Mangement Business Owner Software License Managing Costs Google Play SSID Banking Social Network Google Wallet Tablets Media Development Employer/Employee Relationships Messenger Data Analysis Deep Learning Scams Screen Reader Google Calendar Trends Mobile Technology Supercomputer Virtual Machine Security Cameras Optimization Business Metrics Customer Resource management Virus Hosted Solution Devices Reviews 2FA Tip of the week Motion Sickness Teamwork Books Staffing Fileless Malware Cables Comparison Language IP Address Gamification Google Drive Inbound Marketing Society Company Culture Data Storage Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?