ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Equifax Freeze PINs Aren’t As Secure As They Could Be

Equifax Freeze PINs Aren’t As Secure As They Could Be

The Equifax data breach has been a considerable issue for countless individuals, exposing sensitive information that could lead to identity theft and so much more. In response to this breach, some experts are recommending that consumers go as far as freezing their credit lines because of the potential for breaches. Well, it all comes down to a PIN--something that can be easily guessed by a hacker under the right circumstances.

Personal identification numbers--contrary to popular belief--are the exact same thing as passwords. They are codes designed to keep someone from accessing sensitive information. However, access control devices like this need to follow the same guidelines, regardless of what they are called. They need to be complex and secure so as to keep hackers from guessing them. You should include both upper and lower-case letters, numbers, and symbols, and include them in a seemingly random order.

You’re probably thinking, “Great. Now I know enough to make my Equifax PIN as strong as possible.” Except… that’s not how this works.

Due to the way that Equifax generates your PIN, your credit lines could be placed at risk. The PINs used by Equifax are ten digits long, stemming from the date that the credit line was frozen, as well as the specific time which it was frozen. The order of these variables is the following: DdMmYyHhMm. This significantly cuts down on the amount of possible combinations available for a PIN. Furthermore, there are only a certain number of reasonable times within a day where you could apply for a credit line freeze, further limiting the amount of potential variables including the access code.

If Equifax had kept it a simple ten-digit randomized string of numbers, this wouldn’t be an issue. But that’s just not how the cookie crumbled.

As of September 11th, 2017, Equifax has addressed that this PIN generation process needs to be changed. Hopefully, the change will be enough to secure people’s sensitive information properly.

What are your thoughts about this development? Are you certain that your passwords and PINs are secure enough to protect your organization (and your identity) from being compromised? For assistance securing your personal and organizational information, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Managed Service Windows 10 Apps IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Windows Bandwidth Business Technology Encryption Blockchain Mobile Device Management App Virtualization Server Information Remote Spam WiFi Employee/Employer Relationship Budget History Gmail Office Apple Two-factor Authentication Information Technology Office 365 BDR Cybercrime Wi-Fi Health Big Data Conferencing Access Control Analytics Data Security Vendor Document Management Hacker Remote Monitoring Save Money Voice over Internet Protocol Compliance IT Management Employer-Employee Relationship Training Help Desk Hacking Cost Management Remote Computing Patch Management Applications Data storage Money Project Management Vulnerabilities Customer Service Unified Threat Management Firewall Mobile Office Search... Augmented Reality Word Best Practice Managed Services BYOD IBM Website Computing Data loss Retail Alert Vendor Management Hard Drive Hiring/Firing Outlook Password Legal Antivirus Maintenance Social Mobile Computing Sports Travel Monitoring DDoS Virtual Reality SaaS Healthcare Social Engineering Marketing Cryptocurrency Websites Remote Workers Black Market Mobility Running Cable Meetings iPhone Cleaning Windows 11 Cortana Windows 7 Education Robot Free Resource Google Maps Storage Content Filtering Scam How To Router VPN The Internet of Things Update User YouTube Twitter Law Enforcement Data Breach Laptop End of Support Printer Chrome Paperless Office Downtime Safety Identity Theft Cooperation Hack Notifications Video Conferencing Physical Security PowerPoint Unified Communications Virtual Machines Administration Virtual Desktop Experience Computer Repair Google Docs Multi-factor Authentication Presentation Bluetooth Start Menu Specifications Professional Services Distributed Denial of Service Downloads IT Consultant Office Tips Computer Care Private Cloud Memory Vulnerability Saving Time Disaster Customer Relationship Management Managed Services Provider Co-Managed IT Software as a Service Data Protection Computers Entertainment Bitcoin Politics Virtual Private Network Lithium-ion battery Machine Learning Telephone Settings Current Events Solid State Drive Processors Excel Solutions Tech Terms Images 101 Chromebook Drones Integration Display HIPAA Managed IT Automobile Digital Virtual Assistant Employees How To Wireless Technology Microchip Taxes Avoiding Downtime eWaste Flexibility Holidays Processor File Sharing Virtual Machine Environment Be Proactive Reliable Computing Username Heating/Cooling Writing Redundancy Reviews Startup Optimization Inbound Marketing Social Networking Freedom of Information Windows XP Navigation 2FA Cache Addiction email scam Teamwork Workers Mobile Security Hypervisor Workplace Strategies Scalability Unified Threat Management Data Storage User Tip Shopping Text Messaging Legislation Proactive IT News Medical IT Administrator Printing Evernote Paperless Bring Your Own Device Network Management Electronic Payment CCTV SQL Server Licensing Touchscreen PCI DSS Emergency Proxy Server Gig Economy Emails Humor Music Computer Malfunction Fake News Business Communications Staffing Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Phone System Samsung Device security Managed IT Service Smart Technology Management Regulations Compliance IP Address Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Botnet Tech Human Resources Rental Service Business Mangement Going Green Net Neutrality Micrsooft Business Cards Tablets Error Financial Data Flash Bookmark Risk Management Telephone Systems IT Business Growth Computer Accessories Google Calendar Term Google Apps Recovery Download Competition Supercomputer Piracy HTML Supply Chain Virus Telework LiFi Browsers Smartwatch Banking Nanotechnology Communitications Entrepreneur Google Wallet Motion Sickness Microsoft 365 Comparison Google Play Documents Messenger Google Drive Upload Procurement Application Deep Learning Software License Business Intelligence Workplace Social Network FinTech Knowledge Data Analysis CES Business Metrics Corporate Profile Screen Reader IT Assessment Hosted Solution Television Security Cameras Securty Books Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Customer Resource management Organization Domains Language Cabling Devices Cyber security Troubleshooting Society Scams Fileless Malware Tablet Smart Devices G Suite Tip of the week Tracking Company Culture Visible Light Communication Mouse Reading VoIP Gamification Remote Working Monitors Telephone System AI Regulations Trend Micro Windows 8 Cables Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Digital Payment Desktop Wasting Time Advertising SharePoint Relocation Content Public Speaking Displays Electronic Medical Records Work/Life Balance Worker Accountants eCommerce Business Owner Tech Support Point of Sale Modem Streaming Media Videos Access Database Surveillance Keyboard Public Cloud Managing Costs Shortcuts Time Management Hard Drives Health IT Equifax intranet SSID In Internet of Things Audit Media Wireless Hacks Spyware Tactics Development Shortcut Network Congestion Hard Drive Disposal Employer/Employee Relationships

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?