ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Remember the Equifax Breach? Here’s an Update

Remember the Equifax Breach? Here’s an Update

Spoiler alert: it isn’t good news.

On September 7th, 2017, it was made public that Equifax had suffered one of the largest cybersecurity breaches in history, and as a result, had left 145.5 million consumers in the United States vulnerable to identity theft. Due to a website application vulnerability, the personally identifiable information of these people was exposed from May until July of that year.

As a result, Equifax was ordered to pick up the $700 million tab to help those affected. Everyone who was eligible to apply was promised their choice of free credit monitoring services, or a cash payment of up to $125.

Now, with almost a year between us and the ruling, there have been no payments made. This is due to a few appeals to the settlement’s approval that have pushed the delivery of these payments out further. Claims are being reviewed by a neutral settlement administrator.

Worse, according to the Federal Trade Commission and Consumer Reports, when any of these payments are distributed, they will likely equal much less than the $125 initially promised.

The reason why boils down to simple math: with a set budget dictating how much money is up for grabs out of the total settlement—$31 million out of the $700 million—the more people who stake a claim results in a smaller amount available to distribute to each person.

What this Has to Do With Your Business

Regardless, it still isn’t good news for Equifax, and gives an oh-too-clear example of why data security is positively essential for every business.

Consider your own business for a moment: how much personally identifiable information do you have collected and stored for your own purposes? While your total is guaranteed to be dwarfed by the sheer amount of data that Equifax holds, it certainly isn’t insignificant, which means that the fines you could be subjected to wouldn’t be, either.

Fortunately, your business has a means of protecting itself by working with a managed service provider. With an MSP’s assistance, you can better insulate your data against theft via improved and continuously monitored security solutions. As a result, you can focus on your tasks without the added stress of fretting about your security, confident that a team of professionals is attending to any concerns and preventing you from experiencing your own, scaled Equifax breach.

To find out more about what ClearView IT has to offer your operations and security, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Windows 10 Facebook Disaster Recovery Covid-19 Passwords Holiday IT Support Apps Browser Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Spam Server Information Remote Bandwidth WiFi Encryption Mobile Device Management Business Technology App Virtualization Blockchain Office 365 Employee/Employer Relationship Budget Gmail Office Apple Two-factor Authentication History Information Technology Health Conferencing Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Document Management Hacker Save Money Remote Computing Patch Management Vendor Compliance Remote Monitoring Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Employer-Employee Relationship Retail Legal Alert Data storage Money Hiring/Firing Outlook Customer Service Unified Threat Management Firewall Password Applications Augmented Reality Word Project Management BYOD Vulnerabilities IBM Website Computing Vendor Management Mobile Office Hard Drive Search... Managed Services Best Practice Data loss Printer VPN Update User Sports Travel Social Data Breach SaaS DDoS Virtual Reality Social Engineering Cryptocurrency Paperless Office Black Market Antivirus Chrome Maintenance iPhone Cleaning Education Cortana Robot Windows 11 Content Filtering Monitoring Healthcare Mobile Computing Websites Router Remote Workers Meetings Marketing Mobility The Internet of Things Windows 7 Running Cable Free Resource YouTube Twitter Google Maps Scam Storage Law Enforcement How To Laptop End of Support Downtime Tech Terms Images 101 Integration Display Hack Safety Identity Theft Notifications Managed IT HIPAA Digital Unified Communications Virtual Assistant Virtual Desktop Experience Employees Google Docs Bluetooth Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Disaster Cooperation Video Conferencing Physical Security Politics Virtual Machines PowerPoint Machine Learning Settings Computer Repair Lithium-ion battery Multi-factor Authentication Administration Start Menu Professional Services Presentation Solid State Drive Downloads Computer Care Processors Specifications Vulnerability Saving Time IT Consultant Chromebook Software as a Service Drones Managed Services Provider Customer Relationship Management Data Protection Computers Bitcoin Automobile Co-Managed IT Virtual Private Network Telephone Entertainment Current Events How To Wireless Technology Microchip Flexibility eWaste Excel Solutions intranet Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Wireless Hacks Customer Resource management Organization Shortcut Network Congestion Cabling Devices Cyber security Shortcuts Reliable Computing Fileless Malware Heating/Cooling Writing Tablet Smart Devices Environment G Suite Tip of the week Social Networking Tracking Company Culture Troubleshooting Windows XP Mouse VoIP Gamification Remote Working Telephone System AI Regulations Trend Micro Be Proactive Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Text Messaging Content Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Videos Access Database Surveillance Music Public Cloud Managing Costs Business Owner Time Management Staffing Health IT Equifax SSID Audit Media IP Address Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships File Sharing Virtual Machine Botnet Username Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology Navigation 2FA Flash Cache Addiction email scam Teamwork Business Growth Workers Mobile Security Hypervisor Inbound Marketing Telephone Systems Unified Threat Management Data Storage Recovery User Tip Shopping Competition Legislation News Medical IT Printing Evernote Paperless Network Management CCTV SQL Server Entrepreneur Google Wallet Licensing LiFi Banking Touchscreen PCI DSS Documents Messenger Emergency Proxy Server Gig Economy Application Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Electronic Payment Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Intelligence Computing Infrastructure Azure Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Phone System Securty Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Society Business Cards Tech Human Resources Domains Language Business Mangement Going Green Net Neutrality Error Financial Data Tablets Reading Bookmark Risk Management Monitors IT Visible Light Communication Scams Windows 8 Supercomputer Piracy Google Calendar Term Google Apps Download Virus Telework HTML Computer Accessories Relocation Browsers Smartwatch Public Speaking Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Tech Support Software License Streaming Media Comparison Google Play Work/Life Balance Google Drive Upload Procurement Social Network FinTech Keyboard Knowledge Data Analysis CES Hard Drives Corporate Profile Screen Reader IT Assessment Point of Sale

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?