Equifax, one of the three largest consumer credit reporting agencies in the United States, announced in September 2017 that its systems had been breached and the sensitive personal data of 148 million Americans had been compromised. The data breached included names, home addresses, phone numbers, dates of birth, social security numbers, and driverās license numbers. The credit card numbers of approximately 209,000 consumers were also breached. The Equifax breach is unprecedented in scope and severity. There have been larger security breaches by other companies in the past, but the sensitivity of the personal information held by Equifax and the scale of the problem makes this breach unprecedented.
Chinese Military Charged with Equifax Breach: The U.S. government has indicted four members of China's military on charges of hacking Equifax to exploit the personal data of 150 million Americans. They allegedly conspired to hack into Equifax's computer networks, maintain unauthorized access to those computers, and steal sensitive, personally identifiable information of nearly half of all American citizens.
The Equifax data breach was particularly dangerous because of the sensitive information that was compromised. This information can be used to commit identity theft and other crimes. The breach also affected a large number of people, which made it one of the largest data breaches in history.
In the wake of the Equifax data breach, many people criticized the company for its poor security practices. The hackers were able to gain access to Equifaxās systems by exploiting a known vulnerability that had not been patched. This showed that Equifax had not taken proper steps to protect its customersā data. Further proving the benefit of regular Penetration Testing, to highlight new vulnerabilities and remediate them before youāre the victim of such an attack.
The Equifax data breach is an important reminder of the importance of cybersecurity. Organisations must take steps to protect their customersā data, or they will face serious consequences.
Comments
Post a Comment