Equifax Breach: What should you do to protect yourself?

By September 12, 2017 September 19th, 2017 Announcements, Security
Equifax data breach - Hacking in action

The big news this past week has been the Equifax breach. On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their credit card numbers and other documents taken.

This is one of the largest data breaches in US history and the biggest known leak so far in 2017. The size of this breach has alarmed consumers and lawmakers, and Equifax has been highly criticized for its handling of the breach so far.

Were you affected by the Equifax breach?

You can find out if you were affected by the Equifax breach by following these steps.

  1. Go to https://www.equifaxsecurity2017.com/
  2. Click the Potential Impact button at the bottom of the page.
  3. Read the steps.
  4. Click the Check Potential Impact button.
  5. Enter your last name and the last 6 digits of your Social Security Number.
  6. Click Continue.

You should then receive a notification about your impact status. Note that you do not need to continue with enrolling in Equifax’s Trusted ID program, which the site will prompt you to do. This program is entirely optional, and not one that we would recommend.

If you were one of the smaller number of people with other information stolen, such as your credit card number, you should receive a notification by mail from Equifax.

What should you do if your personal info was compromised?

Here are some next steps you can do if your information was compromised, or if you are concerned that it might be. These are also steps to take in case of any data breach or hack that you think might have compromised you.

  • Watch out for phishing emails that claim to be from Equifax. Hackers may use Equifax’s name to trick you into revealing sensitive information by asking you to check if your data was compromised. Also look out for emails that claim a problem with your credit card or other personal financial information.
  • Enroll in an identity protection program or credit monitoring service. Since Equifax itself is a credit monitoring agency, you may wish to opt for a paid third-party service such as IDShield or LifeLock instead of Equifax’s Trusted ID program.
  • Check your credit reports. You can check your credit reports for free here. Look through your credit reports for any suspicious activity.
  • Report any fraudulent or suspicious charges on your credit card immediately.
  • Freeze your credit, which requires a PIN that only you have to unfreeze it. You can contact a credit bureau to freeze your credit, and the process is usually automated. Check for advice on how to freeze your credit on a state-by-state basis here.
  • Set up a fraud alert so that credit card companies have to verify your identity before opening an account. To do so, contact a credit bureau.
  • Remain vigilant about checking your credit report, even after some time has passed.

And if you suspect your identity has been stolen in the Equifax breach or any other hack, learn how to protect yourself here at the Identity Theft Resource Center or call their toll-free number at 888-400-5530.


Recent Posts / View All Posts

IT Leadership | Shared CIO

You Need IT Leadership

| Consulting, Leadership | No Comments
Missouri is just beginning to emerge from its stay-at-home order in response to the pandemic threat. Who ever imagined that pandemic planning policies would become a reality? What was once regarded as a threat with low probability of occurrence will likely become a much higher probability as we navigate through the coming years. The realization of this threat has certainly changed the way we view ourselves and the world around us. It has sensitized us to our newfound vulnerability. This month, I am writing to you from the Joplin, MO office of OXEN Technology. Considering our present circumstances, our physical…
Tech Tip Background

Office 365 Tip: Create a file request in OneDrive

| Office 365, Tech Tip | No Comments
If you need to obtain files from various people, you can use OneDrive to create a file request that allows others to upload documents directly to a folder you specify. This gives people a quick way to transfer files to you without giving them view or edit permissions to your OneDrive folder. Here’s how! Note: This feature is not available in Office 365 Government. For file requests to work, your Office 365 administrator must enable Anyone links in OneDrive. Requesting Files Using OneDrive Online, select the folder where you want others to upload their files. Click Request files on the…
Virtual Private Network

What is a VPN and do you need one to work from home?

| Security | No Comments
Since businesses started shifting to remote work due to COVID-19, OXEN has seen a sizeable uptick in requests for purchasing and implementing VPNs for at-home workers. You’ve probably seen that a Virtual Private Network (VPN) connection is often recommended for securely working from home while accessing company resources. So what’s a VPN for in this context, and do you need one? If you’re a business manager, do you need a VPN connection for every employee who’s now working from home? Read on for our tips. What Is a Virtual Private Network? VPN stands for “Virtual Private Network”. It creates a…