The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.
TREES PLANTED: 60
Last Updated: 2/1/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Software Network Security IT Support Productivity Data Privacy User Tips Computer Innovation Hackers Hardware Data Backup Efficiency Google Tech Term Cybersecurity Communications Android Hosted Solutions Collaboration Email Data Recovery Malware Managed IT Services Internet Windows 10 Business Management Cloud IT Services Outsourced IT Business Phishing Backup Small Business Microsoft VoIp Smartphone Workplace Tips Network Communication Mobile Device Server Cloud Computing Microsoft Office Mobile Devices Social Media Smartphones Artificial Intelligence Ransomware Information Upgrade Facebook Access Control Business Technology Managed Service Holiday Two-factor Authentication Alert Passwords Automation Internet of Things Browser IT Management Data Management Government Office 365 Apple Applications Patch Management BDR Cost Management Quick Tips Cybercrime Data loss Blockchain Mobile Device Management Managed Service Provider Conferencing Apps Windows Business Continuity Vulnerabilities Disaster Recovery Spam Miscellaneous Data Security Encryption VPN Scam Saving Money Vulnerability Bandwidth Vendor Hard Drive Operating System Users Healthcare Websites Remote Monitoring Maintenance Update Antivirus Windows 7 Project Management Augmented Reality Analytics Big Data Computing Data Breach Gadgets App Computers Hacking Laptop Mobile Office iPhone Information Technology Cooperation Managed IT services Integration Telephone Digital Retail History Managed Services Provider Mobility Networking Word Search Help Desk Monitoring Managed Services Managed IT Social Engineering Tech Terms Bitcoin Multi-factor Authentication Vendor Management Printer Meetings Professional Services Data Protection Gmail Processor Save Money Virtual Assistant Start Menu Software as a Service Document Management Saving Time Virtualization Voice over Internet Protocol Downloads Google Maps Electronic Medical Records Optimization SSID Specifications Managing Costs Devices Fileless Malware Running Cable Network Management Avoiding Downtime Disaster Excel Google Docs Bookmark Development Database Solutions Emergency Error Cyber security Google Play Virtual Desktop Chromebook Money Managed IT Service Startup Evernote Trends YouTube Hard Drive Disposal Virtual Reality Health IT Virtual Machines Nanotechnology Solid State Drive Television Downtime Virtual Machine Compliance Directions Cabling Employer/Employee Relationships Tablet Legal Tip of the week Computing Infrastructure Website Browsers Video Conferencing Tactics Google Drive Microsoft Excel Trend Micro Emails Security Cameras Travel Free Resource Mobile Security Proxy Server IT Assessment Backup and Disaster Recovery Vendor Mangement Redundancy Distributed Denial of Service Mobile Technology Gamification Settings Audit email scam Teamwork Company Culture Humor Medical IT Mouse Piracy Hypervisor Regulations Service Level Agreement How to Time Management Law Enforcement Knowledge Access Budget Storage Computer Repair Addiction Transportation DDoS Cryptocurrency Social Network eCommerce Bluetooth Social Username Current Events Smart Devices Twitter IBM Business Mangement Freedom of Information Administration Employer/Employee Relationship Identity Theft Sports Memes Screen Reader PowerPoint Uninterrupted Power Supply Software License Hacker Accountants Microchip Going Green WiFi Cortana Wireless Headphones Router Spyware Virus Business Cards Display HTML Entertainment Office Customer Service Telephony Unified Communications Customer Resource management Customer Relationship Management Google Calendar Computer Care eWaste Value Electronic Health Records Corporate Profile News Management Legislation Tech Content SaaS SQL Server Desktop IT Password Licensing Training Download Unified Threat Management Telephone System Holidays Cleaning Modem Comparison Wasting Time Data Analysis Machine Learning Private Cloud VoIP Printing Robot Memory Device security Surveillance Paperless Office Microsoft 365 Fake News How To Term BYOD CrashOverride Azure User Tip Communitications Outlook SharePoint Wi-Fi Equifax Navigation Worker Upload Touchscreen Personal Information Printers Financial Regulation Multi-Factor Security Managing Stress Thank You Congratulations