The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.
TREES PLANTED: 771
Last Updated: 2/1/2021
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Productivity Software Network Security Data IT Support Innovation User Tips Collaboration Hackers Hardware Privacy Google Efficiency Cybersecurity Data Backup Computer Workplace Tips Internet Android Phishing Data Recovery Email Small Business Hosted Solutions Tech Term Communications Mobile Device IT Services Business Business Management Cloud Communication Malware Managed IT Services Covid-19 Backup Smartphone Network Quick Tips Microsoft Office VoIp Windows 10 Managed Service Microsoft Outsourced IT Social Media Smartphones Users Cloud Computing Business Technology Mobile Devices Artificial Intelligence Information Server Upgrade Passwords Ransomware Internet of Things Facebook Browser Blockchain Access Control Disaster Recovery Windows Holiday BDR Apps Conferencing Saving Money IT Management Data Management Vendor Alert Spam Patch Management Two-factor Authentication Automation Wi-Fi Gadgets Data loss Cybercrime Remote Miscellaneous Government Mobile Device Management Apple Office 365 Managed Service Provider Applications Cost Management Remote Work Bandwidth Data Security Encryption Networking Operating System Augmented Reality App Computing Websites Maintenance Voice over Internet Protocol Antivirus Mobile Office Project Management Data Breach Big Data Free Resource Vulnerabilities Hard Drive Business Continuity Managed Services Help Desk Update Healthcare VPN Scam Vulnerability Vendor Management Windows 7 Save Money Remote Monitoring Analytics Saving Time Multi-factor Authentication Printer Managed IT Laptop Virtual Assistant Employees Tech Terms Gmail Virtualization BYOD Solutions Document Management iPhone Downloads Cooperation Computers Video Conferencing Digital Hacking History Integration Managed Services Provider Telephone Software as a Service Information Technology Retail Google Maps Word Search Compliance Managed IT services Mobility Monitoring Display Meetings Budget Employee/Employer Relationship Router Data Protection Professional Services WiFi Health Processor Start Menu Holidays Social Engineering Bitcoin How To Images 101 Legislation Content Azure Communitications News Microsoft 365 Business Mangement Worker Google Calendar Flexibility eWaste Gig Economy Term User Tip Running Cable Desktop Managing Costs Internet Service Provider Navigation Training Download Optimization Electronic Medical Records SSID Virus Cleaning Printing Development FinTech Fileless Malware Avoiding Downtime Telephony Machine Learning Cyber security Comparison PCI DSS Virtual Desktop Fake News Bookmark YouTube Device security Paperless Office Managed IT Service Remote Working Robot Error Google Play SaaS Computer Care Virtual Machines SharePoint Password Cabling Tablet Virtual Machine Net Neutrality Evernote Unified Threat Management Solid State Drive Equifax Upload Health IT Excel Notifications Directions Employer/Employee Relationships VoIP Devices Network Management Trend Micro Specifications Regulations Compliance IT Assessment Browsers Settings Database Google Docs Risk Management Security Cameras Trends Teamwork Humor Money Proxy Server Outlook How to Chromebook Hypervisor Virtual Private Network Hard Drive Disposal Reviews Touchscreen Startup Medical IT Virtual Reality Nanotechnology Storage Legal Computer Repair Tip of the week Organization Disaster Access eCommerce Television Financial Data Downtime IBM Emails Travel Current Events Smart Devices Microsoft Excel Transportation Emergency Administration Website Tactics Computing Infrastructure Smartwatch Social Network Social Gamification Employer/Employee Relationship Memes Distributed Denial of Service Mobile Technology Mobile Security Backup and Disaster Recovery Hacker Procurement email scam End of Support Uninterrupted Power Supply Sports PowerPoint Company Culture Law Enforcement Office AI Microchip Spyware Regulations Service Level Agreement Customer Relationship Management Mouse Telework Piracy Corporate Profile Bluetooth Username Value Electronic Health Records Cryptocurrency Entertainment Customer Service Google Drive Addiction CES Customer Resource management SQL Server IT Freedom of Information Vendor Mangement Redundancy Twitter Licensing Supply Chain Management Shopping Management Tech Audit Identity Theft Screen Reader Wasting Time Cortana Chrome Time Management Knowledge Accountants Going Green Software License Wireless Headphones Memory Unified Communications Surveillance Data Analysis Private Cloud DDoS CrashOverride HTML Data Storage Business Cards Telephone System Modem Personal Information Remote Workers Printers Financial Regulation Thank You Multi-Factor Security Managing Stress Congratulations