The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.
TREES PLANTED: 470
Last Updated: 10/8/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Productivity Best Practices Data Network Security Software IT Support Innovation User Tips Collaboration Hardware Privacy Hackers Google Efficiency Cybersecurity Computer Data Backup Hosted Solutions Android Communications Tech Term Email Data Recovery Small Business Internet Phishing Cloud IT Services Malware Workplace Tips Business Management Backup Mobile Device Managed IT Services Network Smartphone Business Windows 10 Communication Microsoft Office VoIp Outsourced IT Microsoft Quick Tips Social Media Cloud Computing Managed Service Covid-19 Business Technology Mobile Devices Ransomware Smartphones Server Users Information Upgrade Artificial Intelligence Browser Internet of Things Blockchain Disaster Recovery Facebook Access Control IT Management Data Management Conferencing BDR Apps Alert Two-factor Authentication Holiday Passwords Automation Miscellaneous Mobile Device Management Managed Service Provider Data loss Remote Work Windows Gadgets Data Security Vendor Spam Patch Management Encryption Cybercrime Apple Applications Government Operating System Office 365 Cost Management Remote Monitoring Analytics Business Continuity App Augmented Reality Data Breach Scam VPN Healthcare Help Desk Vulnerability Saving Money Wi-Fi Vulnerabilities Vendor Management Windows 7 Hard Drive Websites Maintenance Bandwidth Antivirus Computing Mobile Office Voice over Internet Protocol Update Project Management Big Data Networking Printer Data Protection Software as a Service iPhone Save Money Multi-factor Authentication Start Menu Google Maps WiFi Cooperation Social Engineering Bitcoin Telephone Managed Services Integration Virtualization BYOD Retail Virtual Assistant Laptop Gmail Meetings Employee/Employer Relationship Computers Monitoring Document Management Health Downloads Managed IT services How To Hacking Digital History Processor Professional Services Information Technology Search Tech Terms Word Managed IT Saving Time Mobility Video Conferencing Managed Services Provider Budget Solutions Evernote Hypervisor Virtual Private Network Legislation Content Teamwork Humor FinTech Freedom of Information Touchscreen Cortana Training Download Health IT eCommerce Financial Data Outlook Software License Desktop Directions Employer/Employee Relationships Storage Computer Repair Disaster Unified Communications Machine Learning Security Cameras Business Cards Cleaning Browsers Current Events Smart Devices Remote CrashOverride Device security Paperless Office Hacker Procurement Google Calendar eWaste Proxy Server Employer/Employee Relationship Memes Notifications Worker Emergency News Office Equifax Upload Medical IT Customer Relationship Management Telework Running Cable Display Printing Devices Network Management Social Network Social Comparison Transportation Value Electronic Health Records Database Licensing Supply Chain Management Robot SQL Server IT Organization YouTube Google Drive Fake News Wasting Time Solid State Drive Audit Startup Trends Sports PowerPoint Holidays Cabling Tablet Vendor Mangement Redundancy SharePoint Chromebook Microchip Time Management Knowledge Excel Compliance Customer Resource management Router Data Storage Specifications Virtual Reality Nanotechnology Entertainment Customer Service Memory Surveillance Website Tactics Management Tech Flexibility Google Docs Emails Travel Azure Communitications AI Settings DDoS Managing Costs Internet Service Provider Hard Drive Disposal Gamification Optimization How to Business Mangement Money Mobile Security Backup and Disaster Recovery Access Legal Tip of the week Regulations Service Level Agreement Telephone System Modem Cyber security PCI DSS Television Downtime Company Culture Data Analysis Private Cloud Development Addiction Term Managed IT Service Remote Working IBM Virus Computing Infrastructure Bluetooth Username Microsoft 365 Virtual Desktop Chrome Administration Telephony Microsoft Excel Navigation Virtual Machine Net Neutrality Uninterrupted Power Supply SaaS Computer Care email scam User Tip Virtual Machines Distributed Denial of Service Mobile Technology Twitter Spyware Unified Threat Management Law Enforcement Accountants Going Green Electronic Medical Records SSID Trend Micro Regulations Compliance Password Mouse Piracy Identity Theft Screen Reader Fileless Malware Avoiding Downtime Cryptocurrency HTML Error Google Play Corporate Profile Wireless Headphones Bookmark Free Resource IT Assessment Employees VoIP Congratulations Printers Regulation Multi-Factor Security Personal Information Thank You Managing Stress Financial