The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.
TREES PLANTED: 36
Last Updated: 1/17/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Network Security Software Productivity Data Privacy IT Support User Tips Computer Hardware Hackers Data Backup Tech Term Innovation Efficiency Email Communications Cybersecurity Data Recovery Google Android Collaboration Hosted Solutions Managed IT Services Malware Business Management Windows 10 Internet IT Services Phishing Cloud Backup Business Outsourced IT Small Business VoIp Microsoft Communication Workplace Tips Mobile Device Microsoft Office Social Media Server Mobile Devices Smartphones Ransomware Smartphone Artificial Intelligence Cloud Computing Network Access Control Business Technology Managed Service Information Facebook Upgrade IT Management Two-factor Authentication Data Management Alert Holiday Automation Passwords Internet of Things Browser Office 365 Mobile Device Management Managed Service Provider Quick Tips Cost Management Patch Management BDR Data loss Conferencing Apple Blockchain Cybercrime Applications Apps Government Vulnerabilities Bandwidth Saving Money Big Data Hard Drive Windows Data Security Update Spam Encryption VPN Remote Monitoring Scam Vulnerability Miscellaneous Data Breach Operating System Analytics Websites Maintenance App Disaster Recovery Gadgets Antivirus Users Vendor Healthcare Project Management Digital Software as a Service Vendor Management Windows 7 History Google Maps Processor Professional Services Word Search Mobility Business Continuity Computing Saving Time Multi-factor Authentication Printer Voice over Internet Protocol Networking Social Engineering Virtualization Save Money Bitcoin iPhone Data Protection Augmented Reality Cooperation Start Menu Gmail Computers Telephone Virtual Assistant Retail Tech Terms Laptop Managed IT Document Management Managed Services Provider Downloads Managed IT services Monitoring Help Desk Hacking Gamification Unified Threat Management Microchip Cabling Tablet Current Events Smart Devices Mobile Security Backup and Disaster Recovery Password Sports PowerPoint Solid State Drive Google Docs Managed Services Entertainment Customer Service Money Information Technology Employer/Employee Relationship Memes Company Culture Customer Resource management Router Hard Drive Disposal Hacker Regulations Service Level Agreement VoIP Customer Relationship Management Bluetooth Username Management Tech Legal Settings Tip of the week Display Addiction Television Downtime Touchscreen How to Microsoft Excel Value Electronic Health Records Twitter Outlook Computing Infrastructure Meetings Data Analysis Private Cloud Distributed Denial of Service Mobile Technology SQL Server IT Identity Theft Screen Reader Telephone System Modem Access email scam Licensing Accountants Going Green Disaster Piracy Holidays Wireless Headphones Term Law Enforcement Administration Wasting Time HTML Emergency Microsoft 365 IBM Mouse Legislation Content Navigation Cryptocurrency Memory User Tip Uninterrupted Power Supply Budget How To Fileless Malware Avoiding Downtime Freedom of Information Azure Communitications Desktop Electronic Medical Records SSID Spyware Wi-Fi Training Download Corporate Profile Software License Optimization Cleaning Error Google Play WiFi Cortana Managing Costs Machine Learning Google Drive Bookmark Solutions Cyber security BYOD Audit Evernote Unified Communications Device security Paperless Office Vendor Mangement Redundancy Business Cards Time Management Knowledge Directions Employer/Employee Relationships News Mobile Office Virtual Desktop Health IT Google Calendar eWaste Managed IT Service Equifax Upload Integration Virtual Machines Security Cameras CrashOverride Virtual Machine Devices Network Management DDoS Browsers Trend Micro Worker Printing Database Business Mangement Proxy Server Comparison Running Cable Fake News Free Resource IT Assessment Chromebook Medical IT Robot Startup Trends Transportation SharePoint Teamwork Humor Virtual Reality Nanotechnology Virus Social Network Social Hypervisor Compliance Telephony eCommerce Emails Travel SaaS Computer Care YouTube Excel Storage Website Tactics Specifications Multi-Factor Security Managing Stress Surveillance Thank You Personal Information Printers Congratulations Regulation Financial