keyboard_arrow_down
SmallBusiness.com Guide to Business Computer and Tech Security
September 18, 2017 SmallBusiness.com
by SmallBusiness.com in Security
Small Business Checklist for Responding to the Equifax Security Breach | 2017

Also included, information from the U.S. Federal Trade Commission regarding the Equifax breach.


At the bottom of this post, see Experian breach information
provided by the U.S. Federal Trade Commission.


What you should do in response to the Equifax breach

While it can be filed under the tab, “too little, too late,” Equifax is offering a number of services for free to people, including credit monitoring. You can find information from Equifax at the website EquifaxSecurity2017.com.  (Equifax originally indicated that taking part in the credit monitoring service would require consumers to drop any potential legal actions on the part of consumers. That clause was dropped after massive push-back by consumers and government agencies.)

1. Find out if your information is potentially at risk

Equifax has set up a website that allows consumers to determine if their information was potentially compromised. Click on the tab labeled Potential Impact. (Everyone we have asked has said they received the “potentially compromise” message.)

2. Sign up for credit monitoring

Equifax said it will provide free credit monitoring to all U.S. consumers, regardless of whether their information was potentially compromised. Since the service is free and it’s relatively easy to sign up, it appears to be a wise precaution, even if it’s a nuisance.

According to Consumer Reports, there are five services under the Equifax monitoring service, branded TrustedIDPremier.

  1. Getting a copy of your Equifax credit report.
  2. Credit monitoring and automated alerts of key changes to your credit report on any of the three major credit reporting agencies: Equifax, Experian, and Trans Union.
  3. Scans suspicious websites for your Social Security number
  4. Up to $1 million worth of identity theft insurance to pay for out-of-pocket expenses if you’re a victim of identity theft
  5. The ability to put a freeze on your credit report.

3. Freeze your credit report

Take advantage of the ability to freeze your credit report. Freezing goes a step further than credit card monitoring and will prevent anyone from taking out a loan or a credit card in your name. Freezing your credit file is a good starting point if you think you have been affected. Be sure to strengthen your PIN. You can thaw your freeze every time you want to apply for new credit by using a personal identification number that the companies give you, which you absolutely should not lose, according to NYTimes.com reporter Ron Lieber.

4. Check Your Accounts

Even if you follow all these steps, you’ll still have to continue to monitor your own accounts for fraudulent activity, indefinitely. While there are fee-based ways to do this constantly, a less time-consuming and anxiety-provoking alternative is to check your credit reports for free every four months at annualcreditreport.com.

Beyond Equifax

Ron Lieber recommends that you go beyond the Equifax and that, in some cases, require a payment. They put you in better control of personal data at the other two major consumer credit bureaus: Experian, TransUnion.


Equifax Breach information from the Federal Trade Commission

The following is provided by the U.S. Federal Trade Commission

If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.

Here are the facts, according to Equifax. The breach lasted from mid-May through July. The hackers accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people. And they grabbed personal information of people in the UK and Canada too.

There are steps to take to help protect your information from being misused. Visit Equifax’s website, www.equifaxsecurity2017.com.

  • Find out if your information was exposed. Click on the “Potential Impact” tab and enter your last name and the last six digits of your Social Security number. Your Social Security number is sensitive information, so make sure you’re on a secure computer and an encrypted network connection anytime you enter it. The site will tell you if you’ve been affected by this breach.
  • Whether or not your information was exposed, U.S. consumers can get a year of free credit monitoring and other services. The site will give you a date when you can come back to enroll. Write down the date and come back to the site and click “Enroll” on that date. You have until November 21, 2017 to enroll.
  • You also can access frequently asked questions at the site.

Here are some other steps to take to help protect yourself after a data breach:

  • Check your credit reports from Equifax, Experian, and TransUnion — for free — by visiting annualcreditreport.com. Accounts or activity that you don’t recognize could indicate identity theft. Visit IdentityTheft.gov to find out what to do.
  • Consider placing a credit freeze on your files. A credit freeze makes it harder for someone to open a new account in your name. Keep in mind that a credit freeze won’t prevent a thief from making charges to your existing accounts.
  • Monitor your existing credit card and bank accounts closely for charges you don’t recognize.
  • If you decide against a credit freeze, consider placing a fraud alert on your files. A fraud alert warns creditors that you may be an identity theft victim and that they should verify that anyone seeking credit in your name really is you.
  • File your taxes early — as soon as you have the tax information you need, before a scammer can. Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job. Respond right away to letters from the IRS.

Visit Identitytheft.gov/databreach to learn more about protecting yourself after a data breach.

istock

4
IRS Early Warning: Start Preparing for 2018 W-2 Email Phishing Scams

The IRS is already warning tax professionals and businesses to beware of W-2 scams in 2018.

5
How to Protect Your Business from Ransomware Attacks

Steps to take to keep your company’s computers from being taken hostage by criminal hackers.

6
How to Monitor Small Business Computer Security Alerts

When major security threats occur, here are places to turn for the latest updates.

7
11 Google Scams and Links to Google Support for Each | 2017

Advice for avoiding online scams that try to make you think they originate with Google.

8
IRS Issues Urgent Warning to Small Businesses: Beware of W-2 Phishing Scam Return | 2017

The IRS has issued an urgent warning about the return of an annual scam. This year it’s worse.

9
What Does HTTPS Mean? And Why a Small Business Website Needs the ‘S’

Get ready to add more security to your business website in 2017 and beyond.

10
Homeland Security Tips for Choosing Harder to Hack Passwords

In addition to password management applications and two-step validation, here are some tips for making your password harder to hack.

11
Passwords Are Stolen Everyday; How to Protect Yours From Being One of Them

Don’t wait until your password is stolen to follow these procedures.

12
How to Recognize and Avoid an Attempt to Crack Your Two-Step Verification Passwords

As attackers evolve, there are many steps businesses and consumers can take to protect themselves.

13
How Voice Recognition Software is Being Used to Detect Cyber Criminals

(In cyber crime), the weakest link is often the human. Software developers are trying to strengthen that link.

14
How to Avoid a New Cyber Attack Attempting to Access Small Business Bank  Funds

Cyber criminals are using a new attack against hundreds of small business employees.

15
Seven Resolutions for 2016 That Will Help Protect Your Small Business Computers

Simple steps you should take to help protect your computers and data in 2016.

16
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

17
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

18
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

19
Why You Should Still Use a Password Management System, Even if You Heard One Was ‘Hacked’

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

20
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

21
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

22
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

23
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

24
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

25
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

26
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

27
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

28
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

29
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.